Analysis
-
max time kernel
120s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
06-02-2025 19:31
Behavioral task
behavioral1
Sample
UpdaterTag.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
UpdaterTag.dll
Resource
win10v2004-20250129-en
General
-
Target
UpdaterTag.dll
-
Size
72KB
-
MD5
bcdf04fb5b921b898389482400e39187
-
SHA1
f5284c8a66b7b5202547515fe34c3c5294620dd5
-
SHA256
6ca8800c6d3cd512e7ae72e1262408f7e00c1df0e50fd468b63d09c52835824e
-
SHA512
0b2100b57bb438c9aecdcb27f345614e89ba13a8271474b834af67afae6b316c4df93ad55ecf4b44b96e1c08a45ad6609313b84ef75af6530843a1ca7574c758
-
SSDEEP
1536:Tzh7eO6hHRCWqBfml4I6z5If8IM4Ny9KW:Tzh7WZIWWfmlAIkIM4YKW
Malware Config
Extracted
latrodectus
1.4
https://vivaforevew.com/test/
https://wersogkiwgow.com/test/
-
group
Omega
-
user_agent
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Tob 1.1)
Signatures
-
Detects Latrodectus 2 IoCs
Detects Latrodectus v1.4.
resource yara_rule behavioral1/files/0x00060000000193b5-1.dat family_latrodectus_1_4 behavioral1/memory/1604-6-0x000007FEFB3A0000-0x000007FEFB3B6000-memory.dmp family_latrodectus_1_4 -
Latrodectus family
-
Latrodectus loader
Latrodectus is a loader written in C++.
-
Deletes itself 1 IoCs
pid Process 1604 rundll32.exe -
Loads dropped DLL 8 IoCs
pid Process 2404 rundll32.exe 2404 rundll32.exe 2404 rundll32.exe 2404 rundll32.exe 2792 rundll32.exe 2792 rundll32.exe 2792 rundll32.exe 2792 rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1604 rundll32.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1604 wrote to memory of 2404 1604 rundll32.exe 31 PID 1604 wrote to memory of 2404 1604 rundll32.exe 31 PID 1604 wrote to memory of 2404 1604 rundll32.exe 31 PID 1604 wrote to memory of 1980 1604 rundll32.exe 32 PID 1604 wrote to memory of 1980 1604 rundll32.exe 32 PID 1604 wrote to memory of 1980 1604 rundll32.exe 32 PID 2844 wrote to memory of 2792 2844 taskeng.exe 34 PID 2844 wrote to memory of 2792 2844 taskeng.exe 34 PID 2844 wrote to memory of 2792 2844 taskeng.exe 34 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\UpdaterTag.dll,#11⤵
- Deletes itself
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Roaming\Custom_update\Update_501da957.dll", #12⤵
- Loads dropped DLL
PID:2404
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1604 -s 3082⤵PID:1980
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {6662B7B4-BDCA-43EF-8C60-B39B988E61E0} S-1-5-21-2703099537-420551529-3771253338-1000:XECUDNCD\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Roaming\Custom_update\Update_501da957.dll", #12⤵
- Loads dropped DLL
PID:2792
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5bcdf04fb5b921b898389482400e39187
SHA1f5284c8a66b7b5202547515fe34c3c5294620dd5
SHA2566ca8800c6d3cd512e7ae72e1262408f7e00c1df0e50fd468b63d09c52835824e
SHA5120b2100b57bb438c9aecdcb27f345614e89ba13a8271474b834af67afae6b316c4df93ad55ecf4b44b96e1c08a45ad6609313b84ef75af6530843a1ca7574c758