Analysis
-
max time kernel
92s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
submitted
17-09-2024 22:54
Static task
static1
Behavioral task
behavioral1
Sample
rozelin.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
rozelin.dll
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
rozelin.dll
Resource
win10v2004-20240802-en
General
-
Target
rozelin.dll
-
Size
1.5MB
-
MD5
f9bb8819674b780198ec05761a3ed0d6
-
SHA1
4c61542d76a0107eb80a950c33cd9bd5029a9b32
-
SHA256
3af3c1b6c72f09371c9975eb0914c5b187ba363c0cddf8164d14a0b7c1fcb5dc
-
SHA512
7b636446567b453c37a28b904d9f716a2aaff54676270760702995efdb521a10ae5f1a9254529eadc092b678a3b99e59efaec444f7f923d8e213298ae48f4fdc
-
SSDEEP
24576:aoAIjF2weVvd7+StIkabYLhRCuNHd56L4ZzFYMczX5UHuMH:cIjQwYvd7+StIkss/CY304NFYMypUH
Malware Config
Extracted
latrodectus
https://isomicrotich.com/test/
https://rilomenifis.com/test/
Signatures
-
Detects Latrodectus 6 IoCs
Detects Latrodectus v1.4.
resource yara_rule behavioral3/memory/4724-0-0x00000192E2A70000-0x00000192E2A86000-memory.dmp family_latrodectus_1_4 behavioral3/memory/4724-1-0x00000192E2A70000-0x00000192E2A86000-memory.dmp family_latrodectus_1_4 behavioral3/memory/4724-3-0x00000192E2A70000-0x00000192E2A86000-memory.dmp family_latrodectus_1_4 behavioral3/memory/4724-6-0x00000192E2A70000-0x00000192E2A86000-memory.dmp family_latrodectus_1_4 behavioral3/memory/1260-8-0x00000245C0CD0000-0x00000245C0CE6000-memory.dmp family_latrodectus_1_4 behavioral3/memory/1260-9-0x00000245C0CD0000-0x00000245C0CE6000-memory.dmp family_latrodectus_1_4 -
Latrodectus family
-
Latrodectus loader
Latrodectus is a loader written in C++.
-
Deletes itself 1 IoCs
pid Process 4724 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 1260 rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4724 rundll32.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4724 wrote to memory of 1260 4724 rundll32.exe 84 PID 4724 wrote to memory of 1260 4724 rundll32.exe 84 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\rozelin.dll,#11⤵
- Deletes itself
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Roaming\Custom_update\Update_71112850.dll", #12⤵
- Loads dropped DLL
PID:1260
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5f9bb8819674b780198ec05761a3ed0d6
SHA14c61542d76a0107eb80a950c33cd9bd5029a9b32
SHA2563af3c1b6c72f09371c9975eb0914c5b187ba363c0cddf8164d14a0b7c1fcb5dc
SHA5127b636446567b453c37a28b904d9f716a2aaff54676270760702995efdb521a10ae5f1a9254529eadc092b678a3b99e59efaec444f7f923d8e213298ae48f4fdc