Analysis
-
max time kernel
104s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2025, 07:10
Static task
static1
Behavioral task
behavioral1
Sample
489541a61e66ed36c56d7c7b35ed57129a9febb201efb9156420cbe9d325c9a6.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
489541a61e66ed36c56d7c7b35ed57129a9febb201efb9156420cbe9d325c9a6.dll
Resource
win10v2004-20250314-en
General
-
Target
489541a61e66ed36c56d7c7b35ed57129a9febb201efb9156420cbe9d325c9a6.dll
-
Size
1.8MB
-
MD5
06ba9f3ecacbca2920c8272a7719ca76
-
SHA1
a22039c0bcfdf41a2c2f6f37aa38e2d77f36f39a
-
SHA256
489541a61e66ed36c56d7c7b35ed57129a9febb201efb9156420cbe9d325c9a6
-
SHA512
38ba64295f030a630b0cd2f3db915743cf801d454b50a6cb36653a75384da15658682846c3ea78fe1637b5fb3ecef58a4a39e1fd4bb21cc16e4f226f78d9d27b
-
SSDEEP
49152:9srSb808eyLlSRqVNPseFyTJ1CLXuzYYjc8F4HcDsYfPFGMSugRP:KL1PYTI9Hco
Malware Config
Extracted
latrodectus
1.4
https://remustarofilac.com/test/
https://horetimodual.com/test/
-
group
Ferrary
-
user_agent
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Tob 1.1)
Extracted
latrodectus
Signatures
-
Latrodectus family
-
Latrodectus loader
Latrodectus is a loader written in C++.
-
Deletes itself 1 IoCs
pid Process 4056 rundll32.exe -
Loads dropped DLL 2 IoCs
pid Process 3284 rundll32.exe 3732 rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4056 rundll32.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4056 wrote to memory of 3284 4056 rundll32.exe 88 PID 4056 wrote to memory of 3284 4056 rundll32.exe 88 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\489541a61e66ed36c56d7c7b35ed57129a9febb201efb9156420cbe9d325c9a6.dll,#11⤵
- Deletes itself
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Roaming\Custom_update\Update_5f9a8b4a.dll", #12⤵
- Loads dropped DLL
PID:3284
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Roaming\Custom_update\Update_5f9a8b4a.dll", #11⤵
- Loads dropped DLL
PID:3732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD506ba9f3ecacbca2920c8272a7719ca76
SHA1a22039c0bcfdf41a2c2f6f37aa38e2d77f36f39a
SHA256489541a61e66ed36c56d7c7b35ed57129a9febb201efb9156420cbe9d325c9a6
SHA51238ba64295f030a630b0cd2f3db915743cf801d454b50a6cb36653a75384da15658682846c3ea78fe1637b5fb3ecef58a4a39e1fd4bb21cc16e4f226f78d9d27b