Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 15:39
Behavioral task
behavioral1
Sample
latrodectus_1.2.bin.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
latrodectus_1.2.bin.dll
Resource
win10v2004-20240709-en
General
-
Target
latrodectus_1.2.bin.dll
-
Size
61KB
-
MD5
58baec37e77f6f7f4339b4557ce9cc57
-
SHA1
993cf0a9b1472f480d3fa854ce5dbb0fb34c0f05
-
SHA256
45e327e1fb60a272a3e7aa256c29f1d55846d90733329e7d453f6a1061916775
-
SHA512
01ec5aa867ac1075effde830c7b6e0d8e84988053009e4942afc6480b29459e508209a45bf704959fb51251bd0af8550f644fc716edabc8bff76d2a0de8197ce
-
SSDEEP
768:+i0IIO99dKJKbAgQVuyQw4n4mjlQmLvniWiMfDeDvhHImz:ipO9CJKrQF4n4mjltqTMKD5H
Malware Config
Extracted
latrodectus
https://titnovacrion.top/live/
https://skinnyjeanso.com/live/
Signatures
-
Latrodectus loader
Latrodectus is a loader written in C++.
-
Detect larodectus Loader variant 2 2 IoCs
resource yara_rule behavioral2/memory/3052-2-0x00007FFE1FC00000-0x00007FFE1FC14000-memory.dmp family_latrodectus_v2 behavioral2/files/0x00080000000234ba-3.dat family_latrodectus_v2 -
Deletes itself 1 IoCs
pid Process 3052 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 4812 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3052 rundll32.exe 3052 rundll32.exe 3052 rundll32.exe 3052 rundll32.exe 4812 rundll32.exe 4812 rundll32.exe 4812 rundll32.exe 4812 rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3052 rundll32.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3052 wrote to memory of 4812 3052 rundll32.exe 84 PID 3052 wrote to memory of 4812 3052 rundll32.exe 84 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\latrodectus_1.2.bin.dll,#11⤵
- Deletes itself
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Roaming\Custom_update\Update_dd971ac9.dll", #12⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:4812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD558baec37e77f6f7f4339b4557ce9cc57
SHA1993cf0a9b1472f480d3fa854ce5dbb0fb34c0f05
SHA25645e327e1fb60a272a3e7aa256c29f1d55846d90733329e7d453f6a1061916775
SHA51201ec5aa867ac1075effde830c7b6e0d8e84988053009e4942afc6480b29459e508209a45bf704959fb51251bd0af8550f644fc716edabc8bff76d2a0de8197ce