Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10pluto/file...oS.exe
windows7-x64
1pluto/file...oS.exe
windows10-2004-x64
1pluto/file...V2.exe
windows7-x64
1pluto/file...V2.exe
windows10-2004-x64
1pluto/file...IT.bat
windows7-x64
1pluto/file...IT.bat
windows10-2004-x64
1pluto/file...er.bat
windows7-x64
1pluto/file...er.bat
windows10-2004-x64
1pluto/file...er.exe
windows7-x64
1pluto/file...er.exe
windows10-2004-x64
1pluto/file...in.bat
windows7-x64
1pluto/file...in.bat
windows10-2004-x64
1pluto/file...ol.exe
windows7-x64
7pluto/file...ol.exe
windows10-2004-x64
7pluto/file...of.exe
windows7-x64
1pluto/file...of.exe
windows10-2004-x64
1pluto/file...rk.exe
windows7-x64
7pluto/file...rk.exe
windows10-2004-x64
9pluto/file...r3.exe
windows7-x64
7pluto/file...r3.exe
windows10-2004-x64
7pluto/files/info.bat
windows7-x64
1pluto/files/info.bat
windows10-2004-x64
1pluto/file...up.exe
windows7-x64
7pluto/file...up.exe
windows10-2004-x64
7pluto/files/pScan.exe
windows7-x64
1pluto/files/pScan.exe
windows10-2004-x64
1pluto/file...ec.bat
windows7-x64
1pluto/file...ec.bat
windows10-2004-x64
1pluto/files/putty.exe
windows7-x64
1pluto/files/putty.exe
windows10-2004-x64
1pluto/file...mp.exe
windows7-x64
1pluto/file...mp.exe
windows10-2004-x64
1Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
30/06/2024, 08:48
Behavioral task
behavioral1
Sample
pluto/files/AnDDoS.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
pluto/files/AnDDoS.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
pluto/files/Dox_Tool_V2.exe
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
pluto/files/Dox_Tool_V2.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
pluto/files/IPTOOLKIT.bat
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
pluto/files/IPTOOLKIT.bat
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
pluto/files/Pinger.bat
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
pluto/files/Pinger.bat
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
pluto/files/PortScanner.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
pluto/files/PortScanner.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
pluto/files/SMB-Bruteforce-main.bat
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
pluto/files/SMB-Bruteforce-main.bat
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
pluto/files/Wifi-Multitool.exe
Resource
win7-20240611-en
Behavioral task
behavioral14
Sample
pluto/files/Wifi-Multitool.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
pluto/files/arpspoof.exe
Resource
win7-20240611-en
Behavioral task
behavioral16
Sample
pluto/files/arpspoof.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral17
Sample
pluto/files/doxing-framework.exe
Resource
win7-20240508-en
Behavioral task
behavioral18
Sample
pluto/files/doxing-framework.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral19
Sample
pluto/files/emailbomber3.exe
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
pluto/files/emailbomber3.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral21
Sample
pluto/files/info.bat
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
pluto/files/info.bat
Resource
win10v2004-20240611-en
Behavioral task
behavioral23
Sample
pluto/files/iplookup.exe
Resource
win7-20240419-en
Behavioral task
behavioral24
Sample
pluto/files/iplookup.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral25
Sample
pluto/files/pScan.exe
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
pluto/files/pScan.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
pluto/files/psexec.bat
Resource
win7-20240611-en
Behavioral task
behavioral28
Sample
pluto/files/psexec.bat
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
pluto/files/putty.exe
Resource
win7-20240508-en
Behavioral task
behavioral30
Sample
pluto/files/putty.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
pluto/files/rpcdump.exe
Resource
win7-20240611-en
Behavioral task
behavioral32
Sample
pluto/files/rpcdump.exe
Resource
win10v2004-20240611-en
General
-
Target
pluto/files/IPTOOLKIT.bat
-
Size
4KB
-
MD5
de4abb02e5c7765e581ec1cdd04a3fbf
-
SHA1
06f4c26d625446e1f84341b2b3a33c2e6efd54c6
-
SHA256
c19950c0c0466185fd4448011d0c7c8ef38b61087a15b9e9397ecf8e78735cf7
-
SHA512
b690e4e9004d91f2bb9cbb7dc712e1715d01323098f7f774d6162007d55376a2568c49a603e45bfb20706b7ead1f37f7cfa92250af83a69b2ee6ff5e3db3fc93
-
SSDEEP
96:RrExshDl8df//RcjGgydEDUjZzDffL5oEr6nriXoUi:RreshDetJcjTqEDUjZzbfL5KriYUi
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3312 powershell.exe 3312 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3312 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4704 wrote to memory of 4908 4704 cmd.exe 84 PID 4704 wrote to memory of 4908 4704 cmd.exe 84 PID 4704 wrote to memory of 2644 4704 cmd.exe 85 PID 4704 wrote to memory of 2644 4704 cmd.exe 85 PID 4704 wrote to memory of 3312 4704 cmd.exe 86 PID 4704 wrote to memory of 3312 4704 cmd.exe 86
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\pluto\files\IPTOOLKIT.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Windows\system32\mode.commode 75, 302⤵PID:4908
-
-
C:\Windows\system32\chcp.comchcp 650012⤵PID:2644
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell exit2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3312
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82