Analysis
-
max time kernel
1181s -
max time network
1142s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
26-09-2024 03:09
Static task
static1
Behavioral task
behavioral1
Sample
Run-Malware-1.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
Run-Malware-1.bat
Resource
win11-20240802-en
General
-
Target
Run-Malware-1.bat
-
Size
23B
-
MD5
4a6b32a72af0993cbba187c658cc7e6b
-
SHA1
20ec8989dcc5c9f66515e5940f45f98443b892e2
-
SHA256
abed1ef122ea30ebb41172a1e28688e4948b528f4a47909681bc7f54dd3cc17f
-
SHA512
f53c229a226a81bf125b4a8bfb2212eaf5e4d4745b5a77d510b049c6d05deacecd6460b6451369dfcb1954f8ccf0765994596daf2485c6210b33d95cb6b8748e
Malware Config
Signatures
-
Detects Latrodectus 6 IoCs
Detects Latrodectus v1.4.
Processes:
resource yara_rule behavioral2/memory/2324-0-0x00000251B7890000-0x00000251B78A6000-memory.dmp family_latrodectus_1_4 behavioral2/memory/2324-1-0x00000251B7890000-0x00000251B78A6000-memory.dmp family_latrodectus_1_4 behavioral2/memory/2324-2-0x00000251B7890000-0x00000251B78A6000-memory.dmp family_latrodectus_1_4 behavioral2/memory/2324-6-0x00000251B7890000-0x00000251B78A6000-memory.dmp family_latrodectus_1_4 behavioral2/memory/880-8-0x0000012011AA0000-0x0000012011AB6000-memory.dmp family_latrodectus_1_4 behavioral2/memory/880-9-0x0000012011AA0000-0x0000012011AB6000-memory.dmp family_latrodectus_1_4 -
Latrodectus loader
Latrodectus is a loader written in C++.
-
Blocklisted process makes network request 4 IoCs
Processes:
rundll32.exeflow pid process 7 880 rundll32.exe 8 880 rundll32.exe 11 880 rundll32.exe 12 880 rundll32.exe -
Loads dropped DLL 3 IoCs
Processes:
rundll32.exerundll32.exerundll32.exepid process 880 rundll32.exe 2112 rundll32.exe 436 rundll32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 3124 wrote to memory of 2324 3124 cmd.exe rundll32.exe PID 3124 wrote to memory of 2324 3124 cmd.exe rundll32.exe PID 2324 wrote to memory of 880 2324 rundll32.exe rundll32.exe PID 2324 wrote to memory of 880 2324 rundll32.exe rundll32.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Run-Malware-1.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Windows\system32\rundll32.exerundll32.exe vim.dll,#42⤵
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Roaming\Custom_update\Update_78aa1985.dll", #43⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:880
-
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Roaming\Custom_update\Update_78aa1985.dll", #41⤵
- Loads dropped DLL
PID:2112
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Roaming\Custom_update\Update_78aa1985.dll", #41⤵
- Loads dropped DLL
PID:436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD59346378bbb68e22940e3f49b1570ecf3
SHA1d9fd4d0f6f55bdf2ee8004e73eacb8663508a680
SHA256e194627c6eab59f38a73e97054a78f8859c5d6325bb4c04c10ea668d931adedc
SHA5120f80fff027e58ed37bd4b0d94b0d6c3074f9e3618840d9826fdb097c2af7388a9a3b49a339bb5d9753fe542b176eb06c6c599b223d25a32c4154daa631601a34