Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24/02/2024, 21:56

General

  • Target

    Raptor MultiTool/Raptor.py

  • Size

    164KB

  • MD5

    e2c354e44b0767bf9d5df1713ee5875b

  • SHA1

    2ab39c14c778ee857d90319459be9736cf57bad4

  • SHA256

    30a3f4ac8bed4961025c3e5e29ec70f58d09fa58cd4e3b0f1b848351d1f0c082

  • SHA512

    c69b8836e05ad32142ea5a96cbb67072917495f950c393082d6e2843f65a4e7984780ddcca9c93b629e450b819f71462804fd1f50fe26e8b8358884c242390d9

  • SSDEEP

    3072:e+gfgegrQeg4gseiQeepeIQWgmgQgsYNVCQygFghgoQQgRggQIgCN+LZL5L7gbgt:e+gfgegrQeg4gseiQeepeIQWgmgQgFTe

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Raptor MultiTool\Raptor.py"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Raptor MultiTool\Raptor.py
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2780
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Raptor MultiTool\Raptor.py"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2588

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    f2a1a93c478b96686da5afef9d60882c

    SHA1

    db3b1929d2d452406809525a67027b8cd26e9d48

    SHA256

    86b6e6e8efd5e25a8d8423916a7e65d559e643ffae4d2ec102ae69019a07f5f0

    SHA512

    9141018a171fda643744774a27292204c66849a79cfa74e9bce7d58edc49ff564184a7b36abb6fbcab5d80c3c4c2850feb39d013dacfdc55a41d2d1dde59d754