Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
30-08-2024 09:10
Static task
static1
Behavioral task
behavioral1
Sample
d632551161e59bbc94687fda33925eb227c77f2da0b38a953cbfbffa14f68534.js
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
d632551161e59bbc94687fda33925eb227c77f2da0b38a953cbfbffa14f68534.js
Resource
win10v2004-20240802-en
General
-
Target
d632551161e59bbc94687fda33925eb227c77f2da0b38a953cbfbffa14f68534.js
-
Size
726KB
-
MD5
914de97efaa32ba7dab129ccd14677b3
-
SHA1
7501c4a79484a62f9f01d4a22d0e454fc165c16f
-
SHA256
d632551161e59bbc94687fda33925eb227c77f2da0b38a953cbfbffa14f68534
-
SHA512
1f37e21a042214bc2c5b099f3633f102469b6d03e6d19090dc4602fec627dd89bf7e5bcf912691528c25aff8197dd4205807da1d47ac6ed6d642ce23340eb3b3
-
SSDEEP
12288:lSFYBUZL2VWmqCzDfJMINm1PT3UXjxbqTMnvR:hUZ2VWmFxMIN2TE9eavR
Malware Config
Signatures
-
Detects Latrodectus 1 IoCs
Detects Latrodectus v1.4.
resource yara_rule behavioral1/memory/2820-154-0x00000000001B0000-0x00000000001C6000-memory.dmp family_latrodectus_1_4 -
Latrodectus loader
Latrodectus is a loader written in C++.
-
Blocklisted process makes network request 3 IoCs
flow pid Process 3 2168 wscript.exe 5 2168 wscript.exe 8 2188 msiexec.exe -
Executes dropped EXE 1 IoCs
pid Process 1684 MSIF2BE.tmp -
Loads dropped DLL 11 IoCs
pid Process 1660 MsiExec.exe 1660 MsiExec.exe 1660 MsiExec.exe 2500 rundll32.exe 2500 rundll32.exe 2500 rundll32.exe 2500 rundll32.exe 2820 rundll32.exe 2820 rundll32.exe 2820 rundll32.exe 2820 rundll32.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: wscript.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: wscript.exe File opened (read-only) \??\N: wscript.exe File opened (read-only) \??\P: wscript.exe File opened (read-only) \??\T: wscript.exe File opened (read-only) \??\Y: wscript.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\E: wscript.exe File opened (read-only) \??\Q: wscript.exe File opened (read-only) \??\S: wscript.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: wscript.exe File opened (read-only) \??\H: wscript.exe File opened (read-only) \??\I: wscript.exe File opened (read-only) \??\J: wscript.exe File opened (read-only) \??\V: wscript.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\W: wscript.exe File opened (read-only) \??\O: wscript.exe File opened (read-only) \??\R: wscript.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\G: wscript.exe File opened (read-only) \??\U: wscript.exe File opened (read-only) \??\Z: wscript.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\L: wscript.exe File opened (read-only) \??\M: wscript.exe File opened (read-only) \??\X: wscript.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSIF2BE.tmp msiexec.exe File opened for modification C:\Windows\Installer\f76f1ef.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSID0E6.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIF1C1.tmp msiexec.exe File created C:\Windows\Installer\f76f1ef.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSIF28D.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIF114.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIF192.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSIF2BE.tmp -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad msiexec.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2188 msiexec.exe 2188 msiexec.exe 1684 MSIF2BE.tmp -
Suspicious use of AdjustPrivilegeToken 52 IoCs
description pid Process Token: SeShutdownPrivilege 2168 wscript.exe Token: SeIncreaseQuotaPrivilege 2168 wscript.exe Token: SeRestorePrivilege 2188 msiexec.exe Token: SeTakeOwnershipPrivilege 2188 msiexec.exe Token: SeSecurityPrivilege 2188 msiexec.exe Token: SeCreateTokenPrivilege 2168 wscript.exe Token: SeAssignPrimaryTokenPrivilege 2168 wscript.exe Token: SeLockMemoryPrivilege 2168 wscript.exe Token: SeIncreaseQuotaPrivilege 2168 wscript.exe Token: SeMachineAccountPrivilege 2168 wscript.exe Token: SeTcbPrivilege 2168 wscript.exe Token: SeSecurityPrivilege 2168 wscript.exe Token: SeTakeOwnershipPrivilege 2168 wscript.exe Token: SeLoadDriverPrivilege 2168 wscript.exe Token: SeSystemProfilePrivilege 2168 wscript.exe Token: SeSystemtimePrivilege 2168 wscript.exe Token: SeProfSingleProcessPrivilege 2168 wscript.exe Token: SeIncBasePriorityPrivilege 2168 wscript.exe Token: SeCreatePagefilePrivilege 2168 wscript.exe Token: SeCreatePermanentPrivilege 2168 wscript.exe Token: SeBackupPrivilege 2168 wscript.exe Token: SeRestorePrivilege 2168 wscript.exe Token: SeShutdownPrivilege 2168 wscript.exe Token: SeDebugPrivilege 2168 wscript.exe Token: SeAuditPrivilege 2168 wscript.exe Token: SeSystemEnvironmentPrivilege 2168 wscript.exe Token: SeChangeNotifyPrivilege 2168 wscript.exe Token: SeRemoteShutdownPrivilege 2168 wscript.exe Token: SeUndockPrivilege 2168 wscript.exe Token: SeSyncAgentPrivilege 2168 wscript.exe Token: SeEnableDelegationPrivilege 2168 wscript.exe Token: SeManageVolumePrivilege 2168 wscript.exe Token: SeImpersonatePrivilege 2168 wscript.exe Token: SeCreateGlobalPrivilege 2168 wscript.exe Token: SeRestorePrivilege 2188 msiexec.exe Token: SeTakeOwnershipPrivilege 2188 msiexec.exe Token: SeRestorePrivilege 2188 msiexec.exe Token: SeTakeOwnershipPrivilege 2188 msiexec.exe Token: SeRestorePrivilege 2188 msiexec.exe Token: SeTakeOwnershipPrivilege 2188 msiexec.exe Token: SeRestorePrivilege 2188 msiexec.exe Token: SeTakeOwnershipPrivilege 2188 msiexec.exe Token: SeRestorePrivilege 2188 msiexec.exe Token: SeTakeOwnershipPrivilege 2188 msiexec.exe Token: SeRestorePrivilege 2188 msiexec.exe Token: SeTakeOwnershipPrivilege 2188 msiexec.exe Token: SeRestorePrivilege 2188 msiexec.exe Token: SeTakeOwnershipPrivilege 2188 msiexec.exe Token: SeRestorePrivilege 2188 msiexec.exe Token: SeTakeOwnershipPrivilege 2188 msiexec.exe Token: SeRestorePrivilege 2188 msiexec.exe Token: SeTakeOwnershipPrivilege 2188 msiexec.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2188 wrote to memory of 1660 2188 msiexec.exe 32 PID 2188 wrote to memory of 1660 2188 msiexec.exe 32 PID 2188 wrote to memory of 1660 2188 msiexec.exe 32 PID 2188 wrote to memory of 1660 2188 msiexec.exe 32 PID 2188 wrote to memory of 1660 2188 msiexec.exe 32 PID 2188 wrote to memory of 1660 2188 msiexec.exe 32 PID 2188 wrote to memory of 1660 2188 msiexec.exe 32 PID 2188 wrote to memory of 1684 2188 msiexec.exe 33 PID 2188 wrote to memory of 1684 2188 msiexec.exe 33 PID 2188 wrote to memory of 1684 2188 msiexec.exe 33 PID 2188 wrote to memory of 1684 2188 msiexec.exe 33 PID 2188 wrote to memory of 1684 2188 msiexec.exe 33 PID 2188 wrote to memory of 1684 2188 msiexec.exe 33 PID 2188 wrote to memory of 1684 2188 msiexec.exe 33 PID 2500 wrote to memory of 2820 2500 rundll32.exe 35 PID 2500 wrote to memory of 2820 2500 rundll32.exe 35 PID 2500 wrote to memory of 2820 2500 rundll32.exe 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\d632551161e59bbc94687fda33925eb227c77f2da0b38a953cbfbffa14f68534.js1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:2168
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding F3293420DFE159710E17A3B257DDD75C2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1660
-
-
C:\Windows\Installer\MSIF2BE.tmp"C:\Windows\Installer\MSIF2BE.tmp" C:/Windows/System32/rundll32.exe C:\Users\Admin\AppData\Roaming\tz6.dll, NvCreateMPEG4MuxSink2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1684
-
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\tz6.dll, NvCreateMPEG4MuxSink1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\System32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Roaming\Custom_update\Update_3e4eb662.dll", NvCreateMPEG4MuxSink2⤵
- Loads dropped DLL
PID:2820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
1.1MB
MD511bba295ee381161292c384c2eca7a0c
SHA12ce64388e396af0c1d96c8544fca6cfee0644f54
SHA2564dabba4dbabba2b5201fca7e525859946ad860e2693574dc2a6d18348b0c8b95
SHA51242d926b2a6a4dc99f264a7a38ab951e55f5b126313d8f3250698aca65aea6330030940c91179b29b563c625ddd8f2672ddb7ec3a4f440ffe32dcd3d6cb982f55
-
Filesize
1.6MB
MD5329259260ebe046b0e80bec91f632ba0
SHA1db1184c14af32cf859d7f089d1dacc685257cc11
SHA256334c3f529b1c580ea83e2ea1e85b7a937dcceb3dd3b2a533afb936f53100c222
SHA512cfa0235623ec962266dbe9bcba5eac4535eff365aa784e6cf4d2a877aa6fedcc0801e5ba751b35ad176997337b72e4141f42ee07faf1017abcfda42b3228b2a4
-
Filesize
436KB
MD5475d20c0ea477a35660e3f67ecf0a1df
SHA167340739f51e1134ae8f0ffc5ae9dd710e8e3a08
SHA256426e6cf199a8268e8a7763ec3a4dd7add982b28c51d89ebea90ca792cbae14dd
SHA51299525aaab2ab608134b5d66b5313e7fc3c2e2877395c5c171897d7a6c66efb26b606de1a4cb01118c2738ea4b6542e4eb4983e631231b3f340bf85e509a9589e
-
Filesize
389KB
MD5b9545ed17695a32face8c3408a6a3553
SHA1f6c31c9cd832ae2aebcd88e7b2fa6803ae93fc83
SHA2561e0e63b446eecf6c9781c7d1cae1f46a3bb31654a70612f71f31538fb4f4729a
SHA512f6d6dc40dcba5ff091452d7cc257427dcb7ce2a21816b4fec2ee249e63246b64667f5c4095220623533243103876433ef8c12c9b612c0e95fdfffe41d1504e04