Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
994s -
max time network
1161s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
submitted
11/09/2024, 17:36
Behavioral task
behavioral1
Sample
Update_c7e5e126.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
Update_c7e5e126.exe
Resource
win11-20240802-en
General
-
Target
Update_c7e5e126.exe
-
Size
69KB
-
MD5
22c2114b460b750d7aff2523ba9500fb
-
SHA1
a9faa07a5034684272f57af82385292c288ceff1
-
SHA256
55a5a05ef93687a60d16e1c7c09303898270efe5d4acf0bbb9ba1299837f21ee
-
SHA512
9641be586eaaa1a5e21edb8e9fbbece12a311366ecebe7c9d8ad8679bd5b0fc9c9eabc113f3a63a6bea49dd47156b3987902ff3c144650976a51de46c63e8ec5
-
SSDEEP
768:bzrvRTYS4YxeO7ZD4SrcIuMHuOt7clguEdC+1986wzy7crreZAaf8I8+yUizm90l:bzx/oOfr9lic19v6reZDf8I8+Hi+e
Malware Config
Extracted
latrodectus
https://restoreviner.com/test/
https://peronikilinfer.com/test/
Signatures
-
Detects Latrodectus 2 IoCs
Detects Latrodectus v1.4.
resource yara_rule behavioral1/memory/904-4-0x00007FF606C40000-0x00007FF606C55000-memory.dmp family_latrodectus_1_4 behavioral1/files/0x00090000000234ba-3.dat family_latrodectus_1_4 -
Latrodectus family
-
Latrodectus loader
Latrodectus is a loader written in C++.
-
Deletes itself 1 IoCs
pid Process 904 Update_c7e5e126.exe -
Executes dropped EXE 3 IoCs
pid Process 3772 Update_6c821f5.exe 4448 Update_6c821f5.exe 3204 Update_6c821f5.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 904 Update_c7e5e126.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 904 wrote to memory of 3772 904 Update_c7e5e126.exe 84 PID 904 wrote to memory of 3772 904 Update_c7e5e126.exe 84 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Update_c7e5e126.exe"C:\Users\Admin\AppData\Local\Temp\Update_c7e5e126.exe"1⤵
- Deletes itself
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Users\Admin\AppData\Roaming\Custom_update\Update_6c821f5.exe"C:\Users\Admin\AppData\Roaming\Custom_update\Update_6c821f5.exe"2⤵
- Executes dropped EXE
PID:3772
-
-
C:\Users\Admin\AppData\Roaming\Custom_update\Update_6c821f5.exeC:\Users\Admin\AppData\Roaming\Custom_update\Update_6c821f5.exe1⤵
- Executes dropped EXE
PID:4448
-
C:\Users\Admin\AppData\Roaming\Custom_update\Update_6c821f5.exeC:\Users\Admin\AppData\Roaming\Custom_update\Update_6c821f5.exe1⤵
- Executes dropped EXE
PID:3204
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
69KB
MD522c2114b460b750d7aff2523ba9500fb
SHA1a9faa07a5034684272f57af82385292c288ceff1
SHA25655a5a05ef93687a60d16e1c7c09303898270efe5d4acf0bbb9ba1299837f21ee
SHA5129641be586eaaa1a5e21edb8e9fbbece12a311366ecebe7c9d8ad8679bd5b0fc9c9eabc113f3a63a6bea49dd47156b3987902ff3c144650976a51de46c63e8ec5