Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-08-2024 09:01
Static task
static1
Behavioral task
behavioral1
Sample
out_aukaa.js
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
out_aukaa.js
Resource
win10v2004-20240802-en
General
-
Target
out_aukaa.js
-
Size
726KB
-
MD5
914de97efaa32ba7dab129ccd14677b3
-
SHA1
7501c4a79484a62f9f01d4a22d0e454fc165c16f
-
SHA256
d632551161e59bbc94687fda33925eb227c77f2da0b38a953cbfbffa14f68534
-
SHA512
1f37e21a042214bc2c5b099f3633f102469b6d03e6d19090dc4602fec627dd89bf7e5bcf912691528c25aff8197dd4205807da1d47ac6ed6d642ce23340eb3b3
-
SSDEEP
12288:lSFYBUZL2VWmqCzDfJMINm1PT3UXjxbqTMnvR:hUZ2VWmFxMIN2TE9eavR
Malware Config
Signatures
-
Detects Latrodectus 1 IoCs
Detects Latrodectus v1.4.
resource yara_rule behavioral2/memory/5008-59-0x0000019893610000-0x0000019893626000-memory.dmp family_latrodectus_1_4 -
Latrodectus loader
Latrodectus is a loader written in C++.
-
Blocklisted process makes network request 4 IoCs
flow pid Process 3 4616 wscript.exe 15 4616 wscript.exe 18 4616 wscript.exe 28 1448 msiexec.exe -
Executes dropped EXE 1 IoCs
pid Process 3540 MSIA5FA.tmp -
Loads dropped DLL 6 IoCs
pid Process 2700 MsiExec.exe 2700 MsiExec.exe 2700 MsiExec.exe 2700 MsiExec.exe 824 rundll32.exe 5008 rundll32.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe -
Drops file in Windows directory 10 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSI9069.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIA470.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSIA59B.tmp msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSIA375.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIA4FD.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIA53D.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIA5FA.tmp msiexec.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSIA5FA.tmp -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1448 msiexec.exe 1448 msiexec.exe 3540 MSIA5FA.tmp 3540 MSIA5FA.tmp -
Suspicious use of AdjustPrivilegeToken 50 IoCs
description pid Process Token: SeShutdownPrivilege 4616 wscript.exe Token: SeIncreaseQuotaPrivilege 4616 wscript.exe Token: SeSecurityPrivilege 1448 msiexec.exe Token: SeCreateTokenPrivilege 4616 wscript.exe Token: SeAssignPrimaryTokenPrivilege 4616 wscript.exe Token: SeLockMemoryPrivilege 4616 wscript.exe Token: SeIncreaseQuotaPrivilege 4616 wscript.exe Token: SeMachineAccountPrivilege 4616 wscript.exe Token: SeTcbPrivilege 4616 wscript.exe Token: SeSecurityPrivilege 4616 wscript.exe Token: SeTakeOwnershipPrivilege 4616 wscript.exe Token: SeLoadDriverPrivilege 4616 wscript.exe Token: SeSystemProfilePrivilege 4616 wscript.exe Token: SeSystemtimePrivilege 4616 wscript.exe Token: SeProfSingleProcessPrivilege 4616 wscript.exe Token: SeIncBasePriorityPrivilege 4616 wscript.exe Token: SeCreatePagefilePrivilege 4616 wscript.exe Token: SeCreatePermanentPrivilege 4616 wscript.exe Token: SeBackupPrivilege 4616 wscript.exe Token: SeRestorePrivilege 4616 wscript.exe Token: SeShutdownPrivilege 4616 wscript.exe Token: SeDebugPrivilege 4616 wscript.exe Token: SeAuditPrivilege 4616 wscript.exe Token: SeSystemEnvironmentPrivilege 4616 wscript.exe Token: SeChangeNotifyPrivilege 4616 wscript.exe Token: SeRemoteShutdownPrivilege 4616 wscript.exe Token: SeUndockPrivilege 4616 wscript.exe Token: SeSyncAgentPrivilege 4616 wscript.exe Token: SeEnableDelegationPrivilege 4616 wscript.exe Token: SeManageVolumePrivilege 4616 wscript.exe Token: SeImpersonatePrivilege 4616 wscript.exe Token: SeCreateGlobalPrivilege 4616 wscript.exe Token: SeRestorePrivilege 1448 msiexec.exe Token: SeTakeOwnershipPrivilege 1448 msiexec.exe Token: SeRestorePrivilege 1448 msiexec.exe Token: SeTakeOwnershipPrivilege 1448 msiexec.exe Token: SeRestorePrivilege 1448 msiexec.exe Token: SeTakeOwnershipPrivilege 1448 msiexec.exe Token: SeRestorePrivilege 1448 msiexec.exe Token: SeTakeOwnershipPrivilege 1448 msiexec.exe Token: SeRestorePrivilege 1448 msiexec.exe Token: SeTakeOwnershipPrivilege 1448 msiexec.exe Token: SeRestorePrivilege 1448 msiexec.exe Token: SeTakeOwnershipPrivilege 1448 msiexec.exe Token: SeRestorePrivilege 1448 msiexec.exe Token: SeTakeOwnershipPrivilege 1448 msiexec.exe Token: SeRestorePrivilege 1448 msiexec.exe Token: SeTakeOwnershipPrivilege 1448 msiexec.exe Token: SeRestorePrivilege 1448 msiexec.exe Token: SeTakeOwnershipPrivilege 1448 msiexec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1448 wrote to memory of 2700 1448 msiexec.exe 95 PID 1448 wrote to memory of 2700 1448 msiexec.exe 95 PID 1448 wrote to memory of 2700 1448 msiexec.exe 95 PID 1448 wrote to memory of 3540 1448 msiexec.exe 96 PID 1448 wrote to memory of 3540 1448 msiexec.exe 96 PID 1448 wrote to memory of 3540 1448 msiexec.exe 96 PID 824 wrote to memory of 5008 824 rundll32.exe 98 PID 824 wrote to memory of 5008 824 rundll32.exe 98 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\out_aukaa.js1⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:4616
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding A989A29806A3827EC4734BC491A372622⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2700
-
-
C:\Windows\Installer\MSIA5FA.tmp"C:\Windows\Installer\MSIA5FA.tmp" C:/Windows/System32/rundll32.exe C:\Users\Admin\AppData\Roaming\tz6.dll, NvCreateMPEG4MuxSink2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3540
-
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\tz6.dll, NvCreateMPEG4MuxSink1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Windows\System32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Roaming\Custom_update\Update_2bc585e8.dll", NvCreateMPEG4MuxSink2⤵
- Loads dropped DLL
PID:5008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD545d1edb7b16b5f39d97865280700a797
SHA1b28667c73d903549d2d0e5f00906c4b9666d462e
SHA2567d255234ce79b5e8348a62abe174ef7caa4005b90d0e2e02e3c1c7e617ca9b57
SHA512258487dd660a974003496dec8cbd80bdb4a18feeaf4118f11389c82ef63e1f399970de14e07dc9135acd7719ceb1bd5a55784c30a45ebfe6fac083c589b3f8a4
-
Filesize
1.1MB
MD511bba295ee381161292c384c2eca7a0c
SHA12ce64388e396af0c1d96c8544fca6cfee0644f54
SHA2564dabba4dbabba2b5201fca7e525859946ad860e2693574dc2a6d18348b0c8b95
SHA51242d926b2a6a4dc99f264a7a38ab951e55f5b126313d8f3250698aca65aea6330030940c91179b29b563c625ddd8f2672ddb7ec3a4f440ffe32dcd3d6cb982f55
-
Filesize
1.6MB
MD5329259260ebe046b0e80bec91f632ba0
SHA1db1184c14af32cf859d7f089d1dacc685257cc11
SHA256334c3f529b1c580ea83e2ea1e85b7a937dcceb3dd3b2a533afb936f53100c222
SHA512cfa0235623ec962266dbe9bcba5eac4535eff365aa784e6cf4d2a877aa6fedcc0801e5ba751b35ad176997337b72e4141f42ee07faf1017abcfda42b3228b2a4
-
Filesize
436KB
MD5475d20c0ea477a35660e3f67ecf0a1df
SHA167340739f51e1134ae8f0ffc5ae9dd710e8e3a08
SHA256426e6cf199a8268e8a7763ec3a4dd7add982b28c51d89ebea90ca792cbae14dd
SHA51299525aaab2ab608134b5d66b5313e7fc3c2e2877395c5c171897d7a6c66efb26b606de1a4cb01118c2738ea4b6542e4eb4983e631231b3f340bf85e509a9589e
-
Filesize
389KB
MD5b9545ed17695a32face8c3408a6a3553
SHA1f6c31c9cd832ae2aebcd88e7b2fa6803ae93fc83
SHA2561e0e63b446eecf6c9781c7d1cae1f46a3bb31654a70612f71f31538fb4f4729a
SHA512f6d6dc40dcba5ff091452d7cc257427dcb7ce2a21816b4fec2ee249e63246b64667f5c4095220623533243103876433ef8c12c9b612c0e95fdfffe41d1504e04