Analysis
-
max time kernel
30s -
max time network
29s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-09-2024 08:15
Behavioral task
behavioral1
Sample
a459ce4bfb5d649410231bd4776c194b0891c8c5328bafc22184fe3111c0b3e7.exe
Resource
win10v2004-20240802-en
General
-
Target
a459ce4bfb5d649410231bd4776c194b0891c8c5328bafc22184fe3111c0b3e7.exe
-
Size
60KB
-
MD5
e915134e199c81831b6c7425b460625b
-
SHA1
717d58c54240c7ca5a86337f1c0130e02b908304
-
SHA256
a459ce4bfb5d649410231bd4776c194b0891c8c5328bafc22184fe3111c0b3e7
-
SHA512
54fa3d45755460c0f2e2aeb7d7efa8e3ec6840cab897cc35b6728fdd6ba2412bd240224249483d872808a11b52096044c9870e21353effbc05698f1137e74d6d
-
SSDEEP
768:Kn3KIOWOiLVYVHSXgGpu/aMxuyr3HT+WVXjS6c54GzzNUTf8eg/G:K39OiJYVQl9k3H9Xyuszwf8eg/G
Malware Config
Extracted
latrodectus
https://carflotyup.com/live/
https://worlpquano.com/live/
Signatures
-
Latrodectus loader
Latrodectus is a loader written in C++.
-
Deletes itself 1 IoCs
pid Process 2660 a459ce4bfb5d649410231bd4776c194b0891c8c5328bafc22184fe3111c0b3e7.exe -
Executes dropped EXE 2 IoCs
pid Process 2644 confrontation_6c821f5.exe 5016 confrontation_6c821f5.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2660 a459ce4bfb5d649410231bd4776c194b0891c8c5328bafc22184fe3111c0b3e7.exe 2660 a459ce4bfb5d649410231bd4776c194b0891c8c5328bafc22184fe3111c0b3e7.exe 2660 a459ce4bfb5d649410231bd4776c194b0891c8c5328bafc22184fe3111c0b3e7.exe 2660 a459ce4bfb5d649410231bd4776c194b0891c8c5328bafc22184fe3111c0b3e7.exe 2644 confrontation_6c821f5.exe 2644 confrontation_6c821f5.exe 2644 confrontation_6c821f5.exe 2644 confrontation_6c821f5.exe 5016 confrontation_6c821f5.exe 5016 confrontation_6c821f5.exe 5016 confrontation_6c821f5.exe 5016 confrontation_6c821f5.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2660 a459ce4bfb5d649410231bd4776c194b0891c8c5328bafc22184fe3111c0b3e7.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2660 wrote to memory of 2644 2660 a459ce4bfb5d649410231bd4776c194b0891c8c5328bafc22184fe3111c0b3e7.exe 83 PID 2660 wrote to memory of 2644 2660 a459ce4bfb5d649410231bd4776c194b0891c8c5328bafc22184fe3111c0b3e7.exe 83 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a459ce4bfb5d649410231bd4776c194b0891c8c5328bafc22184fe3111c0b3e7.exe"C:\Users\Admin\AppData\Local\Temp\a459ce4bfb5d649410231bd4776c194b0891c8c5328bafc22184fe3111c0b3e7.exe"1⤵
- Deletes itself
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Roaming\falsify_steward\confrontation_6c821f5.exe"C:\Users\Admin\AppData\Roaming\falsify_steward\confrontation_6c821f5.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2644
-
-
C:\Users\Admin\AppData\Roaming\falsify_steward\confrontation_6c821f5.exeC:\Users\Admin\AppData\Roaming\falsify_steward\confrontation_6c821f5.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:5016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5e915134e199c81831b6c7425b460625b
SHA1717d58c54240c7ca5a86337f1c0130e02b908304
SHA256a459ce4bfb5d649410231bd4776c194b0891c8c5328bafc22184fe3111c0b3e7
SHA51254fa3d45755460c0f2e2aeb7d7efa8e3ec6840cab897cc35b6728fdd6ba2412bd240224249483d872808a11b52096044c9870e21353effbc05698f1137e74d6d