Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    11/09/2024, 22:31

General

  • Target

    Raptor-Multi-Tool-main/Raptor.py

  • Size

    164KB

  • MD5

    e2c354e44b0767bf9d5df1713ee5875b

  • SHA1

    2ab39c14c778ee857d90319459be9736cf57bad4

  • SHA256

    30a3f4ac8bed4961025c3e5e29ec70f58d09fa58cd4e3b0f1b848351d1f0c082

  • SHA512

    c69b8836e05ad32142ea5a96cbb67072917495f950c393082d6e2843f65a4e7984780ddcca9c93b629e450b819f71462804fd1f50fe26e8b8358884c242390d9

  • SSDEEP

    3072:e+gfgegrQeg4gseiQeepeIQWgmgQgsYNVCQygFghgoQQgRggQIgCN+LZL5L7gbgt:e+gfgegrQeg4gseiQeepeIQWgmgQgFTe

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Raptor-Multi-Tool-main\Raptor.py
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2436
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Raptor-Multi-Tool-main\Raptor.py
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2612
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Raptor-Multi-Tool-main\Raptor.py"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2744

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    6ce1b1cad7404c728266bcb37da3a34c

    SHA1

    88edfce74e23658a555b84b2c81400d29785bbc0

    SHA256

    77993f49bf55bd910967a0fcc2769a6c7d3ddc286f6be5ec600d1fb6181cbcc8

    SHA512

    771301dfd217a3100cf0c86dcbb88e754986e3073d7a4c2a6630a2adfde2d55344c1413f63e2b9500499d24c1f5f58142448739f31e4d0815502ec8286a45a65