Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-02-2025 20:56
Static task
static1
Behavioral task
behavioral1
Sample
018150d42eef2a004821b1ae6242a1daaeb122786b6ba4c5437f45390ccb7cd1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
018150d42eef2a004821b1ae6242a1daaeb122786b6ba4c5437f45390ccb7cd1.exe
Resource
win10v2004-20250211-en
General
-
Target
018150d42eef2a004821b1ae6242a1daaeb122786b6ba4c5437f45390ccb7cd1.exe
-
Size
8.8MB
-
MD5
028903c61dc62459f4241124b7ce3e8d
-
SHA1
65beb2be5d0cac1f246f43dfe3bbfd2124919137
-
SHA256
018150d42eef2a004821b1ae6242a1daaeb122786b6ba4c5437f45390ccb7cd1
-
SHA512
fc616aad411d0dafdde18b2b9dd78978cfe3cb10fc7932928eed528b16a425d96f82b995cdb3c3258370c5a25402eaf5220e6d2e39a52fafb95ab68fd2dc5a00
-
SSDEEP
196608:7cC8osdUCWzpt8iSjiTF6pS7MO8Q6gLawggMNr2ieZMpbfn:7clFPWzpt8iSqopS7MO8Q6gLawOyiQM5
Malware Config
Extracted
latrodectus
1.4
https://piloferstaf.com/test/
https://ypredoninen.com/test/
-
group
Sigma
-
user_agent
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Tob 1.1)
Extracted
latrodectus
Signatures
-
Latrodectus family
-
Latrodectus loader
Latrodectus is a loader written in C++.
-
Deletes itself 1 IoCs
pid Process 2828 018150d42eef2a004821b1ae6242a1daaeb122786b6ba4c5437f45390ccb7cd1.exe -
Executes dropped EXE 2 IoCs
pid Process 2672 Update_974db905.exe 2604 Update_974db905.exe -
Loads dropped DLL 1 IoCs
pid Process 2828 018150d42eef2a004821b1ae6242a1daaeb122786b6ba4c5437f45390ccb7cd1.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2828 018150d42eef2a004821b1ae6242a1daaeb122786b6ba4c5437f45390ccb7cd1.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2828 wrote to memory of 2672 2828 018150d42eef2a004821b1ae6242a1daaeb122786b6ba4c5437f45390ccb7cd1.exe 30 PID 2828 wrote to memory of 2672 2828 018150d42eef2a004821b1ae6242a1daaeb122786b6ba4c5437f45390ccb7cd1.exe 30 PID 2828 wrote to memory of 2672 2828 018150d42eef2a004821b1ae6242a1daaeb122786b6ba4c5437f45390ccb7cd1.exe 30 PID 2940 wrote to memory of 2604 2940 taskeng.exe 32 PID 2940 wrote to memory of 2604 2940 taskeng.exe 32 PID 2940 wrote to memory of 2604 2940 taskeng.exe 32 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\018150d42eef2a004821b1ae6242a1daaeb122786b6ba4c5437f45390ccb7cd1.exe"C:\Users\Admin\AppData\Local\Temp\018150d42eef2a004821b1ae6242a1daaeb122786b6ba4c5437f45390ccb7cd1.exe"1⤵
- Deletes itself
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Users\Admin\AppData\Roaming\Custom_update\Update_974db905.exe"C:\Users\Admin\AppData\Roaming\Custom_update\Update_974db905.exe"2⤵
- Executes dropped EXE
PID:2672
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {A223DE30-579A-4012-B3EA-13594DEAD95C} S-1-5-21-312935884-697965778-3955649944-1000:MXQFNXLT\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Roaming\Custom_update\Update_974db905.exeC:\Users\Admin\AppData\Roaming\Custom_update\Update_974db905.exe2⤵
- Executes dropped EXE
PID:2604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.8MB
MD5028903c61dc62459f4241124b7ce3e8d
SHA165beb2be5d0cac1f246f43dfe3bbfd2124919137
SHA256018150d42eef2a004821b1ae6242a1daaeb122786b6ba4c5437f45390ccb7cd1
SHA512fc616aad411d0dafdde18b2b9dd78978cfe3cb10fc7932928eed528b16a425d96f82b995cdb3c3258370c5a25402eaf5220e6d2e39a52fafb95ab68fd2dc5a00