Analysis
-
max time kernel
93s -
max time network
98s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
30-08-2024 09:01
Static task
static1
Behavioral task
behavioral1
Sample
out_aukaa.js
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
out_aukaa.js
Resource
win10v2004-20240802-en
General
-
Target
out_aukaa.js
-
Size
726KB
-
MD5
914de97efaa32ba7dab129ccd14677b3
-
SHA1
7501c4a79484a62f9f01d4a22d0e454fc165c16f
-
SHA256
d632551161e59bbc94687fda33925eb227c77f2da0b38a953cbfbffa14f68534
-
SHA512
1f37e21a042214bc2c5b099f3633f102469b6d03e6d19090dc4602fec627dd89bf7e5bcf912691528c25aff8197dd4205807da1d47ac6ed6d642ce23340eb3b3
-
SSDEEP
12288:lSFYBUZL2VWmqCzDfJMINm1PT3UXjxbqTMnvR:hUZ2VWmFxMIN2TE9eavR
Malware Config
Signatures
-
Detects Latrodectus 1 IoCs
Detects Latrodectus v1.4.
resource yara_rule behavioral1/memory/2416-153-0x00000000003B0000-0x00000000003C6000-memory.dmp family_latrodectus_1_4 -
Latrodectus loader
Latrodectus is a loader written in C++.
-
Blocklisted process makes network request 3 IoCs
flow pid Process 3 2564 wscript.exe 5 2564 wscript.exe 8 1364 msiexec.exe -
Executes dropped EXE 1 IoCs
pid Process 944 MSI79D7.tmp -
Loads dropped DLL 11 IoCs
pid Process 2000 MsiExec.exe 2000 MsiExec.exe 2000 MsiExec.exe 108 rundll32.exe 108 rundll32.exe 108 rundll32.exe 108 rundll32.exe 2416 rundll32.exe 2416 rundll32.exe 2416 rundll32.exe 2416 rundll32.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\A: wscript.exe File opened (read-only) \??\J: wscript.exe File opened (read-only) \??\R: wscript.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\X: wscript.exe File opened (read-only) \??\L: wscript.exe File opened (read-only) \??\N: wscript.exe File opened (read-only) \??\S: wscript.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\G: wscript.exe File opened (read-only) \??\E: wscript.exe File opened (read-only) \??\O: wscript.exe File opened (read-only) \??\P: wscript.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\U: wscript.exe File opened (read-only) \??\Y: wscript.exe File opened (read-only) \??\Q: wscript.exe File opened (read-only) \??\T: wscript.exe File opened (read-only) \??\W: wscript.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\B: wscript.exe File opened (read-only) \??\H: wscript.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\V: wscript.exe File opened (read-only) \??\Z: wscript.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\I: wscript.exe File opened (read-only) \??\K: wscript.exe File opened (read-only) \??\M: wscript.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File opened for modification C:\Windows\Installer\f787580.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI6548.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSI791A.tmp msiexec.exe File created C:\Windows\Installer\f787580.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI79D7.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI71A8.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI7419.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI74D5.tmp msiexec.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSI79D7.tmp -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad msiexec.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1364 msiexec.exe 1364 msiexec.exe 944 MSI79D7.tmp -
Suspicious use of AdjustPrivilegeToken 52 IoCs
description pid Process Token: SeShutdownPrivilege 2564 wscript.exe Token: SeIncreaseQuotaPrivilege 2564 wscript.exe Token: SeRestorePrivilege 1364 msiexec.exe Token: SeTakeOwnershipPrivilege 1364 msiexec.exe Token: SeSecurityPrivilege 1364 msiexec.exe Token: SeCreateTokenPrivilege 2564 wscript.exe Token: SeAssignPrimaryTokenPrivilege 2564 wscript.exe Token: SeLockMemoryPrivilege 2564 wscript.exe Token: SeIncreaseQuotaPrivilege 2564 wscript.exe Token: SeMachineAccountPrivilege 2564 wscript.exe Token: SeTcbPrivilege 2564 wscript.exe Token: SeSecurityPrivilege 2564 wscript.exe Token: SeTakeOwnershipPrivilege 2564 wscript.exe Token: SeLoadDriverPrivilege 2564 wscript.exe Token: SeSystemProfilePrivilege 2564 wscript.exe Token: SeSystemtimePrivilege 2564 wscript.exe Token: SeProfSingleProcessPrivilege 2564 wscript.exe Token: SeIncBasePriorityPrivilege 2564 wscript.exe Token: SeCreatePagefilePrivilege 2564 wscript.exe Token: SeCreatePermanentPrivilege 2564 wscript.exe Token: SeBackupPrivilege 2564 wscript.exe Token: SeRestorePrivilege 2564 wscript.exe Token: SeShutdownPrivilege 2564 wscript.exe Token: SeDebugPrivilege 2564 wscript.exe Token: SeAuditPrivilege 2564 wscript.exe Token: SeSystemEnvironmentPrivilege 2564 wscript.exe Token: SeChangeNotifyPrivilege 2564 wscript.exe Token: SeRemoteShutdownPrivilege 2564 wscript.exe Token: SeUndockPrivilege 2564 wscript.exe Token: SeSyncAgentPrivilege 2564 wscript.exe Token: SeEnableDelegationPrivilege 2564 wscript.exe Token: SeManageVolumePrivilege 2564 wscript.exe Token: SeImpersonatePrivilege 2564 wscript.exe Token: SeCreateGlobalPrivilege 2564 wscript.exe Token: SeRestorePrivilege 1364 msiexec.exe Token: SeTakeOwnershipPrivilege 1364 msiexec.exe Token: SeRestorePrivilege 1364 msiexec.exe Token: SeTakeOwnershipPrivilege 1364 msiexec.exe Token: SeRestorePrivilege 1364 msiexec.exe Token: SeTakeOwnershipPrivilege 1364 msiexec.exe Token: SeRestorePrivilege 1364 msiexec.exe Token: SeTakeOwnershipPrivilege 1364 msiexec.exe Token: SeRestorePrivilege 1364 msiexec.exe Token: SeTakeOwnershipPrivilege 1364 msiexec.exe Token: SeRestorePrivilege 1364 msiexec.exe Token: SeTakeOwnershipPrivilege 1364 msiexec.exe Token: SeRestorePrivilege 1364 msiexec.exe Token: SeTakeOwnershipPrivilege 1364 msiexec.exe Token: SeRestorePrivilege 1364 msiexec.exe Token: SeTakeOwnershipPrivilege 1364 msiexec.exe Token: SeRestorePrivilege 1364 msiexec.exe Token: SeTakeOwnershipPrivilege 1364 msiexec.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1364 wrote to memory of 2000 1364 msiexec.exe 30 PID 1364 wrote to memory of 2000 1364 msiexec.exe 30 PID 1364 wrote to memory of 2000 1364 msiexec.exe 30 PID 1364 wrote to memory of 2000 1364 msiexec.exe 30 PID 1364 wrote to memory of 2000 1364 msiexec.exe 30 PID 1364 wrote to memory of 2000 1364 msiexec.exe 30 PID 1364 wrote to memory of 2000 1364 msiexec.exe 30 PID 1364 wrote to memory of 944 1364 msiexec.exe 32 PID 1364 wrote to memory of 944 1364 msiexec.exe 32 PID 1364 wrote to memory of 944 1364 msiexec.exe 32 PID 1364 wrote to memory of 944 1364 msiexec.exe 32 PID 1364 wrote to memory of 944 1364 msiexec.exe 32 PID 1364 wrote to memory of 944 1364 msiexec.exe 32 PID 1364 wrote to memory of 944 1364 msiexec.exe 32 PID 108 wrote to memory of 2416 108 rundll32.exe 34 PID 108 wrote to memory of 2416 108 rundll32.exe 34 PID 108 wrote to memory of 2416 108 rundll32.exe 34 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\out_aukaa.js1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:2564
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 71311B008954AAB1574729D4D085DCD52⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2000
-
-
C:\Windows\Installer\MSI79D7.tmp"C:\Windows\Installer\MSI79D7.tmp" C:/Windows/System32/rundll32.exe C:\Users\Admin\AppData\Roaming\tz6.dll, NvCreateMPEG4MuxSink2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:944
-
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\tz6.dll, NvCreateMPEG4MuxSink1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:108 -
C:\Windows\System32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Roaming\Custom_update\Update_6e10dcdd.dll", NvCreateMPEG4MuxSink2⤵
- Loads dropped DLL
PID:2416
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
1.1MB
MD511bba295ee381161292c384c2eca7a0c
SHA12ce64388e396af0c1d96c8544fca6cfee0644f54
SHA2564dabba4dbabba2b5201fca7e525859946ad860e2693574dc2a6d18348b0c8b95
SHA51242d926b2a6a4dc99f264a7a38ab951e55f5b126313d8f3250698aca65aea6330030940c91179b29b563c625ddd8f2672ddb7ec3a4f440ffe32dcd3d6cb982f55
-
Filesize
1.6MB
MD5329259260ebe046b0e80bec91f632ba0
SHA1db1184c14af32cf859d7f089d1dacc685257cc11
SHA256334c3f529b1c580ea83e2ea1e85b7a937dcceb3dd3b2a533afb936f53100c222
SHA512cfa0235623ec962266dbe9bcba5eac4535eff365aa784e6cf4d2a877aa6fedcc0801e5ba751b35ad176997337b72e4141f42ee07faf1017abcfda42b3228b2a4
-
Filesize
389KB
MD5b9545ed17695a32face8c3408a6a3553
SHA1f6c31c9cd832ae2aebcd88e7b2fa6803ae93fc83
SHA2561e0e63b446eecf6c9781c7d1cae1f46a3bb31654a70612f71f31538fb4f4729a
SHA512f6d6dc40dcba5ff091452d7cc257427dcb7ce2a21816b4fec2ee249e63246b64667f5c4095220623533243103876433ef8c12c9b612c0e95fdfffe41d1504e04
-
Filesize
436KB
MD5475d20c0ea477a35660e3f67ecf0a1df
SHA167340739f51e1134ae8f0ffc5ae9dd710e8e3a08
SHA256426e6cf199a8268e8a7763ec3a4dd7add982b28c51d89ebea90ca792cbae14dd
SHA51299525aaab2ab608134b5d66b5313e7fc3c2e2877395c5c171897d7a6c66efb26b606de1a4cb01118c2738ea4b6542e4eb4983e631231b3f340bf85e509a9589e