Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
submitted
14/09/2024, 01:33
Static task
static1
Behavioral task
behavioral1
Sample
f60c7e2cd7078584e1fb2eacd6270c314f1e23f76a4cd78c5d13eec215f0e41c.msi
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f60c7e2cd7078584e1fb2eacd6270c314f1e23f76a4cd78c5d13eec215f0e41c.msi
Resource
win10v2004-20240802-en
General
-
Target
f60c7e2cd7078584e1fb2eacd6270c314f1e23f76a4cd78c5d13eec215f0e41c.msi
Malware Config
Extracted
latrodectus
https://isomicrotich.com/test/
https://rilomenifis.com/test/
Signatures
-
Detects Latrodectus 5 IoCs
Detects Latrodectus v1.4.
resource yara_rule behavioral2/memory/2940-46-0x00000288E7D30000-0x00000288E7D46000-memory.dmp family_latrodectus_1_4 behavioral2/memory/2940-48-0x00000288E7D30000-0x00000288E7D46000-memory.dmp family_latrodectus_1_4 behavioral2/memory/4252-52-0x00000183B3CC0000-0x00000183B3CD6000-memory.dmp family_latrodectus_1_4 behavioral2/memory/4252-53-0x00000183B3CC0000-0x00000183B3CD6000-memory.dmp family_latrodectus_1_4 behavioral2/memory/4252-54-0x00000183B3CC0000-0x00000183B3CD6000-memory.dmp family_latrodectus_1_4 -
Latrodectus family
-
Latrodectus loader
Latrodectus is a loader written in C++.
-
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\J: msiexec.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\e57c2e2.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSIC350.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIC517.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIC547.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIC77B.tmp msiexec.exe File created C:\Windows\Installer\e57c2e2.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIC4B8.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\SourceHash{72A77E3B-B705-4CCF-8F7A-0CB540D0E61A} msiexec.exe File opened for modification C:\Windows\Installer\MSIC642.tmp msiexec.exe -
Executes dropped EXE 1 IoCs
pid Process 4396 MSIC77B.tmp -
Loads dropped DLL 6 IoCs
pid Process 960 MsiExec.exe 960 MsiExec.exe 960 MsiExec.exe 960 MsiExec.exe 2940 rundll32.exe 4252 rundll32.exe -
Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
pid Process 2776 msiexec.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSIC77B.tmp -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1288 msiexec.exe 1288 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 63 IoCs
description pid Process Token: SeShutdownPrivilege 2776 msiexec.exe Token: SeIncreaseQuotaPrivilege 2776 msiexec.exe Token: SeSecurityPrivilege 1288 msiexec.exe Token: SeCreateTokenPrivilege 2776 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2776 msiexec.exe Token: SeLockMemoryPrivilege 2776 msiexec.exe Token: SeIncreaseQuotaPrivilege 2776 msiexec.exe Token: SeMachineAccountPrivilege 2776 msiexec.exe Token: SeTcbPrivilege 2776 msiexec.exe Token: SeSecurityPrivilege 2776 msiexec.exe Token: SeTakeOwnershipPrivilege 2776 msiexec.exe Token: SeLoadDriverPrivilege 2776 msiexec.exe Token: SeSystemProfilePrivilege 2776 msiexec.exe Token: SeSystemtimePrivilege 2776 msiexec.exe Token: SeProfSingleProcessPrivilege 2776 msiexec.exe Token: SeIncBasePriorityPrivilege 2776 msiexec.exe Token: SeCreatePagefilePrivilege 2776 msiexec.exe Token: SeCreatePermanentPrivilege 2776 msiexec.exe Token: SeBackupPrivilege 2776 msiexec.exe Token: SeRestorePrivilege 2776 msiexec.exe Token: SeShutdownPrivilege 2776 msiexec.exe Token: SeDebugPrivilege 2776 msiexec.exe Token: SeAuditPrivilege 2776 msiexec.exe Token: SeSystemEnvironmentPrivilege 2776 msiexec.exe Token: SeChangeNotifyPrivilege 2776 msiexec.exe Token: SeRemoteShutdownPrivilege 2776 msiexec.exe Token: SeUndockPrivilege 2776 msiexec.exe Token: SeSyncAgentPrivilege 2776 msiexec.exe Token: SeEnableDelegationPrivilege 2776 msiexec.exe Token: SeManageVolumePrivilege 2776 msiexec.exe Token: SeImpersonatePrivilege 2776 msiexec.exe Token: SeCreateGlobalPrivilege 2776 msiexec.exe Token: SeBackupPrivilege 536 vssvc.exe Token: SeRestorePrivilege 536 vssvc.exe Token: SeAuditPrivilege 536 vssvc.exe Token: SeBackupPrivilege 1288 msiexec.exe Token: SeRestorePrivilege 1288 msiexec.exe Token: SeRestorePrivilege 1288 msiexec.exe Token: SeTakeOwnershipPrivilege 1288 msiexec.exe Token: SeRestorePrivilege 1288 msiexec.exe Token: SeTakeOwnershipPrivilege 1288 msiexec.exe Token: SeRestorePrivilege 1288 msiexec.exe Token: SeTakeOwnershipPrivilege 1288 msiexec.exe Token: SeRestorePrivilege 1288 msiexec.exe Token: SeTakeOwnershipPrivilege 1288 msiexec.exe Token: SeRestorePrivilege 1288 msiexec.exe Token: SeTakeOwnershipPrivilege 1288 msiexec.exe Token: SeRestorePrivilege 1288 msiexec.exe Token: SeTakeOwnershipPrivilege 1288 msiexec.exe Token: SeBackupPrivilege 1524 srtasks.exe Token: SeRestorePrivilege 1524 srtasks.exe Token: SeSecurityPrivilege 1524 srtasks.exe Token: SeTakeOwnershipPrivilege 1524 srtasks.exe Token: SeRestorePrivilege 1288 msiexec.exe Token: SeTakeOwnershipPrivilege 1288 msiexec.exe Token: SeRestorePrivilege 1288 msiexec.exe Token: SeTakeOwnershipPrivilege 1288 msiexec.exe Token: SeRestorePrivilege 1288 msiexec.exe Token: SeTakeOwnershipPrivilege 1288 msiexec.exe Token: SeBackupPrivilege 1524 srtasks.exe Token: SeRestorePrivilege 1524 srtasks.exe Token: SeSecurityPrivilege 1524 srtasks.exe Token: SeTakeOwnershipPrivilege 1524 srtasks.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2776 msiexec.exe 2776 msiexec.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1288 wrote to memory of 1524 1288 msiexec.exe 99 PID 1288 wrote to memory of 1524 1288 msiexec.exe 99 PID 1288 wrote to memory of 960 1288 msiexec.exe 101 PID 1288 wrote to memory of 960 1288 msiexec.exe 101 PID 1288 wrote to memory of 960 1288 msiexec.exe 101 PID 1288 wrote to memory of 4396 1288 msiexec.exe 102 PID 1288 wrote to memory of 4396 1288 msiexec.exe 102 PID 1288 wrote to memory of 4396 1288 msiexec.exe 102 PID 2940 wrote to memory of 4252 2940 rundll32.exe 104 PID 2940 wrote to memory of 4252 2940 rundll32.exe 104 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\f60c7e2cd7078584e1fb2eacd6270c314f1e23f76a4cd78c5d13eec215f0e41c.msi1⤵
- Enumerates connected drives
- Event Triggered Execution: Installer Packages
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2776
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵
- Suspicious use of AdjustPrivilegeToken
PID:1524
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding C5620160CE24D9EC007EC9482A0D4FFB2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:960
-
-
C:\Windows\Installer\MSIC77B.tmp"C:\Windows\Installer\MSIC77B.tmp" /DontWait C:/Windows/System32/rundll32.exe C:\Users\Admin\AppData\Roaming\true.dll, NvPluginGetInfo2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4396
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:536
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\true.dll, NvPluginGetInfo1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\System32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Roaming\Custom_update\Update_2bba8ec5.dll", NvPluginGetInfo2⤵
- Loads dropped DLL
PID:4252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD561c1b6c58b961fb27443a0a515befe14
SHA185dd05f5cf5d2f9842d1822f1bd950b78a8b2000
SHA25641cb2f00c1810c89dbf2bf1df95be5ad84a376125180c281193a52f118c05f4a
SHA51213a0ecae5da8bee3aaf9317c8641eba4e54107733ba3dc19e180641db95c4184be000ef07030f479814e2f20e99806a1e8858debe0f7b34611bbffa8b3243b52
-
Filesize
1.8MB
MD56dc0d350d735fd1acc8219cfa5d02b9b
SHA17ba0708a4404715fb21a23acfbd88a25b7245ef1
SHA2562333dd858fc40899a1bff3fb39fbc0b4e65a864bfd4eb73c26b48aaddcca7061
SHA51299c9b6310363ce3a7d9ff680c4a0ae976553fc4789b12f9b60d9f629608d90cf4d64b4c8a037264f8aaa48fba69ae397236ef4c32c2eb6779fb5d9e0b3b0d52f
-
Filesize
436KB
MD5475d20c0ea477a35660e3f67ecf0a1df
SHA167340739f51e1134ae8f0ffc5ae9dd710e8e3a08
SHA256426e6cf199a8268e8a7763ec3a4dd7add982b28c51d89ebea90ca792cbae14dd
SHA51299525aaab2ab608134b5d66b5313e7fc3c2e2877395c5c171897d7a6c66efb26b606de1a4cb01118c2738ea4b6542e4eb4983e631231b3f340bf85e509a9589e
-
Filesize
389KB
MD5b9545ed17695a32face8c3408a6a3553
SHA1f6c31c9cd832ae2aebcd88e7b2fa6803ae93fc83
SHA2561e0e63b446eecf6c9781c7d1cae1f46a3bb31654a70612f71f31538fb4f4729a
SHA512f6d6dc40dcba5ff091452d7cc257427dcb7ce2a21816b4fec2ee249e63246b64667f5c4095220623533243103876433ef8c12c9b612c0e95fdfffe41d1504e04
-
Filesize
23.7MB
MD55b17815a2002ed8d351b314245b02263
SHA1d7ed155e7dc6cbf06dcd75aecf1c4ac2cb509785
SHA25608904ac22820b179284fafa2829faeb5175cda71feb11990d6ef7f565583bd1f
SHA512cd690b8d6bd5bd9efb1a7f283ca9c8ee5431bf9797c72f37a6af93901f21e779c6909665b869d731c922452695ca69836c2baf1d7913b90a4377dacaa3d43b5f
-
\??\Volume{f1c94fa5-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{a97baa1b-93ff-405b-a67e-657c0c8fbd98}_OnDiskSnapshotProp
Filesize6KB
MD5feb31c9119526665d1293b9a6975faa1
SHA18052f0298c83f6164b153f4ec26e8733208f4657
SHA256cf46058eb7d0eef8075e5bf1145b38b5184e078e97508269bcf13b921e1bdb25
SHA512593986fbec55be407f1db974ea5b84a9a18d1a84667cf13b528dbef928163076d8003a851631c900082043cf9206be44c74386da03b13b5c345172117bf59654