Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 10:30
Behavioral task
behavioral1
Sample
15f44ff0042e4fa5bd23a5b252152b6b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
15f44ff0042e4fa5bd23a5b252152b6b.exe
Resource
win10v2004-20231215-en
General
-
Target
15f44ff0042e4fa5bd23a5b252152b6b.exe
-
Size
11KB
-
MD5
15f44ff0042e4fa5bd23a5b252152b6b
-
SHA1
d25259c4c5df9a46249eb233f5451d85d4164373
-
SHA256
5958f83abaef9184409a178b8d79a34d136c3dcbb0db3ac1f615fb0714f792ae
-
SHA512
1243c1a0de531aa6cb35d28a7461dabdea566cf1c7677b175ea9c024a4ef2e91de44b0f1d73f018d796f5485bb479b423f2dad2b1d11475450d0bfa6b177dc41
-
SSDEEP
192:RyirsYZFsmtabUmvf28YDXdxXe3c2irvrjvRdHMsNyuuZTQZ:IirsYZuGaIrXdVe3c2irvHvs9uuZ6
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Deletes itself 1 IoCs
pid Process 2300 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2292 thermaltinck.exe -
Loads dropped DLL 2 IoCs
pid Process 2548 15f44ff0042e4fa5bd23a5b252152b6b.exe 2548 15f44ff0042e4fa5bd23a5b252152b6b.exe -
resource yara_rule behavioral1/memory/2548-0-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/files/0x00340000000170ee-3.dat upx behavioral1/memory/2292-11-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2548-19-0x0000000000400000-0x000000000040E000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\thermaltinc.dll 15f44ff0042e4fa5bd23a5b252152b6b.exe File created C:\Windows\SysWOW64\thermaltinck.exe 15f44ff0042e4fa5bd23a5b252152b6b.exe File opened for modification C:\Windows\SysWOW64\thermaltinck.exe 15f44ff0042e4fa5bd23a5b252152b6b.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2548 15f44ff0042e4fa5bd23a5b252152b6b.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2292 2548 15f44ff0042e4fa5bd23a5b252152b6b.exe 28 PID 2548 wrote to memory of 2292 2548 15f44ff0042e4fa5bd23a5b252152b6b.exe 28 PID 2548 wrote to memory of 2292 2548 15f44ff0042e4fa5bd23a5b252152b6b.exe 28 PID 2548 wrote to memory of 2292 2548 15f44ff0042e4fa5bd23a5b252152b6b.exe 28 PID 2548 wrote to memory of 2300 2548 15f44ff0042e4fa5bd23a5b252152b6b.exe 29 PID 2548 wrote to memory of 2300 2548 15f44ff0042e4fa5bd23a5b252152b6b.exe 29 PID 2548 wrote to memory of 2300 2548 15f44ff0042e4fa5bd23a5b252152b6b.exe 29 PID 2548 wrote to memory of 2300 2548 15f44ff0042e4fa5bd23a5b252152b6b.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\15f44ff0042e4fa5bd23a5b252152b6b.exe"C:\Users\Admin\AppData\Local\Temp\15f44ff0042e4fa5bd23a5b252152b6b.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\thermaltinck.exeC:\Windows\system32\thermaltinck.exe ˜‰2⤵
- Executes dropped EXE
PID:2292
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\15f44ff0042e4fa5bd23a5b252152b6b.exe.bat2⤵
- Deletes itself
PID:2300
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182B
MD5db134f246153e877841383c14859da9f
SHA1c9bbf51bb3b5fc0d91cbb712b673b227c1f7dd35
SHA2564fd7d6ccb52867c013b2b42a5558fe9171912ca46b4c2d6358699bf1a02e8d54
SHA512800d5c5f8408824e1a7867d556529582fda5a8b732660252328e10cd424bd1c07f16f49fa859342dd3214f0b10bd06b9ed40ff0aef71a9900d9c041e35724295
-
Filesize
11KB
MD515f44ff0042e4fa5bd23a5b252152b6b
SHA1d25259c4c5df9a46249eb233f5451d85d4164373
SHA2565958f83abaef9184409a178b8d79a34d136c3dcbb0db3ac1f615fb0714f792ae
SHA5121243c1a0de531aa6cb35d28a7461dabdea566cf1c7677b175ea9c024a4ef2e91de44b0f1d73f018d796f5485bb479b423f2dad2b1d11475450d0bfa6b177dc41