Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
submitted
18-09-2024 22:35
Behavioral task
behavioral1
Sample
mal_dump.dll
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
mal_dump.dll
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
mal_dump.dll
Resource
win10v2004-20240802-en
General
-
Target
mal_dump.dll
-
Size
72KB
-
MD5
827bf3ffc5646444ee770de24008a5fc
-
SHA1
e66f50f2c9792b8ecc9317f74d51c98380d7df36
-
SHA256
ba9b2c8a37a1a1d45713d26578a8ab0abc5b439581faa3d770bcfe441c12b8f0
-
SHA512
57b0e97e15833b10e11a521dedeec5dfaa3d5dee12d6455e82ba453e7b494a01ab8ad5cad7ca50f4c1e422c0e14868b75cadf588f32b556362c4f90008309a3a
-
SSDEEP
1536:Izhn3OA/88fZVS18GpH50f88d0cTJ5Kga:Izhnt/vVS18zk8dDba
Malware Config
Extracted
latrodectus
https://isomicrotich.com/test/
https://rilomenifis.com/test/
Signatures
-
Detects Latrodectus 2 IoCs
Detects Latrodectus v1.4.
resource yara_rule behavioral2/files/0x0009000000015e4f-1.dat family_latrodectus_1_4 behavioral2/memory/1152-6-0x000007FEFAAB0000-0x000007FEFAAC6000-memory.dmp family_latrodectus_1_4 -
Latrodectus family
-
Latrodectus loader
Latrodectus is a loader written in C++.
-
Deletes itself 1 IoCs
pid Process 1152 rundll32.exe -
Loads dropped DLL 4 IoCs
pid Process 1232 rundll32.exe 1232 rundll32.exe 1232 rundll32.exe 1232 rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1152 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1152 wrote to memory of 1232 1152 rundll32.exe 31 PID 1152 wrote to memory of 1232 1152 rundll32.exe 31 PID 1152 wrote to memory of 1232 1152 rundll32.exe 31 PID 1152 wrote to memory of 2724 1152 rundll32.exe 32 PID 1152 wrote to memory of 2724 1152 rundll32.exe 32 PID 1152 wrote to memory of 2724 1152 rundll32.exe 32 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\mal_dump.dll,#11⤵
- Deletes itself
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Roaming\Custom_update\Update_125fc62e.dll", #12⤵
- Loads dropped DLL
PID:1232
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1152 -s 3162⤵PID:2724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5827bf3ffc5646444ee770de24008a5fc
SHA1e66f50f2c9792b8ecc9317f74d51c98380d7df36
SHA256ba9b2c8a37a1a1d45713d26578a8ab0abc5b439581faa3d770bcfe441c12b8f0
SHA51257b0e97e15833b10e11a521dedeec5dfaa3d5dee12d6455e82ba453e7b494a01ab8ad5cad7ca50f4c1e422c0e14868b75cadf588f32b556362c4f90008309a3a