Analysis
-
max time kernel
948s -
max time network
1165s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26-09-2024 03:09
Static task
static1
Behavioral task
behavioral1
Sample
Run-Malware-1.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
Run-Malware-1.bat
Resource
win11-20240802-en
General
-
Target
Run-Malware-1.bat
-
Size
23B
-
MD5
4a6b32a72af0993cbba187c658cc7e6b
-
SHA1
20ec8989dcc5c9f66515e5940f45f98443b892e2
-
SHA256
abed1ef122ea30ebb41172a1e28688e4948b528f4a47909681bc7f54dd3cc17f
-
SHA512
f53c229a226a81bf125b4a8bfb2212eaf5e4d4745b5a77d510b049c6d05deacecd6460b6451369dfcb1954f8ccf0765994596daf2485c6210b33d95cb6b8748e
Malware Config
Signatures
-
Detects Latrodectus 6 IoCs
Detects Latrodectus v1.4.
Processes:
resource yara_rule behavioral1/memory/4276-0-0x000002077EED0000-0x000002077EEE6000-memory.dmp family_latrodectus_1_4 behavioral1/memory/4276-1-0x000002077EED0000-0x000002077EEE6000-memory.dmp family_latrodectus_1_4 behavioral1/memory/4276-3-0x000002077EED0000-0x000002077EEE6000-memory.dmp family_latrodectus_1_4 behavioral1/memory/4276-6-0x000002077EED0000-0x000002077EEE6000-memory.dmp family_latrodectus_1_4 behavioral1/memory/3476-9-0x000002A8D7C40000-0x000002A8D7C56000-memory.dmp family_latrodectus_1_4 behavioral1/memory/3476-8-0x000002A8D7C40000-0x000002A8D7C56000-memory.dmp family_latrodectus_1_4 -
Latrodectus loader
Latrodectus is a loader written in C++.
-
Blocklisted process makes network request 4 IoCs
Processes:
rundll32.exeflow pid process 46 3476 rundll32.exe 47 3476 rundll32.exe 54 3476 rundll32.exe 55 3476 rundll32.exe -
Loads dropped DLL 3 IoCs
Processes:
rundll32.exerundll32.exerundll32.exepid process 3476 rundll32.exe 1484 rundll32.exe 3552 rundll32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 3572 wrote to memory of 4276 3572 cmd.exe rundll32.exe PID 3572 wrote to memory of 4276 3572 cmd.exe rundll32.exe PID 4276 wrote to memory of 3476 4276 rundll32.exe rundll32.exe PID 4276 wrote to memory of 3476 4276 rundll32.exe rundll32.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Run-Malware-1.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Windows\system32\rundll32.exerundll32.exe vim.dll,#42⤵
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Roaming\Custom_update\Update_3a30e489.dll", #43⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:3476
-
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Roaming\Custom_update\Update_3a30e489.dll", #41⤵
- Loads dropped DLL
PID:1484
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Roaming\Custom_update\Update_3a30e489.dll", #41⤵
- Loads dropped DLL
PID:3552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD59346378bbb68e22940e3f49b1570ecf3
SHA1d9fd4d0f6f55bdf2ee8004e73eacb8663508a680
SHA256e194627c6eab59f38a73e97054a78f8859c5d6325bb4c04c10ea668d931adedc
SHA5120f80fff027e58ed37bd4b0d94b0d6c3074f9e3618840d9826fdb097c2af7388a9a3b49a339bb5d9753fe542b176eb06c6c599b223d25a32c4154daa631601a34