Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-09-2024 02:05
Behavioral task
behavioral1
Sample
9877e439ce0efccc9140ed91405e0fdbacfcbb5dee6b7ddb1bfd3c1dc3be333f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9877e439ce0efccc9140ed91405e0fdbacfcbb5dee6b7ddb1bfd3c1dc3be333f.exe
Resource
win10v2004-20240802-en
General
-
Target
9877e439ce0efccc9140ed91405e0fdbacfcbb5dee6b7ddb1bfd3c1dc3be333f.exe
-
Size
74KB
-
MD5
fd506e6d4c2e1e3335d3802a38cd21b6
-
SHA1
2ffc078104f87b8d6614d53ca0b263228eff44e0
-
SHA256
9877e439ce0efccc9140ed91405e0fdbacfcbb5dee6b7ddb1bfd3c1dc3be333f
-
SHA512
0565d57bfa3f7aa57c5067e6794adebc0f72b5c891b26821f6fab8a9e02b9aa100e6c334713b578351cc197aff14e34638ad01345cb2470b89b53452e8e5a476
-
SSDEEP
768:3RKz7vRTYSRKrm4mODOJWFgG5nB0GXiuwUKdq3kz40sKjTiqFf8mjop4EejV:3RKzhgrVmOikFzpXiq3mniOf8mjo8
Malware Config
Signatures
-
Detects Latrodectus 2 IoCs
Detects Latrodectus v1.4.
resource yara_rule behavioral1/files/0x0008000000016d4f-1.dat family_latrodectus_1_4 behavioral1/memory/1480-8-0x0000000000180000-0x000000000019500C-memory.dmp family_latrodectus_1_4 -
Latrodectus loader
Latrodectus is a loader written in C++.
-
Deletes itself 1 IoCs
pid Process 1480 9877e439ce0efccc9140ed91405e0fdbacfcbb5dee6b7ddb1bfd3c1dc3be333f.exe -
Executes dropped EXE 2 IoCs
pid Process 3004 Update_f2c1e1b3.exe 2652 Update_f2c1e1b3.exe -
Loads dropped DLL 3 IoCs
pid Process 1480 9877e439ce0efccc9140ed91405e0fdbacfcbb5dee6b7ddb1bfd3c1dc3be333f.exe 1480 9877e439ce0efccc9140ed91405e0fdbacfcbb5dee6b7ddb1bfd3c1dc3be333f.exe 2628 taskeng.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1480 9877e439ce0efccc9140ed91405e0fdbacfcbb5dee6b7ddb1bfd3c1dc3be333f.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1480 wrote to memory of 3004 1480 9877e439ce0efccc9140ed91405e0fdbacfcbb5dee6b7ddb1bfd3c1dc3be333f.exe 30 PID 1480 wrote to memory of 3004 1480 9877e439ce0efccc9140ed91405e0fdbacfcbb5dee6b7ddb1bfd3c1dc3be333f.exe 30 PID 1480 wrote to memory of 3004 1480 9877e439ce0efccc9140ed91405e0fdbacfcbb5dee6b7ddb1bfd3c1dc3be333f.exe 30 PID 1480 wrote to memory of 1884 1480 9877e439ce0efccc9140ed91405e0fdbacfcbb5dee6b7ddb1bfd3c1dc3be333f.exe 31 PID 1480 wrote to memory of 1884 1480 9877e439ce0efccc9140ed91405e0fdbacfcbb5dee6b7ddb1bfd3c1dc3be333f.exe 31 PID 1480 wrote to memory of 1884 1480 9877e439ce0efccc9140ed91405e0fdbacfcbb5dee6b7ddb1bfd3c1dc3be333f.exe 31 PID 2628 wrote to memory of 2652 2628 taskeng.exe 34 PID 2628 wrote to memory of 2652 2628 taskeng.exe 34 PID 2628 wrote to memory of 2652 2628 taskeng.exe 34 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\9877e439ce0efccc9140ed91405e0fdbacfcbb5dee6b7ddb1bfd3c1dc3be333f.exe"C:\Users\Admin\AppData\Local\Temp\9877e439ce0efccc9140ed91405e0fdbacfcbb5dee6b7ddb1bfd3c1dc3be333f.exe"1⤵
- Deletes itself
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Roaming\Custom_update\Update_f2c1e1b3.exe"C:\Users\Admin\AppData\Roaming\Custom_update\Update_f2c1e1b3.exe"2⤵
- Executes dropped EXE
PID:3004
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1480 -s 2562⤵PID:1884
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {24FEC3CE-A4FD-40F0-886F-0D1A9DAF86A4} S-1-5-21-1488793075-819845221-1497111674-1000:UPNECVIU\Admin:Interactive:[1]1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Roaming\Custom_update\Update_f2c1e1b3.exeC:\Users\Admin\AppData\Roaming\Custom_update\Update_f2c1e1b3.exe2⤵
- Executes dropped EXE
PID:2652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD5fd506e6d4c2e1e3335d3802a38cd21b6
SHA12ffc078104f87b8d6614d53ca0b263228eff44e0
SHA2569877e439ce0efccc9140ed91405e0fdbacfcbb5dee6b7ddb1bfd3c1dc3be333f
SHA5120565d57bfa3f7aa57c5067e6794adebc0f72b5c891b26821f6fab8a9e02b9aa100e6c334713b578351cc197aff14e34638ad01345cb2470b89b53452e8e5a476