Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
03/10/2023, 09:33
Static task
static1
Behavioral task
behavioral1
Sample
Thetempest.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Thetempest.exe
Resource
win10v2004-20230915-en
General
-
Target
Thetempest.exe
-
Size
836KB
-
MD5
1564e0d55798a05392c21c4e32af6c8b
-
SHA1
538205c2ac6d66f796a25571548c31086c2e231a
-
SHA256
030ca745bb45c5cba7e0dc933c2f36aa7c27a3716929027e1b9aa64c6ed60f81
-
SHA512
32dc533f141d22452f97fb3ce58667058b8cf3b1e23659624b2449694a010e41e6909874a808d89306f7fc85c6d2bc2bc2c64a54b9117fe6cd4614c46cfbdd9b
-
SSDEEP
24576:INPx3Tpgh9NZEak0F5SAz6uc1L9J8xVCT5ATqY2BXY6+g7:mBTMTq2MAz6VL9J8xVCT5AT2Y6N
Malware Config
Signatures
-
Checks QEMU agent file 2 TTPs 2 IoCs
Checks presence of QEMU agent, possibly to detect virtualization.
description ioc Process File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe Thetempest.exe File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe Thetempest.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Control Panel\International\Geo\Nation Thetempest.exe -
Loads dropped DLL 2 IoCs
pid Process 2040 Thetempest.exe 2720 mstsc.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 2124 Thetempest.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2040 Thetempest.exe 2124 Thetempest.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2040 set thread context of 2124 2040 Thetempest.exe 28 PID 2124 set thread context of 1212 2124 Thetempest.exe 21 PID 2124 set thread context of 2720 2124 Thetempest.exe 33 PID 2720 set thread context of 1212 2720 mstsc.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \Registry\User\S-1-5-21-3849525425-30183055-657688904-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 mstsc.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 2124 Thetempest.exe 2124 Thetempest.exe 2124 Thetempest.exe 2124 Thetempest.exe 2124 Thetempest.exe 2124 Thetempest.exe 2124 Thetempest.exe 2124 Thetempest.exe 2720 mstsc.exe 2720 mstsc.exe 2720 mstsc.exe 2720 mstsc.exe 2720 mstsc.exe 2720 mstsc.exe 2720 mstsc.exe 2720 mstsc.exe 2720 mstsc.exe 2720 mstsc.exe 2720 mstsc.exe 2720 mstsc.exe 2720 mstsc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1212 Explorer.EXE -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 2040 Thetempest.exe 2124 Thetempest.exe 1212 Explorer.EXE 1212 Explorer.EXE 2720 mstsc.exe 2720 mstsc.exe 2720 mstsc.exe 2720 mstsc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2124 Thetempest.exe Token: SeDebugPrivilege 2720 mstsc.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2124 2040 Thetempest.exe 28 PID 2040 wrote to memory of 2124 2040 Thetempest.exe 28 PID 2040 wrote to memory of 2124 2040 Thetempest.exe 28 PID 2040 wrote to memory of 2124 2040 Thetempest.exe 28 PID 2040 wrote to memory of 2124 2040 Thetempest.exe 28 PID 2040 wrote to memory of 2124 2040 Thetempest.exe 28 PID 1212 wrote to memory of 2720 1212 Explorer.EXE 33 PID 1212 wrote to memory of 2720 1212 Explorer.EXE 33 PID 1212 wrote to memory of 2720 1212 Explorer.EXE 33 PID 1212 wrote to memory of 2720 1212 Explorer.EXE 33 PID 2720 wrote to memory of 1960 2720 mstsc.exe 34 PID 2720 wrote to memory of 1960 2720 mstsc.exe 34 PID 2720 wrote to memory of 1960 2720 mstsc.exe 34 PID 2720 wrote to memory of 1960 2720 mstsc.exe 34 PID 2720 wrote to memory of 1960 2720 mstsc.exe 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\Thetempest.exe"C:\Users\Admin\AppData\Local\Temp\Thetempest.exe"2⤵
- Checks QEMU agent file
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\Thetempest.exe"C:\Users\Admin\AppData\Local\Temp\Thetempest.exe"3⤵
- Checks QEMU agent file
- Checks computer location settings
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2124
-
-
-
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1960
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
486KB
MD51e73cacce02ae20026a81f1e56416aa3
SHA1f491a7301ce11cf11a92c0245c7e03d927422286
SHA2560dd0dd38cde5a14e7d6d0830db62cc7037e521fd042b0b8da0763128b2c0b3f2
SHA512afe77facd8b16cc744ac2277414ffaf83436999d15eb8ac707f8098e2f8ed4cb29b430392ebe46b7fa65b20730615bc33dee9416f7141da5032a630894980a0a
-
Filesize
12KB
MD5dd87a973e01c5d9f8e0fcc81a0af7c7a
SHA1c9206ced48d1e5bc648b1d0f54cccc18bf643a14
SHA2567fb0f8d452fefaac789986b933df050f3d3e4feb8a8d9944ada995f572dcdca1
SHA5124910b39b1a99622ac8b3c42f173bbe7035ac2f8d40c946468e7db7e2868a2da81ea94da453857f06f39957dd690c7f1ba498936a7aaa0039975e472376f92e8f
-
Filesize
927KB
MD57fd80b1cc72dc580c02ca4cfbfb2592d
SHA118da905af878b27151b359cf1a7d0a650764e8a1
SHA2561e6dccbdf8527abb53c289da920463b7895300d0d984cc7e91a3ecda4e673190
SHA51213f7f29b5ed31c551aa5f27742557aa4d026a226087d6fcbca094819759ecc753a2c33b7422ae88dc6a4a0a966edb8485a18e59a0283ba2686cae5d78e0190a3