Analysis

  • max time kernel
    199s
  • max time network
    221s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/03/2025, 19:11

General

  • Target

    3a7b4f31f11884854c6eee060669d518aaba8a6ba311200aef7d775f3e38ea5b.exe

  • Size

    3.4MB

  • MD5

    9499d9ca6a96c11439dc4e116bfae2ec

  • SHA1

    9e536f4faee5e196cce606db2a96a6d352953d99

  • SHA256

    3a7b4f31f11884854c6eee060669d518aaba8a6ba311200aef7d775f3e38ea5b

  • SHA512

    09c34580b34549ce7750ce0862a7f2582e0f75c1492dc2eff5c18b51d87860bc79f285a2e72ffde622df9a4f1c04d4e974fd5e74995d1c6e891eaca2fc8186dc

  • SSDEEP

    49152:102IVhuSr8IKwC6h1lgKlQAEijVvZek0jL2U0DITZOoJdlArtYtPtdJ+c1cTyyFH:2BhpFZsVZPl

Score
10/10

Malware Config

Extracted

Family

latrodectus

Version

1.4

C2

https://formenista.com/test/

https://reidenhetic.com/test/

Attributes
  • group

    Delta

  • user_agent

    Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Tob 1.1)

aes.hex

Signatures

  • Detects Latrodectus 6 IoCs

    Detects Latrodectus v1.4.

  • Latrodectus family
  • Latrodectus loader

    Latrodectus is a loader written in C++.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Checks for any installed AV software in registry 1 TTPs 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3a7b4f31f11884854c6eee060669d518aaba8a6ba311200aef7d775f3e38ea5b.exe
    "C:\Users\Admin\AppData\Local\Temp\3a7b4f31f11884854c6eee060669d518aaba8a6ba311200aef7d775f3e38ea5b.exe"
    1⤵
    • Deletes itself
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:4276
    • C:\Users\Admin\AppData\Roaming\Custom_update\Update_d64e3fee.exe
      "C:\Users\Admin\AppData\Roaming\Custom_update\Update_d64e3fee.exe"
      2⤵
      • Executes dropped EXE
      PID:3392
  • C:\Users\Admin\AppData\Roaming\Custom_update\Update_d64e3fee.exe
    C:\Users\Admin\AppData\Roaming\Custom_update\Update_d64e3fee.exe
    1⤵
    • Executes dropped EXE
    • Checks for any installed AV software in registry
    PID:4532

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Custom_update\Update_d64e3fee.exe

    Filesize

    3.4MB

    MD5

    9499d9ca6a96c11439dc4e116bfae2ec

    SHA1

    9e536f4faee5e196cce606db2a96a6d352953d99

    SHA256

    3a7b4f31f11884854c6eee060669d518aaba8a6ba311200aef7d775f3e38ea5b

    SHA512

    09c34580b34549ce7750ce0862a7f2582e0f75c1492dc2eff5c18b51d87860bc79f285a2e72ffde622df9a4f1c04d4e974fd5e74995d1c6e891eaca2fc8186dc

  • memory/3392-10-0x0000000000810000-0x0000000000825000-memory.dmp

    Filesize

    84KB

  • memory/3392-9-0x0000000000810000-0x0000000000825000-memory.dmp

    Filesize

    84KB

  • memory/4276-0-0x0000000000510000-0x0000000000525000-memory.dmp

    Filesize

    84KB

  • memory/4276-1-0x0000000000510000-0x0000000000525000-memory.dmp

    Filesize

    84KB

  • memory/4276-3-0x0000000000510000-0x0000000000525000-memory.dmp

    Filesize

    84KB

  • memory/4276-8-0x0000000000510000-0x0000000000525000-memory.dmp

    Filesize

    84KB

  • memory/4276-7-0x0000000140000000-0x000000014036C000-memory.dmp

    Filesize

    3.4MB