Analysis
-
max time kernel
34s -
max time network
35s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
submitted
26-12-2024 22:12
Behavioral task
behavioral1
Sample
Latrodectus/3be9e476da2e99adbc49591cbc94b4d9/payload/payload.exe
Resource
win10v2004-20241007-en
General
-
Target
Latrodectus/3be9e476da2e99adbc49591cbc94b4d9/payload/payload.exe
Malware Config
Extracted
latrodectus
1.0
https://workspacin.cloud/live/
https://qaliharsit.tech/live/
-
group
Electrol
-
user_agent
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Tob 1.1)
Signatures
-
Latrodectus family
-
Latrodectus loader
Latrodectus is a loader written in C++.
-
Deletes itself 1 IoCs
pid Process 1724 payload.exe -
Executes dropped EXE 1 IoCs
pid Process 5072 Update_8eb7dc11.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1724 payload.exe 1724 payload.exe 1724 payload.exe 1724 payload.exe 5072 Update_8eb7dc11.exe 5072 Update_8eb7dc11.exe 5072 Update_8eb7dc11.exe 5072 Update_8eb7dc11.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1724 payload.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1724 wrote to memory of 5072 1724 payload.exe 85 PID 1724 wrote to memory of 5072 1724 payload.exe 85 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Latrodectus\3be9e476da2e99adbc49591cbc94b4d9\payload\payload.exe"C:\Users\Admin\AppData\Local\Temp\Latrodectus\3be9e476da2e99adbc49591cbc94b4d9\payload\payload.exe"1⤵
- Deletes itself
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Roaming\Custom_update\Update_8eb7dc11.exe"C:\Users\Admin\AppData\Roaming\Custom_update\Update_8eb7dc11.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:5072
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5521b30198e623b6fde8522d5cad39bac
SHA183b6df3883c7edd33ad3211ca44b67cd876e82e5
SHA256e3362e506873d4128939b059190292193999da14687c2418be2742d623dd9ecb
SHA5126ee6078b969f44e5150e711637ca9f0b40d359205b4b7b4cf50ff3e1ee1ead4813777b7cf7b4b3497891feee83681cef0d82a3061cb58cedc66223d71aaba5b8