Analysis
-
max time kernel
148s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28-08-2024 12:32
Static task
static1
Behavioral task
behavioral1
Sample
Run-Malware-1.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
Run-Malware-1.bat
Resource
win11-20240802-en
General
-
Target
Run-Malware-1.bat
-
Size
52B
-
MD5
c3aaf7a42c7171931aa42cbb02acbe73
-
SHA1
4561841d5e84c5f9f6c07e4fd5d477bc0edf10b4
-
SHA256
02974799a1ed8674bd0fdd9435a5efe53236740f5de8f6d126591329b738abff
-
SHA512
2cb6583df78893081590366f65200a4da613a5a903acd220b70b7d7f19b11ca0dbd90545a0d1f5d3519cae2333b4284d08c4e24544059038e4a5cf2457fceb51
Malware Config
Signatures
-
Detects Latrodectus 6 IoCs
Detects Latrodectus v1.4.
resource yara_rule behavioral1/memory/2876-0-0x000001C5D2BB0000-0x000001C5D2BC6000-memory.dmp family_latrodectus_1_4 behavioral1/memory/2876-1-0x000001C5D2BB0000-0x000001C5D2BC6000-memory.dmp family_latrodectus_1_4 behavioral1/memory/2876-3-0x000001C5D2BB0000-0x000001C5D2BC6000-memory.dmp family_latrodectus_1_4 behavioral1/memory/2876-6-0x000001C5D2BB0000-0x000001C5D2BC6000-memory.dmp family_latrodectus_1_4 behavioral1/memory/4852-9-0x0000014669A60000-0x0000014669A76000-memory.dmp family_latrodectus_1_4 behavioral1/memory/4852-8-0x0000014669A60000-0x0000014669A76000-memory.dmp family_latrodectus_1_4 -
Latrodectus loader
Latrodectus is a loader written in C++.
-
Loads dropped DLL 1 IoCs
pid Process 4852 rundll32.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2876 rundll32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2908 wrote to memory of 2876 2908 cmd.exe 85 PID 2908 wrote to memory of 2876 2908 cmd.exe 85 PID 2876 wrote to memory of 4852 2876 rundll32.exe 89 PID 2876 wrote to memory of 4852 2876 rundll32.exe 89 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Run-Malware-1.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\system32\rundll32.exerundll32.exe rxgamepadremapping.dll, RxDetourRxInput2⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Roaming\Custom_update\Update_2bc585e8.dll", RxDetourRxInput3⤵
- Loads dropped DLL
PID:4852
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD556abe58e12de144476751b3540c3837f
SHA100f30bfbaa8637ba6e3b7a928b0ba5e86cd48056
SHA25619b96b42b2c27e4d4868b6afc44c6fe87573b857b4829bede999c5513eec61d0
SHA51207f292ee074dfb2d40038f68bfc8ef4c0d28fac51036a1ed85ebbc01f84d24d4aa0a2f91cbae468aa8228e9a1a85bc8b016ab4602624abbe66a10ca6369aab70