Analysis

  • max time kernel
    13s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    26-08-2024 18:24

General

  • Target

    1.exe

  • Size

    2.3MB

  • MD5

    1f3d6134710193f7d4d1e864d5e6b362

  • SHA1

    538a93f3103e461906f783210c08cb1a4708a438

  • SHA256

    2114aefe4d9460c04028d45b0f41ca9c65cea365727fda0fd2a885222c87db3c

  • SHA512

    85a9d0906d57b276ae8eedc6f7a3a8b109c7c68e1e7805f5ab3a5fa26c09e80cdf786e71e1e6f7d03479d7510393aa8710ae969847285900e7b5fbd44343fffc

  • SSDEEP

    49152:YMLtHPldWWLafLAUCweyFI0ZBAFCGLcRe2xTIYLEJL:jLaMUzRe2M

Score
10/10

Malware Config

Signatures

  • Detects Latrodectus 7 IoCs

    Detects Latrodectus v1.4.

  • Latrodectus loader

    Latrodectus is a loader written in C++.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1.exe
    "C:\Users\Admin\AppData\Local\Temp\1.exe"
    1⤵
    • Deletes itself
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:1848
    • C:\Users\Admin\AppData\Roaming\Custom_update\Update_283e7fcd.exe
      "C:\Users\Admin\AppData\Roaming\Custom_update\Update_283e7fcd.exe"
      2⤵
      • Executes dropped EXE
      PID:2308

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Custom_update\Update_283e7fcd.exe

    Filesize

    2.3MB

    MD5

    1f3d6134710193f7d4d1e864d5e6b362

    SHA1

    538a93f3103e461906f783210c08cb1a4708a438

    SHA256

    2114aefe4d9460c04028d45b0f41ca9c65cea365727fda0fd2a885222c87db3c

    SHA512

    85a9d0906d57b276ae8eedc6f7a3a8b109c7c68e1e7805f5ab3a5fa26c09e80cdf786e71e1e6f7d03479d7510393aa8710ae969847285900e7b5fbd44343fffc

  • memory/1848-2-0x0000000000200000-0x0000000000216000-memory.dmp

    Filesize

    88KB

  • memory/1848-1-0x0000000000200000-0x0000000000216000-memory.dmp

    Filesize

    88KB

  • memory/1848-0-0x0000000000200000-0x0000000000216000-memory.dmp

    Filesize

    88KB

  • memory/1848-7-0x0000000140000000-0x0000000140254000-memory.dmp

    Filesize

    2.3MB

  • memory/1848-8-0x0000000000200000-0x0000000000216000-memory.dmp

    Filesize

    88KB

  • memory/2308-12-0x0000000001B40000-0x0000000001B56000-memory.dmp

    Filesize

    88KB

  • memory/2308-10-0x0000000001B40000-0x0000000001B56000-memory.dmp

    Filesize

    88KB

  • memory/2308-9-0x0000000001B40000-0x0000000001B56000-memory.dmp

    Filesize

    88KB