Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10pluto/file...oS.exe
windows7-x64
1pluto/file...oS.exe
windows10-2004-x64
1pluto/file...V2.exe
windows7-x64
1pluto/file...V2.exe
windows10-2004-x64
1pluto/file...IT.bat
windows7-x64
1pluto/file...IT.bat
windows10-2004-x64
1pluto/file...er.bat
windows7-x64
1pluto/file...er.bat
windows10-2004-x64
1pluto/file...er.exe
windows7-x64
1pluto/file...er.exe
windows10-2004-x64
1pluto/file...in.bat
windows7-x64
1pluto/file...in.bat
windows10-2004-x64
1pluto/file...ol.exe
windows7-x64
7pluto/file...ol.exe
windows10-2004-x64
7pluto/file...of.exe
windows7-x64
1pluto/file...of.exe
windows10-2004-x64
1pluto/file...rk.exe
windows7-x64
7pluto/file...rk.exe
windows10-2004-x64
9pluto/file...r3.exe
windows7-x64
7pluto/file...r3.exe
windows10-2004-x64
7pluto/files/info.bat
windows7-x64
1pluto/files/info.bat
windows10-2004-x64
1pluto/file...up.exe
windows7-x64
7pluto/file...up.exe
windows10-2004-x64
7pluto/files/pScan.exe
windows7-x64
1pluto/files/pScan.exe
windows10-2004-x64
1pluto/file...ec.bat
windows7-x64
1pluto/file...ec.bat
windows10-2004-x64
1pluto/files/putty.exe
windows7-x64
1pluto/files/putty.exe
windows10-2004-x64
1pluto/file...mp.exe
windows7-x64
1pluto/file...mp.exe
windows10-2004-x64
1Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30/06/2024, 08:48
Behavioral task
behavioral1
Sample
pluto/files/AnDDoS.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
pluto/files/AnDDoS.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
pluto/files/Dox_Tool_V2.exe
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
pluto/files/Dox_Tool_V2.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
pluto/files/IPTOOLKIT.bat
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
pluto/files/IPTOOLKIT.bat
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
pluto/files/Pinger.bat
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
pluto/files/Pinger.bat
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
pluto/files/PortScanner.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
pluto/files/PortScanner.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
pluto/files/SMB-Bruteforce-main.bat
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
pluto/files/SMB-Bruteforce-main.bat
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
pluto/files/Wifi-Multitool.exe
Resource
win7-20240611-en
Behavioral task
behavioral14
Sample
pluto/files/Wifi-Multitool.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
pluto/files/arpspoof.exe
Resource
win7-20240611-en
Behavioral task
behavioral16
Sample
pluto/files/arpspoof.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral17
Sample
pluto/files/doxing-framework.exe
Resource
win7-20240508-en
Behavioral task
behavioral18
Sample
pluto/files/doxing-framework.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral19
Sample
pluto/files/emailbomber3.exe
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
pluto/files/emailbomber3.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral21
Sample
pluto/files/info.bat
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
pluto/files/info.bat
Resource
win10v2004-20240611-en
Behavioral task
behavioral23
Sample
pluto/files/iplookup.exe
Resource
win7-20240419-en
Behavioral task
behavioral24
Sample
pluto/files/iplookup.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral25
Sample
pluto/files/pScan.exe
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
pluto/files/pScan.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
pluto/files/psexec.bat
Resource
win7-20240611-en
Behavioral task
behavioral28
Sample
pluto/files/psexec.bat
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
pluto/files/putty.exe
Resource
win7-20240508-en
Behavioral task
behavioral30
Sample
pluto/files/putty.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
pluto/files/rpcdump.exe
Resource
win7-20240611-en
Behavioral task
behavioral32
Sample
pluto/files/rpcdump.exe
Resource
win10v2004-20240611-en
General
-
Target
pluto/files/info.bat
-
Size
1008B
-
MD5
e85f0ba77dcf1c969645d2332c4acf91
-
SHA1
2950ca197922f4ba113234c64d70a219895386e6
-
SHA256
68196f1acf2cd2ee6015d79e6fc66a8ef2d878527fd7d9cef290c2a011b4c6ec
-
SHA512
01ac8bc0aa4e7c4565ef18ce80ce8887d5c22a9e3c3cd88dbbf9f3335d1b0793aa5ff5b86ec781663c4c5bf63a509ac7ac331ec3cf079d4bbcfc353ab4d1b619
Malware Config
Signatures
-
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 2360 systeminfo.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 1948 wrote to memory of 2360 1948 cmd.exe 29 PID 1948 wrote to memory of 2360 1948 cmd.exe 29 PID 1948 wrote to memory of 2360 1948 cmd.exe 29 PID 1948 wrote to memory of 2660 1948 cmd.exe 32 PID 1948 wrote to memory of 2660 1948 cmd.exe 32 PID 1948 wrote to memory of 2660 1948 cmd.exe 32 PID 2660 wrote to memory of 2544 2660 cmd.exe 33 PID 2660 wrote to memory of 2544 2660 cmd.exe 33 PID 2660 wrote to memory of 2544 2660 cmd.exe 33 PID 2660 wrote to memory of 2644 2660 cmd.exe 34 PID 2660 wrote to memory of 2644 2660 cmd.exe 34 PID 2660 wrote to memory of 2644 2660 cmd.exe 34 PID 1948 wrote to memory of 1604 1948 cmd.exe 35 PID 1948 wrote to memory of 1604 1948 cmd.exe 35 PID 1948 wrote to memory of 1604 1948 cmd.exe 35 PID 1604 wrote to memory of 2652 1604 cmd.exe 36 PID 1604 wrote to memory of 2652 1604 cmd.exe 36 PID 1604 wrote to memory of 2652 1604 cmd.exe 36 PID 1604 wrote to memory of 2692 1604 cmd.exe 37 PID 1604 wrote to memory of 2692 1604 cmd.exe 37 PID 1604 wrote to memory of 2692 1604 cmd.exe 37 PID 1948 wrote to memory of 2624 1948 cmd.exe 38 PID 1948 wrote to memory of 2624 1948 cmd.exe 38 PID 1948 wrote to memory of 2624 1948 cmd.exe 38 PID 2624 wrote to memory of 2980 2624 cmd.exe 39 PID 2624 wrote to memory of 2980 2624 cmd.exe 39 PID 2624 wrote to memory of 2980 2624 cmd.exe 39 PID 2624 wrote to memory of 2520 2624 cmd.exe 40 PID 2624 wrote to memory of 2520 2624 cmd.exe 40 PID 2624 wrote to memory of 2520 2624 cmd.exe 40 PID 1948 wrote to memory of 2432 1948 cmd.exe 41 PID 1948 wrote to memory of 2432 1948 cmd.exe 41 PID 1948 wrote to memory of 2432 1948 cmd.exe 41 PID 2432 wrote to memory of 2636 2432 cmd.exe 42 PID 2432 wrote to memory of 2636 2432 cmd.exe 42 PID 2432 wrote to memory of 2636 2432 cmd.exe 42 PID 2432 wrote to memory of 328 2432 cmd.exe 43 PID 2432 wrote to memory of 328 2432 cmd.exe 43 PID 2432 wrote to memory of 328 2432 cmd.exe 43
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\pluto\files\info.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\system32\systeminfo.exesysteminfo2⤵
- Gathers system information
PID:2360
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c type C:\Users\Admin\AppData\Local\Temp\info.txt | find "Registered Owner"2⤵
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" type C:\Users\Admin\AppData\Local\Temp\info.txt "3⤵PID:2544
-
-
C:\Windows\system32\find.exefind "Registered Owner"3⤵PID:2644
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c type C:\Users\Admin\AppData\Local\Temp\info.txt | find "OS Name"2⤵
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" type C:\Users\Admin\AppData\Local\Temp\info.txt "3⤵PID:2652
-
-
C:\Windows\system32\find.exefind "OS Name"3⤵PID:2692
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c type C:\Users\Admin\AppData\Local\Temp\info.txt | find "System Manufacturer"2⤵
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" type C:\Users\Admin\AppData\Local\Temp\info.txt "3⤵PID:2980
-
-
C:\Windows\system32\find.exefind "System Manufacturer"3⤵PID:2520
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c type C:\Users\Admin\AppData\Local\Temp\info.txt | find "Product ID"2⤵
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" type C:\Users\Admin\AppData\Local\Temp\info.txt "3⤵PID:2636
-
-
C:\Windows\system32\find.exefind "Product ID"3⤵PID:328
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b88c69a592c4598d4b5b341e7ea698a9
SHA14a4ea6abb09d19ef08d1c7f032e72bda1cf72ba4
SHA256c73e0f38fc84e18b7d51508ad511df8e9e9aa2005622be11d157b041b27b97cb
SHA512d7ef986b0eddca7b7f645d21a1b0ea9d027e08bff217e46fac0afca6a9ab783482ea3b2ac2903d802d899a1e5909cdfb2bd401685bff992dd643352031740c06