Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 10:30
Behavioral task
behavioral1
Sample
15f44ff0042e4fa5bd23a5b252152b6b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
15f44ff0042e4fa5bd23a5b252152b6b.exe
Resource
win10v2004-20231215-en
General
-
Target
15f44ff0042e4fa5bd23a5b252152b6b.exe
-
Size
11KB
-
MD5
15f44ff0042e4fa5bd23a5b252152b6b
-
SHA1
d25259c4c5df9a46249eb233f5451d85d4164373
-
SHA256
5958f83abaef9184409a178b8d79a34d136c3dcbb0db3ac1f615fb0714f792ae
-
SHA512
1243c1a0de531aa6cb35d28a7461dabdea566cf1c7677b175ea9c024a4ef2e91de44b0f1d73f018d796f5485bb479b423f2dad2b1d11475450d0bfa6b177dc41
-
SSDEEP
192:RyirsYZFsmtabUmvf28YDXdxXe3c2irvrjvRdHMsNyuuZTQZ:IirsYZuGaIrXdVe3c2irvHvs9uuZ6
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 1272 thermaltinck.exe -
resource yara_rule behavioral2/memory/4964-0-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/files/0x0009000000023111-5.dat upx behavioral2/memory/4964-8-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/1272-10-0x0000000000400000-0x000000000040E000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\thermaltinc.dll 15f44ff0042e4fa5bd23a5b252152b6b.exe File created C:\Windows\SysWOW64\thermaltinck.exe 15f44ff0042e4fa5bd23a5b252152b6b.exe File opened for modification C:\Windows\SysWOW64\thermaltinck.exe 15f44ff0042e4fa5bd23a5b252152b6b.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4964 15f44ff0042e4fa5bd23a5b252152b6b.exe 4964 15f44ff0042e4fa5bd23a5b252152b6b.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4964 wrote to memory of 1272 4964 15f44ff0042e4fa5bd23a5b252152b6b.exe 96 PID 4964 wrote to memory of 1272 4964 15f44ff0042e4fa5bd23a5b252152b6b.exe 96 PID 4964 wrote to memory of 1272 4964 15f44ff0042e4fa5bd23a5b252152b6b.exe 96 PID 4964 wrote to memory of 4136 4964 15f44ff0042e4fa5bd23a5b252152b6b.exe 98 PID 4964 wrote to memory of 4136 4964 15f44ff0042e4fa5bd23a5b252152b6b.exe 98 PID 4964 wrote to memory of 4136 4964 15f44ff0042e4fa5bd23a5b252152b6b.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\15f44ff0042e4fa5bd23a5b252152b6b.exe"C:\Users\Admin\AppData\Local\Temp\15f44ff0042e4fa5bd23a5b252152b6b.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Windows\SysWOW64\thermaltinck.exeC:\Windows\system32\thermaltinck.exe ˜‰2⤵
- Executes dropped EXE
PID:1272
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\15f44ff0042e4fa5bd23a5b252152b6b.exe.bat2⤵PID:4136
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182B
MD5db134f246153e877841383c14859da9f
SHA1c9bbf51bb3b5fc0d91cbb712b673b227c1f7dd35
SHA2564fd7d6ccb52867c013b2b42a5558fe9171912ca46b4c2d6358699bf1a02e8d54
SHA512800d5c5f8408824e1a7867d556529582fda5a8b732660252328e10cd424bd1c07f16f49fa859342dd3214f0b10bd06b9ed40ff0aef71a9900d9c041e35724295
-
Filesize
11KB
MD515f44ff0042e4fa5bd23a5b252152b6b
SHA1d25259c4c5df9a46249eb233f5451d85d4164373
SHA2565958f83abaef9184409a178b8d79a34d136c3dcbb0db3ac1f615fb0714f792ae
SHA5121243c1a0de531aa6cb35d28a7461dabdea566cf1c7677b175ea9c024a4ef2e91de44b0f1d73f018d796f5485bb479b423f2dad2b1d11475450d0bfa6b177dc41