Analysis
-
max time kernel
242s -
max time network
261s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/03/2025, 19:11
Static task
static1
Behavioral task
behavioral1
Sample
3a7b4f31f11884854c6eee060669d518aaba8a6ba311200aef7d775f3e38ea5b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3a7b4f31f11884854c6eee060669d518aaba8a6ba311200aef7d775f3e38ea5b.exe
Resource
win10v2004-20250217-en
General
-
Target
3a7b4f31f11884854c6eee060669d518aaba8a6ba311200aef7d775f3e38ea5b.exe
-
Size
3.4MB
-
MD5
9499d9ca6a96c11439dc4e116bfae2ec
-
SHA1
9e536f4faee5e196cce606db2a96a6d352953d99
-
SHA256
3a7b4f31f11884854c6eee060669d518aaba8a6ba311200aef7d775f3e38ea5b
-
SHA512
09c34580b34549ce7750ce0862a7f2582e0f75c1492dc2eff5c18b51d87860bc79f285a2e72ffde622df9a4f1c04d4e974fd5e74995d1c6e891eaca2fc8186dc
-
SSDEEP
49152:102IVhuSr8IKwC6h1lgKlQAEijVvZek0jL2U0DITZOoJdlArtYtPtdJ+c1cTyyFH:2BhpFZsVZPl
Malware Config
Extracted
latrodectus
1.4
https://formenista.com/test/
https://reidenhetic.com/test/
-
group
Delta
-
user_agent
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Tob 1.1)
Signatures
-
Detects Latrodectus 7 IoCs
Detects Latrodectus v1.4.
resource yara_rule behavioral1/memory/2900-0-0x0000000000230000-0x0000000000245000-memory.dmp family_latrodectus_1_4 behavioral1/memory/2900-1-0x0000000000230000-0x0000000000245000-memory.dmp family_latrodectus_1_4 behavioral1/memory/2900-2-0x0000000000230000-0x0000000000245000-memory.dmp family_latrodectus_1_4 behavioral1/memory/2900-8-0x0000000000230000-0x0000000000245000-memory.dmp family_latrodectus_1_4 behavioral1/memory/3068-12-0x0000000000220000-0x0000000000235000-memory.dmp family_latrodectus_1_4 behavioral1/memory/3068-10-0x0000000000220000-0x0000000000235000-memory.dmp family_latrodectus_1_4 behavioral1/memory/3068-9-0x0000000000220000-0x0000000000235000-memory.dmp family_latrodectus_1_4 -
Latrodectus family
-
Latrodectus loader
Latrodectus is a loader written in C++.
-
Deletes itself 1 IoCs
pid Process 2900 3a7b4f31f11884854c6eee060669d518aaba8a6ba311200aef7d775f3e38ea5b.exe -
Executes dropped EXE 2 IoCs
pid Process 3068 Update_5139a7f3.exe 980 Update_5139a7f3.exe -
Loads dropped DLL 6 IoCs
pid Process 2900 3a7b4f31f11884854c6eee060669d518aaba8a6ba311200aef7d775f3e38ea5b.exe 1676 WerFault.exe 1676 WerFault.exe 1676 WerFault.exe 1676 WerFault.exe 1676 WerFault.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2900 3a7b4f31f11884854c6eee060669d518aaba8a6ba311200aef7d775f3e38ea5b.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2900 wrote to memory of 3068 2900 3a7b4f31f11884854c6eee060669d518aaba8a6ba311200aef7d775f3e38ea5b.exe 30 PID 2900 wrote to memory of 3068 2900 3a7b4f31f11884854c6eee060669d518aaba8a6ba311200aef7d775f3e38ea5b.exe 30 PID 2900 wrote to memory of 3068 2900 3a7b4f31f11884854c6eee060669d518aaba8a6ba311200aef7d775f3e38ea5b.exe 30 PID 596 wrote to memory of 980 596 taskeng.exe 34 PID 596 wrote to memory of 980 596 taskeng.exe 34 PID 596 wrote to memory of 980 596 taskeng.exe 34 PID 980 wrote to memory of 1676 980 Update_5139a7f3.exe 35 PID 980 wrote to memory of 1676 980 Update_5139a7f3.exe 35 PID 980 wrote to memory of 1676 980 Update_5139a7f3.exe 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a7b4f31f11884854c6eee060669d518aaba8a6ba311200aef7d775f3e38ea5b.exe"C:\Users\Admin\AppData\Local\Temp\3a7b4f31f11884854c6eee060669d518aaba8a6ba311200aef7d775f3e38ea5b.exe"1⤵
- Deletes itself
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Roaming\Custom_update\Update_5139a7f3.exe"C:\Users\Admin\AppData\Roaming\Custom_update\Update_5139a7f3.exe"2⤵
- Executes dropped EXE
PID:3068
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {D17BA777-B396-44F3-B96D-22760DE5DD3D} S-1-5-21-1488793075-819845221-1497111674-1000:UPNECVIU\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:596 -
C:\Users\Admin\AppData\Roaming\Custom_update\Update_5139a7f3.exeC:\Users\Admin\AppData\Roaming\Custom_update\Update_5139a7f3.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 980 -s 2083⤵
- Loads dropped DLL
PID:1676
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD59499d9ca6a96c11439dc4e116bfae2ec
SHA19e536f4faee5e196cce606db2a96a6d352953d99
SHA2563a7b4f31f11884854c6eee060669d518aaba8a6ba311200aef7d775f3e38ea5b
SHA51209c34580b34549ce7750ce0862a7f2582e0f75c1492dc2eff5c18b51d87860bc79f285a2e72ffde622df9a4f1c04d4e974fd5e74995d1c6e891eaca2fc8186dc