Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24/02/2024, 21:56

General

  • Target

    Raptor MultiTool/Raptor-Login.py

  • Size

    10.0MB

  • MD5

    0dd1c950fc2a4d4e3032caeb40ac11f0

  • SHA1

    77495a7c05ba4e2e532995c4eedc82a62c5eb171

  • SHA256

    e1dd6f14a8a4dab7c48f681e1d82ff8fc5cc38556d37c5000c136fd335cb875f

  • SHA512

    5eb8df2290e06b1f47825b7db20163b5fc4b0301b6c09a8474859499ee73b4ab2205b3bb6a669a726e83dc937a60e85faf15709e5bccf17e34c0a3c838fc8bf0

  • SSDEEP

    768:0RL7qOcrowVw/lfPIeHxONHGb2yafsTf6KFmfm55A:c7VcrLVw/lfPPHxOIb27kf6fWG

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Raptor MultiTool\Raptor-Login.py"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2940
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Raptor MultiTool\Raptor-Login.py
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2040
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Raptor MultiTool\Raptor-Login.py"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    1d95dd361e5d80a3efbc0f87efb7beed

    SHA1

    802a7efd0a0644a348d7c209b924ee2c90cd52f4

    SHA256

    e44813aae3647509ed9d8afe42cef505d427a6c4ae093f44d6af05699e095ebc

    SHA512

    a55a18db664474fad5e6814327956d85d2ca40a80d6d46345f5a4cfbb275ebe86239ef5feaae7fa66600c9ab1f02e5be00d05358bc99ad7f1024f29e8993c8a7