Analysis
-
max time kernel
139s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
07-02-2025 05:30
Static task
static1
Behavioral task
behavioral1
Sample
b85e22327b17da698f72e105d359f5873a8f2f4db38c6d76ec261df841288e74.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
b85e22327b17da698f72e105d359f5873a8f2f4db38c6d76ec261df841288e74.exe
Resource
win10v2004-20250129-en
General
-
Target
b85e22327b17da698f72e105d359f5873a8f2f4db38c6d76ec261df841288e74.exe
-
Size
333KB
-
MD5
a47952966449b8126698b9a1e98c39ff
-
SHA1
89cddb3326fecfa8e5f159c1dc1d0e16094731ad
-
SHA256
b85e22327b17da698f72e105d359f5873a8f2f4db38c6d76ec261df841288e74
-
SHA512
d486287545c2cbe5ec2c449ba26468edbdf095645c9f47481c3b336696ec53e12b6aff1d4ef7ba2880c400b7799283b41370b9caa448355443ef73383e16bee2
-
SSDEEP
6144:XWc/eO+AJdZU44m3q08bLUk8H6/Dsdp3DDEd3uOiq1wrkL:XWcYAJdZX4m3qp8H6/Dsz3DDRX4
Malware Config
Extracted
latrodectus
1.4
https://apworsindos.com/test/
https://reminasolirol.com/test/
-
group
Mimikast
-
user_agent
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Tob 1.1)
Signatures
-
Latrodectus family
-
Latrodectus loader
Latrodectus is a loader written in C++.
-
Downloads MZ/PE file 1 IoCs
flow pid Process 44 4156 b85e22327b17da698f72e105d359f5873a8f2f4db38c6d76ec261df841288e74.exe -
Executes dropped EXE 1 IoCs
pid Process 2704 ppx.exe -
Loads dropped DLL 3 IoCs
pid Process 1104 rundll32.exe 4448 rundll32.exe 1988 rundll32.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b85e22327b17da698f72e105d359f5873a8f2f4db38c6d76ec261df841288e74.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Software\Microsoft\Internet Explorer\TypedURLs ppx.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 4156 b85e22327b17da698f72e105d359f5873a8f2f4db38c6d76ec261df841288e74.exe 4156 b85e22327b17da698f72e105d359f5873a8f2f4db38c6d76ec261df841288e74.exe 4156 b85e22327b17da698f72e105d359f5873a8f2f4db38c6d76ec261df841288e74.exe 4156 b85e22327b17da698f72e105d359f5873a8f2f4db38c6d76ec261df841288e74.exe 2704 ppx.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4156 wrote to memory of 2704 4156 b85e22327b17da698f72e105d359f5873a8f2f4db38c6d76ec261df841288e74.exe 97 PID 4156 wrote to memory of 2704 4156 b85e22327b17da698f72e105d359f5873a8f2f4db38c6d76ec261df841288e74.exe 97 PID 4156 wrote to memory of 1104 4156 b85e22327b17da698f72e105d359f5873a8f2f4db38c6d76ec261df841288e74.exe 99 PID 4156 wrote to memory of 1104 4156 b85e22327b17da698f72e105d359f5873a8f2f4db38c6d76ec261df841288e74.exe 99 PID 4156 wrote to memory of 1104 4156 b85e22327b17da698f72e105d359f5873a8f2f4db38c6d76ec261df841288e74.exe 99 PID 1104 wrote to memory of 4448 1104 rundll32.exe 100 PID 1104 wrote to memory of 4448 1104 rundll32.exe 100 PID 4448 wrote to memory of 1988 4448 rundll32.exe 101 PID 4448 wrote to memory of 1988 4448 rundll32.exe 101 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b85e22327b17da698f72e105d359f5873a8f2f4db38c6d76ec261df841288e74.exe"C:\Users\Admin\AppData\Local\Temp\b85e22327b17da698f72e105d359f5873a8f2f4db38c6d76ec261df841288e74.exe"1⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Users\Admin\AppData\Local\Temp\4QJZX7AN4UJ6VQF6BCXJRWBHLA47WK0\ppx.exe"C:\Users\Admin\AppData\Local\Temp\4QJZX7AN4UJ6VQF6BCXJRWBHLA47WK0\ppx.exe"2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2704
-
-
C:\Windows\SysWOW64\rundll32.exerundll32 "C:\Users\Admin\AppData\Local\Temp\FXOLK7YVF9H0PZORI.dll",Object2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\system32\rundll32.exerundll32 "C:\Users\Admin\AppData\Local\Temp\FXOLK7YVF9H0PZORI.dll",Object3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Roaming\Custom_update\Update_5651c00.dll", Object4⤵
- Loads dropped DLL
PID:1988
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
7.0MB
MD52434bc336fd6e41859048c256fe350ce
SHA1a8941601a1fcae16029065a641392d25b6c65609
SHA256e6ec04613f05afc4f940aaeb058bba158c4910b6b0ffdefc8286b17f3988bd59
SHA512a67620d422ae374a305088958fe6176fce53ed0db9387acd226029fcb9084227e42b1235cbc138367816e9b278aa35fd6e85d3fdb6eb90fd86885e9cc52e3c29
-
Filesize
2.2MB
MD59d62b08fad74162f2f41f98fe5150047
SHA124ea8d164cc7ee120b928f37eb4fabb82d155a55
SHA25673d7600998d2c273c388fd50be8d33d12bb4161fae0e7410af513dc19bc8804b
SHA512eb86af928a70d34c0f9847c5c10029a906e71bf9b9dbcefba4b8424719630d572a8aaa716534e700381a3ba513463416babd024b1955d6e766c6c90e2bea2b97