Analysis
-
max time kernel
135s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-08-2024 09:10
Static task
static1
Behavioral task
behavioral1
Sample
d632551161e59bbc94687fda33925eb227c77f2da0b38a953cbfbffa14f68534.js
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
d632551161e59bbc94687fda33925eb227c77f2da0b38a953cbfbffa14f68534.js
Resource
win10v2004-20240802-en
General
-
Target
d632551161e59bbc94687fda33925eb227c77f2da0b38a953cbfbffa14f68534.js
-
Size
726KB
-
MD5
914de97efaa32ba7dab129ccd14677b3
-
SHA1
7501c4a79484a62f9f01d4a22d0e454fc165c16f
-
SHA256
d632551161e59bbc94687fda33925eb227c77f2da0b38a953cbfbffa14f68534
-
SHA512
1f37e21a042214bc2c5b099f3633f102469b6d03e6d19090dc4602fec627dd89bf7e5bcf912691528c25aff8197dd4205807da1d47ac6ed6d642ce23340eb3b3
-
SSDEEP
12288:lSFYBUZL2VWmqCzDfJMINm1PT3UXjxbqTMnvR:hUZ2VWmFxMIN2TE9eavR
Malware Config
Signatures
-
Detects Latrodectus 1 IoCs
Detects Latrodectus v1.4.
resource yara_rule behavioral2/memory/2244-59-0x000001F7DAE70000-0x000001F7DAE86000-memory.dmp family_latrodectus_1_4 -
Latrodectus loader
Latrodectus is a loader written in C++.
-
Blocklisted process makes network request 4 IoCs
flow pid Process 4 2120 wscript.exe 6 2120 wscript.exe 9 2120 wscript.exe 18 864 msiexec.exe -
Executes dropped EXE 1 IoCs
pid Process 4500 MSIBD99.tmp -
Loads dropped DLL 6 IoCs
pid Process 1184 MsiExec.exe 1184 MsiExec.exe 1184 MsiExec.exe 1184 MsiExec.exe 1716 rundll32.exe 2244 rundll32.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\T: msiexec.exe -
Drops file in Windows directory 10 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSIBAB6.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIBC7E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIBD99.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIB3BF.tmp msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSIBBEF.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIBC1F.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSIBCEC.tmp msiexec.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSIBD99.tmp -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 864 msiexec.exe 864 msiexec.exe 4500 MSIBD99.tmp 4500 MSIBD99.tmp -
Suspicious use of AdjustPrivilegeToken 50 IoCs
description pid Process Token: SeShutdownPrivilege 2120 wscript.exe Token: SeIncreaseQuotaPrivilege 2120 wscript.exe Token: SeSecurityPrivilege 864 msiexec.exe Token: SeCreateTokenPrivilege 2120 wscript.exe Token: SeAssignPrimaryTokenPrivilege 2120 wscript.exe Token: SeLockMemoryPrivilege 2120 wscript.exe Token: SeIncreaseQuotaPrivilege 2120 wscript.exe Token: SeMachineAccountPrivilege 2120 wscript.exe Token: SeTcbPrivilege 2120 wscript.exe Token: SeSecurityPrivilege 2120 wscript.exe Token: SeTakeOwnershipPrivilege 2120 wscript.exe Token: SeLoadDriverPrivilege 2120 wscript.exe Token: SeSystemProfilePrivilege 2120 wscript.exe Token: SeSystemtimePrivilege 2120 wscript.exe Token: SeProfSingleProcessPrivilege 2120 wscript.exe Token: SeIncBasePriorityPrivilege 2120 wscript.exe Token: SeCreatePagefilePrivilege 2120 wscript.exe Token: SeCreatePermanentPrivilege 2120 wscript.exe Token: SeBackupPrivilege 2120 wscript.exe Token: SeRestorePrivilege 2120 wscript.exe Token: SeShutdownPrivilege 2120 wscript.exe Token: SeDebugPrivilege 2120 wscript.exe Token: SeAuditPrivilege 2120 wscript.exe Token: SeSystemEnvironmentPrivilege 2120 wscript.exe Token: SeChangeNotifyPrivilege 2120 wscript.exe Token: SeRemoteShutdownPrivilege 2120 wscript.exe Token: SeUndockPrivilege 2120 wscript.exe Token: SeSyncAgentPrivilege 2120 wscript.exe Token: SeEnableDelegationPrivilege 2120 wscript.exe Token: SeManageVolumePrivilege 2120 wscript.exe Token: SeImpersonatePrivilege 2120 wscript.exe Token: SeCreateGlobalPrivilege 2120 wscript.exe Token: SeRestorePrivilege 864 msiexec.exe Token: SeTakeOwnershipPrivilege 864 msiexec.exe Token: SeRestorePrivilege 864 msiexec.exe Token: SeTakeOwnershipPrivilege 864 msiexec.exe Token: SeRestorePrivilege 864 msiexec.exe Token: SeTakeOwnershipPrivilege 864 msiexec.exe Token: SeRestorePrivilege 864 msiexec.exe Token: SeTakeOwnershipPrivilege 864 msiexec.exe Token: SeRestorePrivilege 864 msiexec.exe Token: SeTakeOwnershipPrivilege 864 msiexec.exe Token: SeRestorePrivilege 864 msiexec.exe Token: SeTakeOwnershipPrivilege 864 msiexec.exe Token: SeRestorePrivilege 864 msiexec.exe Token: SeTakeOwnershipPrivilege 864 msiexec.exe Token: SeRestorePrivilege 864 msiexec.exe Token: SeTakeOwnershipPrivilege 864 msiexec.exe Token: SeRestorePrivilege 864 msiexec.exe Token: SeTakeOwnershipPrivilege 864 msiexec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 864 wrote to memory of 1184 864 msiexec.exe 91 PID 864 wrote to memory of 1184 864 msiexec.exe 91 PID 864 wrote to memory of 1184 864 msiexec.exe 91 PID 864 wrote to memory of 4500 864 msiexec.exe 94 PID 864 wrote to memory of 4500 864 msiexec.exe 94 PID 864 wrote to memory of 4500 864 msiexec.exe 94 PID 1716 wrote to memory of 2244 1716 rundll32.exe 96 PID 1716 wrote to memory of 2244 1716 rundll32.exe 96 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\d632551161e59bbc94687fda33925eb227c77f2da0b38a953cbfbffa14f68534.js1⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:2120
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 8323EC74FEB18C7F7C373FB54F91D9542⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1184
-
-
C:\Windows\Installer\MSIBD99.tmp"C:\Windows\Installer\MSIBD99.tmp" C:/Windows/System32/rundll32.exe C:\Users\Admin\AppData\Roaming\tz6.dll, NvCreateMPEG4MuxSink2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4500
-
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\tz6.dll, NvCreateMPEG4MuxSink1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\System32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Roaming\Custom_update\Update_55aaa93.dll", NvCreateMPEG4MuxSink2⤵
- Loads dropped DLL
PID:2244
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51d9671d10282e54fb95c89f3f2f79634
SHA179ba7bc74df339ce334290d8eac0e97a933ce2c3
SHA25615dcd8c555dbf28fd47177b987166ef074b568c5d36ac157ce39edd2ab3daa95
SHA5124efdb03ca1f9d9d26b30a10ae3ced71273f882d8be5eda5206b8d672012a1799e4a008da2b9941e58f18b40e5ed1e285c0f375efcafaa56a11e31480c606a3d9
-
Filesize
1.1MB
MD511bba295ee381161292c384c2eca7a0c
SHA12ce64388e396af0c1d96c8544fca6cfee0644f54
SHA2564dabba4dbabba2b5201fca7e525859946ad860e2693574dc2a6d18348b0c8b95
SHA51242d926b2a6a4dc99f264a7a38ab951e55f5b126313d8f3250698aca65aea6330030940c91179b29b563c625ddd8f2672ddb7ec3a4f440ffe32dcd3d6cb982f55
-
Filesize
1.6MB
MD5329259260ebe046b0e80bec91f632ba0
SHA1db1184c14af32cf859d7f089d1dacc685257cc11
SHA256334c3f529b1c580ea83e2ea1e85b7a937dcceb3dd3b2a533afb936f53100c222
SHA512cfa0235623ec962266dbe9bcba5eac4535eff365aa784e6cf4d2a877aa6fedcc0801e5ba751b35ad176997337b72e4141f42ee07faf1017abcfda42b3228b2a4
-
Filesize
436KB
MD5475d20c0ea477a35660e3f67ecf0a1df
SHA167340739f51e1134ae8f0ffc5ae9dd710e8e3a08
SHA256426e6cf199a8268e8a7763ec3a4dd7add982b28c51d89ebea90ca792cbae14dd
SHA51299525aaab2ab608134b5d66b5313e7fc3c2e2877395c5c171897d7a6c66efb26b606de1a4cb01118c2738ea4b6542e4eb4983e631231b3f340bf85e509a9589e
-
Filesize
389KB
MD5b9545ed17695a32face8c3408a6a3553
SHA1f6c31c9cd832ae2aebcd88e7b2fa6803ae93fc83
SHA2561e0e63b446eecf6c9781c7d1cae1f46a3bb31654a70612f71f31538fb4f4729a
SHA512f6d6dc40dcba5ff091452d7cc257427dcb7ce2a21816b4fec2ee249e63246b64667f5c4095220623533243103876433ef8c12c9b612c0e95fdfffe41d1504e04