Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3Raptor_Mul..._1.rar
windows7-x64
7Raptor_Mul..._1.rar
windows10-2004-x64
7Raptor Mul...ICENSE
windows7-x64
1Raptor Mul...ICENSE
windows10-2004-x64
1Raptor Mul...er.bat
windows7-x64
1Raptor Mul...er.bat
windows10-2004-x64
1Raptor Mul...DME.md
windows7-x64
3Raptor Mul...DME.md
windows10-2004-x64
3Raptor Mul...gin.py
windows7-x64
3Raptor Mul...gin.py
windows10-2004-x64
3Raptor Mul...tor.py
windows7-x64
3Raptor Mul...tor.py
windows10-2004-x64
3Raptor Mul...er.exe
windows7-x64
1Raptor Mul...er.exe
windows10-2004-x64
1Raptor Mul...id.txt
windows7-x64
1Raptor Mul...id.txt
windows10-2004-x64
1Raptor Mul...ls.txt
windows7-x64
1Raptor Mul...ls.txt
windows10-2004-x64
1Raptor Mul...es.txt
windows7-x64
1Raptor Mul...es.txt
windows10-2004-x64
1Raptor Mul...ns.txt
windows7-x64
1Raptor Mul...ns.txt
windows10-2004-x64
1Raptor Mul...nt.txt
windows7-x64
1Raptor Mul...nt.txt
windows10-2004-x64
1Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/02/2024, 21:56
Static task
static1
Behavioral task
behavioral1
Sample
Raptor_MultiTool_1.rar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Raptor_MultiTool_1.rar
Resource
win10v2004-20240221-en
Behavioral task
behavioral3
Sample
Raptor MultiTool/LICENSE
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Raptor MultiTool/LICENSE
Resource
win10v2004-20240221-en
Behavioral task
behavioral5
Sample
Raptor MultiTool/PackageInstaller.bat
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Raptor MultiTool/PackageInstaller.bat
Resource
win10v2004-20240221-en
Behavioral task
behavioral7
Sample
Raptor MultiTool/README.md
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
Raptor MultiTool/README.md
Resource
win10v2004-20240221-en
Behavioral task
behavioral9
Sample
Raptor MultiTool/Raptor-Login.py
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
Raptor MultiTool/Raptor-Login.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral11
Sample
Raptor MultiTool/Raptor.py
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
Raptor MultiTool/Raptor.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral13
Sample
Raptor MultiTool/chromedriver.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
Raptor MultiTool/chromedriver.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral15
Sample
Raptor MultiTool/nuking/Member_id.txt
Resource
win7-20240220-en
Behavioral task
behavioral16
Sample
Raptor MultiTool/nuking/Member_id.txt
Resource
win10v2004-20240221-en
Behavioral task
behavioral17
Sample
Raptor MultiTool/nuking/channels.txt
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
Raptor MultiTool/nuking/channels.txt
Resource
win10v2004-20240221-en
Behavioral task
behavioral19
Sample
Raptor MultiTool/nuking/roles.txt
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
Raptor MultiTool/nuking/roles.txt
Resource
win10v2004-20240221-en
Behavioral task
behavioral21
Sample
Raptor MultiTool/tokens.txt
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
Raptor MultiTool/tokens.txt
Resource
win10v2004-20240221-en
Behavioral task
behavioral23
Sample
Raptor MultiTool/useragent.txt
Resource
win7-20240220-en
Behavioral task
behavioral24
Sample
Raptor MultiTool/useragent.txt
Resource
win10v2004-20240221-en
General
-
Target
Raptor MultiTool/Raptor-Login.py
-
Size
10.0MB
-
MD5
0dd1c950fc2a4d4e3032caeb40ac11f0
-
SHA1
77495a7c05ba4e2e532995c4eedc82a62c5eb171
-
SHA256
e1dd6f14a8a4dab7c48f681e1d82ff8fc5cc38556d37c5000c136fd335cb875f
-
SHA512
5eb8df2290e06b1f47825b7db20163b5fc4b0301b6c09a8474859499ee73b4ab2205b3bb6a669a726e83dc937a60e85faf15709e5bccf17e34c0a3c838fc8bf0
-
SSDEEP
768:0RL7qOcrowVw/lfPIeHxONHGb2yafsTf6KFmfm55A:c7VcrLVw/lfPPHxOIb27kf6fWG
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\py_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\py_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.py rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\py_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2668 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2668 AcroRd32.exe 2668 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2940 wrote to memory of 2040 2940 cmd.exe 29 PID 2940 wrote to memory of 2040 2940 cmd.exe 29 PID 2940 wrote to memory of 2040 2940 cmd.exe 29 PID 2040 wrote to memory of 2668 2040 rundll32.exe 30 PID 2040 wrote to memory of 2668 2040 rundll32.exe 30 PID 2040 wrote to memory of 2668 2040 rundll32.exe 30 PID 2040 wrote to memory of 2668 2040 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Raptor MultiTool\Raptor-Login.py"1⤵
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Raptor MultiTool\Raptor-Login.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Raptor MultiTool\Raptor-Login.py"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2668
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD51d95dd361e5d80a3efbc0f87efb7beed
SHA1802a7efd0a0644a348d7c209b924ee2c90cd52f4
SHA256e44813aae3647509ed9d8afe42cef505d427a6c4ae093f44d6af05699e095ebc
SHA512a55a18db664474fad5e6814327956d85d2ca40a80d6d46345f5a4cfbb275ebe86239ef5feaae7fa66600c9ab1f02e5be00d05358bc99ad7f1024f29e8993c8a7