Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3Raptor_Mul..._1.rar
windows7-x64
7Raptor_Mul..._1.rar
windows10-2004-x64
7Raptor Mul...ICENSE
windows7-x64
1Raptor Mul...ICENSE
windows10-2004-x64
1Raptor Mul...er.bat
windows7-x64
1Raptor Mul...er.bat
windows10-2004-x64
1Raptor Mul...DME.md
windows7-x64
3Raptor Mul...DME.md
windows10-2004-x64
3Raptor Mul...gin.py
windows7-x64
3Raptor Mul...gin.py
windows10-2004-x64
3Raptor Mul...tor.py
windows7-x64
3Raptor Mul...tor.py
windows10-2004-x64
3Raptor Mul...er.exe
windows7-x64
1Raptor Mul...er.exe
windows10-2004-x64
1Raptor Mul...id.txt
windows7-x64
1Raptor Mul...id.txt
windows10-2004-x64
1Raptor Mul...ls.txt
windows7-x64
1Raptor Mul...ls.txt
windows10-2004-x64
1Raptor Mul...es.txt
windows7-x64
1Raptor Mul...es.txt
windows10-2004-x64
1Raptor Mul...ns.txt
windows7-x64
1Raptor Mul...ns.txt
windows10-2004-x64
1Raptor Mul...nt.txt
windows7-x64
1Raptor Mul...nt.txt
windows10-2004-x64
1Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/02/2024, 21:56
Static task
static1
Behavioral task
behavioral1
Sample
Raptor_MultiTool_1.rar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Raptor_MultiTool_1.rar
Resource
win10v2004-20240221-en
Behavioral task
behavioral3
Sample
Raptor MultiTool/LICENSE
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Raptor MultiTool/LICENSE
Resource
win10v2004-20240221-en
Behavioral task
behavioral5
Sample
Raptor MultiTool/PackageInstaller.bat
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Raptor MultiTool/PackageInstaller.bat
Resource
win10v2004-20240221-en
Behavioral task
behavioral7
Sample
Raptor MultiTool/README.md
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
Raptor MultiTool/README.md
Resource
win10v2004-20240221-en
Behavioral task
behavioral9
Sample
Raptor MultiTool/Raptor-Login.py
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
Raptor MultiTool/Raptor-Login.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral11
Sample
Raptor MultiTool/Raptor.py
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
Raptor MultiTool/Raptor.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral13
Sample
Raptor MultiTool/chromedriver.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
Raptor MultiTool/chromedriver.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral15
Sample
Raptor MultiTool/nuking/Member_id.txt
Resource
win7-20240220-en
Behavioral task
behavioral16
Sample
Raptor MultiTool/nuking/Member_id.txt
Resource
win10v2004-20240221-en
Behavioral task
behavioral17
Sample
Raptor MultiTool/nuking/channels.txt
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
Raptor MultiTool/nuking/channels.txt
Resource
win10v2004-20240221-en
Behavioral task
behavioral19
Sample
Raptor MultiTool/nuking/roles.txt
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
Raptor MultiTool/nuking/roles.txt
Resource
win10v2004-20240221-en
Behavioral task
behavioral21
Sample
Raptor MultiTool/tokens.txt
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
Raptor MultiTool/tokens.txt
Resource
win10v2004-20240221-en
Behavioral task
behavioral23
Sample
Raptor MultiTool/useragent.txt
Resource
win7-20240220-en
Behavioral task
behavioral24
Sample
Raptor MultiTool/useragent.txt
Resource
win10v2004-20240221-en
General
-
Target
Raptor MultiTool/Raptor.py
-
Size
164KB
-
MD5
e2c354e44b0767bf9d5df1713ee5875b
-
SHA1
2ab39c14c778ee857d90319459be9736cf57bad4
-
SHA256
30a3f4ac8bed4961025c3e5e29ec70f58d09fa58cd4e3b0f1b848351d1f0c082
-
SHA512
c69b8836e05ad32142ea5a96cbb67072917495f950c393082d6e2843f65a4e7984780ddcca9c93b629e450b819f71462804fd1f50fe26e8b8358884c242390d9
-
SSDEEP
3072:e+gfgegrQeg4gseiQeepeIQWgmgQgsYNVCQygFghgoQQgRggQIgCN+LZL5L7gbgt:e+gfgegrQeg4gseiQeepeIQWgmgQgFTe
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\py_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\py_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.py rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\py_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2588 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2588 AcroRd32.exe 2588 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2020 wrote to memory of 2780 2020 cmd.exe 29 PID 2020 wrote to memory of 2780 2020 cmd.exe 29 PID 2020 wrote to memory of 2780 2020 cmd.exe 29 PID 2780 wrote to memory of 2588 2780 rundll32.exe 30 PID 2780 wrote to memory of 2588 2780 rundll32.exe 30 PID 2780 wrote to memory of 2588 2780 rundll32.exe 30 PID 2780 wrote to memory of 2588 2780 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Raptor MultiTool\Raptor.py"1⤵
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Raptor MultiTool\Raptor.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Raptor MultiTool\Raptor.py"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2588
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5f2a1a93c478b96686da5afef9d60882c
SHA1db3b1929d2d452406809525a67027b8cd26e9d48
SHA25686b6e6e8efd5e25a8d8423916a7e65d559e643ffae4d2ec102ae69019a07f5f0
SHA5129141018a171fda643744774a27292204c66849a79cfa74e9bce7d58edc49ff564184a7b36abb6fbcab5d80c3c4c2850feb39d013dacfdc55a41d2d1dde59d754