Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13-11-2024 17:19

General

  • Target

    medk.msi

  • Size

    2.0MB

  • MD5

    8cb04bf931a19fa0ae1bd7235180dd4a

  • SHA1

    dfc980a827dbde294ae9fa6e63545d1d57344e96

  • SHA256

    dfff1a07429ff9585f3dab9c78b501174e7c326e1fb95c5234368071b5426768

  • SHA512

    58f1661d689aaa9391f04e086db490693f83b70e068ca10b20cff6f87979a8804aa9f054ac961af06c4b7b17fd88b1912774b2eb3d16b9df8e7a4ed9bb3c0a29

  • SSDEEP

    49152:F943YhW8zBQSc0ZnSKBZKumZr7Apj3Y+7jHplNa:6YY0Zn3K/Al3dXHpra

Malware Config

Extracted

Family

latrodectus

C2

https://rolefenik.com/test/

https://ergiholim.com/test/

Signatures

  • Detects Latrodectus 3 IoCs

    Detects Latrodectus v1.4.

  • Latrodectus family
  • Latrodectus loader

    Latrodectus is a loader written in C++.

  • Blocklisted process makes network request 6 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 13 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 11 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 43 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1212
      • C:\Windows\system32\msiexec.exe
        msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\medk.msi
        2⤵
        • Enumerates connected drives
        • Event Triggered Execution: Installer Packages
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:1884
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\SysWOW64\rundll32.exe" C:\Users\Admin\AppData\Roaming\tab.dll, Object
        2⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2860
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\SysWOW64\rundll32.exe" C:\Users\Admin\AppData\Roaming\tab.dll, Object
          3⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2336
    • C:\Windows\system32\msiexec.exe
      C:\Windows\system32\msiexec.exe /V
      1⤵
      • Enumerates connected drives
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2444
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 575389D48199E917FCCF76C4A4548C85
        2⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:2988
      • C:\Windows\Installer\MSI7573.tmp
        "C:\Windows\Installer\MSI7573.tmp" /DontWait C:/Windows/SysWOW64/rundll32.exe C:\Users\Admin\AppData\Roaming\tab.dll, Object
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1116
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2196
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000004CC" "00000000000005D4"
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:1676

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\f767312.rbs

      Filesize

      1KB

      MD5

      0763c08bae8d12bdf3f1eb07db05660e

      SHA1

      c73edab6755ba4a7d645ff514723014f89d3b412

      SHA256

      25fbbb29b0c25c6c3e0d85c69668059e61e3065a0db53830e8943414a22d0707

      SHA512

      2c35a2ded8015a14abcc588f966edfc45dd98e46a90a6584f64e17eaf227408d55726505946f41fcacdcdc2b38a29b92feb52a45a023ce9feeec95be031ae19b

    • C:\Users\Admin\AppData\Roaming\tab.dll

      Filesize

      1.6MB

      MD5

      4f4a164b5f9ef20be601531a727179a2

      SHA1

      1601622dc7caef28ce413e1d73b4d4596aabfc50

      SHA256

      0f23855e56eb6ec760717be43280eeeeaec1aeef939f9ae6a41daf1b8e3bd306

      SHA512

      de09d9f0048a19c7efa7ffae01f58c41e619e09e6ec56e4b818b58846672a0772c58913ba5ad4c86b746d91399894a21bf51225c1737a0652b1c85ffa3307030

    • C:\Windows\Installer\MSI734C.tmp

      Filesize

      436KB

      MD5

      475d20c0ea477a35660e3f67ecf0a1df

      SHA1

      67340739f51e1134ae8f0ffc5ae9dd710e8e3a08

      SHA256

      426e6cf199a8268e8a7763ec3a4dd7add982b28c51d89ebea90ca792cbae14dd

      SHA512

      99525aaab2ab608134b5d66b5313e7fc3c2e2877395c5c171897d7a6c66efb26b606de1a4cb01118c2738ea4b6542e4eb4983e631231b3f340bf85e509a9589e

    • C:\Windows\Installer\MSI7573.tmp

      Filesize

      389KB

      MD5

      b9545ed17695a32face8c3408a6a3553

      SHA1

      f6c31c9cd832ae2aebcd88e7b2fa6803ae93fc83

      SHA256

      1e0e63b446eecf6c9781c7d1cae1f46a3bb31654a70612f71f31538fb4f4729a

      SHA512

      f6d6dc40dcba5ff091452d7cc257427dcb7ce2a21816b4fec2ee249e63246b64667f5c4095220623533243103876433ef8c12c9b612c0e95fdfffe41d1504e04

    • memory/1116-38-0x00000000002A0000-0x00000000002A2000-memory.dmp

      Filesize

      8KB

    • memory/1212-79-0x0000000002F80000-0x0000000002F95000-memory.dmp

      Filesize

      84KB

    • memory/1212-80-0x0000000002F80000-0x0000000002F95000-memory.dmp

      Filesize

      84KB

    • memory/1212-81-0x0000000002F80000-0x0000000002F95000-memory.dmp

      Filesize

      84KB

    • memory/2336-75-0x000007FFFFF60000-0x000007FFFFF61000-memory.dmp

      Filesize

      4KB

    • memory/2336-77-0x000007FFFFF40000-0x000007FFFFF41000-memory.dmp

      Filesize

      4KB

    • memory/2336-76-0x000007FFFFF50000-0x000007FFFFF51000-memory.dmp

      Filesize

      4KB

    • memory/2336-74-0x000007FFFFF70000-0x000007FFFFF71000-memory.dmp

      Filesize

      4KB

    • memory/2336-73-0x000007FFFFF80000-0x000007FFFFF95000-memory.dmp

      Filesize

      84KB

    • memory/2336-72-0x000007FFFFFA0000-0x000007FFFFFA1000-memory.dmp

      Filesize

      4KB

    • memory/2336-48-0x0000000001E10000-0x0000000001E5C000-memory.dmp

      Filesize

      304KB

    • memory/2336-84-0x0000000001E10000-0x0000000001E5C000-memory.dmp

      Filesize

      304KB