Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
submitted
30-08-2024 18:55
Behavioral task
behavioral1
Sample
Update_e6ad3eac.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Update_e6ad3eac.dll
Resource
win10v2004-20240802-en
General
-
Target
Update_e6ad3eac.dll
-
Size
70KB
-
MD5
9c66a05cc4ac42ea5e59a396971e7942
-
SHA1
237bd348c25797c50b0ba268aac6d030c2b412b8
-
SHA256
e49fc271d5ff8d701a46e08f52cc8cf82c83dee084f8fcaccf06719ced5518a7
-
SHA512
fa5d6eb1c20758021da4b3661cbf5135ff3f354505a77bd932f76deecc6f7fcf7b9be0dd8a1c1d080677ecdb4baa5a3e823a50a1153492725609af88b3db6efe
-
SSDEEP
1536:xzhHuRqOoGc2WsV/bWM5wpokf8mTrlvLk:xzhHuRooWM5wBkmTrNL
Malware Config
Extracted
latrodectus
https://isomicrotich.com/test/
https://rilomenifis.com/test/
Signatures
-
Detects Latrodectus 2 IoCs
Detects Latrodectus v1.4.
resource yara_rule behavioral1/files/0x0008000000016d5a-1.dat family_latrodectus_1_4 behavioral1/memory/2292-6-0x000007FEFAF10000-0x000007FEFAF26000-memory.dmp family_latrodectus_1_4 -
Latrodectus family
-
Latrodectus loader
Latrodectus is a loader written in C++.
-
Deletes itself 1 IoCs
pid Process 2292 rundll32.exe -
Loads dropped DLL 4 IoCs
pid Process 2444 rundll32.exe 2444 rundll32.exe 2444 rundll32.exe 2444 rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2292 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2444 2292 rundll32.exe 28 PID 2292 wrote to memory of 2444 2292 rundll32.exe 28 PID 2292 wrote to memory of 2444 2292 rundll32.exe 28 PID 2292 wrote to memory of 1236 2292 rundll32.exe 29 PID 2292 wrote to memory of 1236 2292 rundll32.exe 29 PID 2292 wrote to memory of 1236 2292 rundll32.exe 29 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Update_e6ad3eac.dll,#11⤵
- Deletes itself
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Roaming\Custom_update\Update_e857a924.dll", #12⤵
- Loads dropped DLL
PID:2444
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2292 -s 3122⤵PID:1236
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD59c66a05cc4ac42ea5e59a396971e7942
SHA1237bd348c25797c50b0ba268aac6d030c2b412b8
SHA256e49fc271d5ff8d701a46e08f52cc8cf82c83dee084f8fcaccf06719ced5518a7
SHA512fa5d6eb1c20758021da4b3661cbf5135ff3f354505a77bd932f76deecc6f7fcf7b9be0dd8a1c1d080677ecdb4baa5a3e823a50a1153492725609af88b3db6efe