| File name: | Folder.exe |
| Full analysis: | https://app.any.run/tasks/a576f52b-dabe-4caf-9141-0efebd39588d |
| Verdict: | Malicious activity |
| Threats: | Latrodectus is a malicious loader that is used by threat actors to gain a foothold on compromised devices and deploy additional malware. It has been associated with the IcedID trojan and has been used by APT groups in targeted attacks. The malware can gather system information, launch executables, and detect sandbox environments. It uses encryption and obfuscation to evade detection and can establish persistence on the infected device. |
| Analysis date: | March 14, 2025, 17:36:47 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections |
| MD5: | A814178210740725FADB68D197EAE48F |
| SHA1: | 671E0770DF1E4C59C87A6591D298E4F41C5971FD |
| SHA256: | 584D0E977DC6C492DEF48E1CAF042FB33D0DFC7116C4A6C5764BB305998EF7D7 |
| SSDEEP: | 98304:js0a/3RoHJlrsayyj38ISxI0B5TxjObVZP2ieEqp1CP6wdWAHw/DoL4w8PUJFkEq:X4B97M9rC |
| .exe | | | Win32 Executable (generic) (52.9) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (23.5) |
| .exe | | | DOS Executable Generic (23.5) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2024:10:18 20:54:21+00:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 14.16 |
| CodeSize: | 5265920 |
| InitializedDataSize: | 3463680 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x463990 |
| OSVersion: | 5.1 |
| ImageVersion: | - |
| SubsystemVersion: | 5.1 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 8.1.8325.0 |
| ProductVersionNumber: | 8.1.8325.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Unknown (4090) |
| CharacterSet: | Windows, Latin1 |
| CompanyName: | Paramount Software UK Ltd |
| FileDescription: | Macrium Reflect UI Watcher |
| FileVersion: | 8, 1, 8325, 0 |
| InternalName: | Macrium Reflect UI Watcher |
| LegalCopyright: | (c) Paramount Software. All rights reserved. |
| OriginalFileName: | ReflectUI.exe |
| ProductName: | Macrium Reflect |
| ProductVersion: | 8, 1, 8325, 0 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 668 | C:\WINDOWS\system32\SppExtComObj.exe -Embedding | C:\Windows\System32\SppExtComObj.Exe | — | svchost.exe | |||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: KMS Connection Broker Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1132 | "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft® Resource File To COFF Object Conversion Utility Exit code: 0 Version: 14.32.31326.0 Modules
| |||||||||||||||
| 1196 | "C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEvent | C:\Windows\System32\slui.exe | — | SppExtComObj.Exe | |||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Activation Client Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1276 | "C:\Users\admin\AppData\Local\Temp\Folder.exe" | C:\Users\admin\AppData\Local\Temp\Folder.exe | explorer.exe | ||||||||||||
User: admin Company: Paramount Software UK Ltd Integrity Level: MEDIUM Description: Macrium Reflect UI Watcher Exit code: 4294967295 Version: 8, 1, 8325, 0 Modules
| |||||||||||||||
| 1348 | rundll32.exe "C:\Users\admin\AppData\Roaming\Custom_update\Update_28166db2.dll", Editor | C:\Windows\System32\rundll32.exe | rundll32.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows host process (Rundll32) Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5608 | rundll32 "C:\Users\admin\AppData\Local\Temp\WGP8XZ6VR2KVYFILT40OOFX2MKZHGR.dll",Editor | C:\Windows\SysWOW64\rundll32.exe | — | cvtres.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows host process (Rundll32) Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5800 | rundll32 "C:\Users\admin\AppData\Local\Temp\WGP8XZ6VR2KVYFILT40OOFX2MKZHGR.dll",Editor | C:\Windows\System32\rundll32.exe | rundll32.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows host process (Rundll32) Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 5800 | rundll32.exe | C:\Users\admin\AppData\Local\Temp\WGP8XZ6VR2KVYFILT40OOFX2MKZHGR.dll:wtfbbq | executable | |
MD5:56F403DED2A31F25592AFCC131CF378A | SHA256:5E9B53207CB53C38217FB443E9A84C0FA745FA7FC62ACE3673A2C49C6E873749 | |||
| 1132 | cvtres.exe | C:\Users\admin\AppData\Local\Temp\WGP8XZ6VR2KVYFILT40OOFX2MKZHGR.dll | executable | |
MD5:56F403DED2A31F25592AFCC131CF378A | SHA256:5E9B53207CB53C38217FB443E9A84C0FA745FA7FC62ACE3673A2C49C6E873749 | |||
| 5800 | rundll32.exe | C:\Users\admin\AppData\Roaming\Custom_update\Update_28166db2.dll | executable | |
MD5:56F403DED2A31F25592AFCC131CF378A | SHA256:5E9B53207CB53C38217FB443E9A84C0FA745FA7FC62ACE3673A2C49C6E873749 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
5496 | MoUsoCoreWorker.exe | GET | 200 | 2.19.11.105:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
6544 | svchost.exe | GET | 200 | 184.30.131.245:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
680 | backgroundTaskHost.exe | GET | 200 | 2.23.77.188:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D | unknown | — | — | whitelisted |
1244 | SIHClient.exe | GET | 200 | 23.59.18.102:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
1244 | SIHClient.exe | GET | 200 | 23.59.18.102:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
— | — | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
5496 | MoUsoCoreWorker.exe | 2.19.11.105:80 | crl.microsoft.com | Elisa Oyj | NL | whitelisted |
3216 | svchost.exe | 40.115.3.253:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
6544 | svchost.exe | 40.126.31.67:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
6544 | svchost.exe | 184.30.131.245:80 | ocsp.digicert.com | AKAMAI-AS | US | whitelisted |
2104 | svchost.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
680 | backgroundTaskHost.exe | 20.103.156.88:443 | arc.msn.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
680 | backgroundTaskHost.exe | 2.23.77.188:80 | ocsp.digicert.com | AKAMAI-AS | DE | whitelisted |
1132 | cvtres.exe | 172.67.156.130:443 | partparcadi.shop | CLOUDFLARENET | US | unknown |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
arc.msn.com |
| whitelisted |
partparcadi.shop |
| unknown |
elaviltabs.run |
| unknown |
www.dropbox.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
1132 | cvtres.exe | Misc Attack | ET DROP Spamhaus DROP Listed Traffic Inbound group 4 |
1132 | cvtres.exe | Potential Corporate Privacy Violation | ET INFO Dropbox.com Offsite File Backup in Use |