Analysis

  • max time kernel
    433s
  • max time network
    416s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-01-2025 17:46

General

  • Target

    FixSfp.exe

  • Size

    1.1MB

  • MD5

    c4738b7ee108e1cfd0619cf740f458e0

  • SHA1

    01c40a43bdf3bb2edfa4b9aa039439a47e9edc6d

  • SHA256

    6ada7b6d8b6ddf3ebe61d3bf19e70bb5a2a9f22d871d217b1ade7c40c3aac088

  • SHA512

    4c4a68739593e02c3997905ab10e7492b64f288a39211a81797cadaf2432aa90f94874e83520bbb149810e04fdc0e401eac30d10402b5c5822887f3b9cbbf2cb

  • SSDEEP

    24576:xFdIR2uJMaFHaNfZq8gGl6kyhyjIVQGu7DTYHeNYiDXnYgU8:xko6MaFPE6kRjIVQG4Ds+aJm

Score
10/10

Malware Config

Extracted

Family

latrodectus

Version

1.4

C2

https://piloferstaf.com/test/

https://ypredoninen.com/test/

Attributes
  • group

    Sigma

  • user_agent

    Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Tob 1.1)

aes.hex

Extracted

Family

latrodectus

aes.hex

Signatures

  • Latrodectus family
  • Latrodectus loader

    Latrodectus is a loader written in C++.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\FixSfp.exe
    "C:\Users\Admin\AppData\Local\Temp\FixSfp.exe"
    1⤵
    • Deletes itself
    • Modifies system certificate store
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2372
    • C:\Users\Admin\AppData\Roaming\Custom_update\Update_463300b.exe
      "C:\Users\Admin\AppData\Roaming\Custom_update\Update_463300b.exe"
      2⤵
      • Executes dropped EXE
      PID:3976
  • C:\Users\Admin\AppData\Roaming\Custom_update\Update_463300b.exe
    C:\Users\Admin\AppData\Roaming\Custom_update\Update_463300b.exe
    1⤵
    • Executes dropped EXE
    PID:1864

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Custom_update\Update_463300b.exe

    Filesize

    1.1MB

    MD5

    c4738b7ee108e1cfd0619cf740f458e0

    SHA1

    01c40a43bdf3bb2edfa4b9aa039439a47e9edc6d

    SHA256

    6ada7b6d8b6ddf3ebe61d3bf19e70bb5a2a9f22d871d217b1ade7c40c3aac088

    SHA512

    4c4a68739593e02c3997905ab10e7492b64f288a39211a81797cadaf2432aa90f94874e83520bbb149810e04fdc0e401eac30d10402b5c5822887f3b9cbbf2cb

  • memory/2372-1-0x00007FFE985D0000-0x00007FFE985E0000-memory.dmp

    Filesize

    64KB

  • memory/2372-0-0x00007FF6F9CE0000-0x00007FF6F9CF0000-memory.dmp

    Filesize

    64KB

  • memory/2372-2-0x0000000140000000-0x0000000141CB2000-memory.dmp

    Filesize

    28.7MB

  • memory/2372-6-0x0000016709E40000-0x000001670BAF0000-memory.dmp

    Filesize

    28.7MB

  • memory/2372-11-0x00007FF739CA0000-0x00007FF739DC1000-memory.dmp

    Filesize

    1.1MB

  • memory/3976-15-0x00007FFE985D0000-0x00007FFE985E0000-memory.dmp

    Filesize

    64KB

  • memory/3976-14-0x00007FF76CAC0000-0x00007FF76CAD0000-memory.dmp

    Filesize

    64KB