Analysis

  • max time kernel
    242s
  • max time network
    261s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03/03/2025, 19:11

General

  • Target

    3a7b4f31f11884854c6eee060669d518aaba8a6ba311200aef7d775f3e38ea5b.exe

  • Size

    3.4MB

  • MD5

    9499d9ca6a96c11439dc4e116bfae2ec

  • SHA1

    9e536f4faee5e196cce606db2a96a6d352953d99

  • SHA256

    3a7b4f31f11884854c6eee060669d518aaba8a6ba311200aef7d775f3e38ea5b

  • SHA512

    09c34580b34549ce7750ce0862a7f2582e0f75c1492dc2eff5c18b51d87860bc79f285a2e72ffde622df9a4f1c04d4e974fd5e74995d1c6e891eaca2fc8186dc

  • SSDEEP

    49152:102IVhuSr8IKwC6h1lgKlQAEijVvZek0jL2U0DITZOoJdlArtYtPtdJ+c1cTyyFH:2BhpFZsVZPl

Score
10/10

Malware Config

Extracted

Family

latrodectus

Version

1.4

C2

https://formenista.com/test/

https://reidenhetic.com/test/

Attributes
  • group

    Delta

  • user_agent

    Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Tob 1.1)

aes.hex

Signatures

  • Detects Latrodectus 7 IoCs

    Detects Latrodectus v1.4.

  • Latrodectus family
  • Latrodectus loader

    Latrodectus is a loader written in C++.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3a7b4f31f11884854c6eee060669d518aaba8a6ba311200aef7d775f3e38ea5b.exe
    "C:\Users\Admin\AppData\Local\Temp\3a7b4f31f11884854c6eee060669d518aaba8a6ba311200aef7d775f3e38ea5b.exe"
    1⤵
    • Deletes itself
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2900
    • C:\Users\Admin\AppData\Roaming\Custom_update\Update_5139a7f3.exe
      "C:\Users\Admin\AppData\Roaming\Custom_update\Update_5139a7f3.exe"
      2⤵
      • Executes dropped EXE
      PID:3068
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {D17BA777-B396-44F3-B96D-22760DE5DD3D} S-1-5-21-1488793075-819845221-1497111674-1000:UPNECVIU\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:596
    • C:\Users\Admin\AppData\Roaming\Custom_update\Update_5139a7f3.exe
      C:\Users\Admin\AppData\Roaming\Custom_update\Update_5139a7f3.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:980
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 980 -s 208
        3⤵
        • Loads dropped DLL
        PID:1676

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Roaming\Custom_update\Update_5139a7f3.exe

    Filesize

    3.4MB

    MD5

    9499d9ca6a96c11439dc4e116bfae2ec

    SHA1

    9e536f4faee5e196cce606db2a96a6d352953d99

    SHA256

    3a7b4f31f11884854c6eee060669d518aaba8a6ba311200aef7d775f3e38ea5b

    SHA512

    09c34580b34549ce7750ce0862a7f2582e0f75c1492dc2eff5c18b51d87860bc79f285a2e72ffde622df9a4f1c04d4e974fd5e74995d1c6e891eaca2fc8186dc

  • memory/2900-0-0x0000000000230000-0x0000000000245000-memory.dmp

    Filesize

    84KB

  • memory/2900-1-0x0000000000230000-0x0000000000245000-memory.dmp

    Filesize

    84KB

  • memory/2900-2-0x0000000000230000-0x0000000000245000-memory.dmp

    Filesize

    84KB

  • memory/2900-8-0x0000000000230000-0x0000000000245000-memory.dmp

    Filesize

    84KB

  • memory/2900-7-0x0000000140000000-0x000000014036C000-memory.dmp

    Filesize

    3.4MB

  • memory/3068-12-0x0000000000220000-0x0000000000235000-memory.dmp

    Filesize

    84KB

  • memory/3068-10-0x0000000000220000-0x0000000000235000-memory.dmp

    Filesize

    84KB

  • memory/3068-9-0x0000000000220000-0x0000000000235000-memory.dmp

    Filesize

    84KB