Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

21/02/2024, 23:00

240221-2y8arsgh62 7

21/02/2024, 22:44

240221-2n9qvagg83 7

Analysis

  • max time kernel
    1794s
  • max time network
    1172s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    21/02/2024, 23:00

General

  • Target

    setup_rayman_forever_1.21_(28045).exe

  • Size

    114.0MB

  • MD5

    304cca5f14923730c76bb61f669be575

  • SHA1

    16366aa1f756cfdb42940d96d71e09a5803e4312

  • SHA256

    a86ab77791f9691f63ddee3442cabe3ee4e35583402d54d545c59c7348c43d46

  • SHA512

    9cf61badefc17ba524e11557b17ed66802498d00d806b4f2f6df93591901b6e0c926e3b4063b55b556c4536e3fe7eae972e7f87ea12ad8342b19bddf7a790919

  • SSDEEP

    3145728:cl2yJqmLfMG4+lN9GevkRYALzh7/daZpUOgLj/SwT4+Ukai:c3rMGDD4NTLzhjLOirPoi

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 7 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\setup_rayman_forever_1.21_(28045).exe
    "C:\Users\Admin\AppData\Local\Temp\setup_rayman_forever_1.21_(28045).exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2824
    • C:\Users\Admin\AppData\Local\Temp\is-COLG9.tmp\setup_rayman_forever_1.21_(28045).tmp
      "C:\Users\Admin\AppData\Local\Temp\is-COLG9.tmp\setup_rayman_forever_1.21_(28045).tmp" /SL5="$6015E,118917090,192512,C:\Users\Admin\AppData\Local\Temp\setup_rayman_forever_1.21_(28045).exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:1512

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-4AOHS.tmp\1207666643_english.jpg

    Filesize

    201KB

    MD5

    d2cfa87f8202435ed09f53f45ab3168c

    SHA1

    1e19521c009c5246daf0e0a581a9932c9f693df4

    SHA256

    d48b3a12fe1e182c20458379be1a51222c08723c8cb8daeac17a816558efd558

    SHA512

    744ae33a81bb20f9a63ded9997ed521ae17ca6fbe6f747310304260325676d2bbd70da8236248415c3082908764fc124ad17593b1574279ee3ebc2fbb283e177

  • C:\Users\Admin\AppData\Local\Temp\is-4AOHS.tmp\1428935726_english.jpg

    Filesize

    143KB

    MD5

    319b32ca3b40bbb8c68e4766ce6b9ffd

    SHA1

    8816a1ac65dbe676b3ada8cf69dd3ffde41fb8b5

    SHA256

    4d3bdc8e172a98578fc3b60c86f5c6309eb467bc69f58c5e0e59feb735c143e1

    SHA512

    b373c399e3a5557f7f31b2d2db8f4161ad8f7affb661ff8fb18902fff471e3f98d153bc7886d831b7106f95836e9f9841bfb9a74cc81a215e28d670bc4e355e2

  • C:\Users\Admin\AppData\Local\Temp\is-4AOHS.tmp\BigOK.png

    Filesize

    3KB

    MD5

    5b43a5d975a53f4fc1da67ce9f7784c1

    SHA1

    8543fa1e471030049942252b23cb22e0880c3af5

    SHA256

    59d8bb3e87a89ef523c0495addce38d69560af42aaa82f56dd41b12e6612c13a

    SHA512

    5dd5c4e9859a555a4a32da76f5231b44f7556274c6501da530b2cdd570bcb4675f710bee708322a40ed3ef9280c0d652b4e7ef0e9eaf128c08534f59291917f5

  • C:\Users\Admin\AppData\Local\Temp\is-4AOHS.tmp\EULAAccepted.png

    Filesize

    2KB

    MD5

    461dfeb75927bdb39f9db5348612a611

    SHA1

    b7893b1fff6801e37ee7337d876962a09184941e

    SHA256

    0de278f5ca6d8570d9bda592268a14a28b87d3631fea2d25721947397aaab79c

    SHA512

    68528cf45c81c2c024a672f42c2cd6d4f72c015b443f103ca21deb8ee2bec4f4027490e7f33b5338a87537b5bf7f255f2828aed149f622155ec89cc81687651b

  • C:\Users\Admin\AppData\Local\Temp\is-4AOHS.tmp\EULAShow.png

    Filesize

    1KB

    MD5

    c596bc9111edc702bbbb29b70984254f

    SHA1

    d4712c7b91ff4f8994e7907d31357c42eb47c738

    SHA256

    6112851daea2aaa7174e8cfac4a0f61c968bc090342503804c476eff47cc2462

    SHA512

    db50d0a39ec644873a03d64552fff1776cc94f016e8dfc8918e65aee94f7529a6de4637567b5e65c4ea988f3775785c4b52c2d96fe8dbc52b1e21ff59c737c2a

  • C:\Users\Admin\AppData\Local\Temp\is-4AOHS.tmp\background.jpg

    Filesize

    336KB

    MD5

    771f2758acfac4fc179770bf86e50bea

    SHA1

    81318cbc53590e45c721b7a89ed6fb9300ca9593

    SHA256

    049d41cd5400f1910e86e092d5be8cc30ddacc89eb004359b08f321346699cce

    SHA512

    022ed605af7b8cbe4376bc7ccf391da98b41c532a5100008e7dd4a9846e945d6e9dec271d46d3729abf926d01294a45bc37dee247842d8dfe23c62534cd0be9f

  • C:\Users\Admin\AppData\Local\Temp\is-4AOHS.tmp\botva2.dll

    Filesize

    35KB

    MD5

    0177746573eed407f8dca8a9e441aa49

    SHA1

    6b462adf78059d26cbc56b3311e3b97fcb8d05f7

    SHA256

    a4b61626a1626fdabec794e4f323484aa0644baa1c905a5dcf785dc34564f008

    SHA512

    d4ac96da2d72e121d1d63d64e78bcea155d62af828324b81889a3cd3928ceeb12f7a22e87e264e34498d100b57cdd3735d2ab2316e1a3bf7fa099ddb75c5071a

  • C:\Users\Admin\AppData\Local\Temp\is-4AOHS.tmp\btn_md5.png

    Filesize

    8KB

    MD5

    3befe9739354ee24a0b1ea8df05ce274

    SHA1

    ab0bda986a8c46aa19f57b75a2b7b22445a3c625

    SHA256

    b0193ab375f604fa4a25cabdea8f713babde1c07ab562ffc5679352c8e01db47

    SHA512

    ac016a59e0bfc9b22c376ae5d498c5660893a983d932b2bd502dabe032883c69e79ea8d93c2db49f95415c3cdb068e9f7d1d85527a4f9e68e065a989852d09dd

  • C:\Users\Admin\AppData\Local\Temp\is-4AOHS.tmp\crcdll.dll

    Filesize

    69KB

    MD5

    1d51fac9e2384eeb674199cfd5281d7d

    SHA1

    861dfdc121357d605d0cc3793266713788109eb2

    SHA256

    23e90ce5a1f2d634a7bf5d5d0522fafeea6df9e536e16f5ce91035d5197128ec

    SHA512

    921b00adfe43b883200960e8d0958d4e6b97f6d5cfc096ee277766a3e44cc7805a20877a4edf8bd4d9102bb71a20ac218a9a512f4f76bd751d3ef14f4e0a6eda

  • C:\Users\Admin\AppData\Local\Temp\is-4AOHS.tmp\error.png

    Filesize

    726B

    MD5

    df10adc25b673e74e19971c17bee5a98

    SHA1

    ee16fb1cf9491f5e611282f0574b27d76fede412

    SHA256

    142b16dc6239421691fa6e619d1a61e61176d89fa018a88b46893c29a57aad8b

    SHA512

    dc3de10e0321966cbbfb2e57b3b41da6f26dff0c7233a47469da58775b5c471e6b5181e4d4ffc81ef8b83dbcad74ccc1aad7678518f99c9185a441d2a23e010f

  • C:\Users\Admin\AppData\Local\Temp\is-4AOHS.tmp\innocallback.dll

    Filesize

    63KB

    MD5

    1c55ae5ef9980e3b1028447da6105c75

    SHA1

    f85218e10e6aa23b2f5a3ed512895b437e41b45c

    SHA256

    6afa2d104be6efe3d9a2ab96dbb75db31565dad64dd0b791e402ecc25529809f

    SHA512

    1ec4d52f49747b29cfd83e1a75fc6ae4101add68ada0b9add5770c10be6dffb004bb47d0854d50871ed8d77acf67d4e0445e97f0548a95c182e83b94ddf2eb6b

  • C:\Users\Admin\AppData\Local\Temp\is-4AOHS.tmp\ok.png

    Filesize

    1KB

    MD5

    103c1368e60806b1b7995a0894eacf87

    SHA1

    971392527f6e4b655044773132505c901a6b5469

    SHA256

    0d37d4421a39ca8852eb6760b8e914302bdc6cfcc7b170dc1b6c9bb9be148b7e

    SHA512

    652177e94438aff102f2ed873b26f0985ebed134763852b49b1ca2698463c1dbeb85152f19c8e18d397229ec5cb2cd1d17c61d454ab7c425a2cab540adc8228a

  • C:\Users\Admin\AppData\Local\Temp\is-4AOHS.tmp\slideshow.ini

    Filesize

    304B

    MD5

    d2928fbf554f7d2c291b303e0e7039d4

    SHA1

    cbc71c54230505adfe78c2745ab219e0adaefe86

    SHA256

    1aab5e047e89e6a7eba142ca670b5599965b7dff6f0d53aad6c0b7f0bf8831f1

    SHA512

    2685fef519271608b10eb372b0777701c2054735d86503500f2d7f756e3e6808a58a9f5a4aaff40c509071b4c47520b9f502936e14d50b153ec0517e46752cd1

  • C:\Users\Admin\AppData\Local\Temp\is-4AOHS.tmp\uninstall.dll

    Filesize

    691KB

    MD5

    7db706c324cc9b6fda497d081eed6e26

    SHA1

    ca97392e573af0cf61bfa3301801a85f2beea44c

    SHA256

    cc685dbcf798549ad1a51c1dde45462e2a451ec59f48ee91219182a3871cd5b0

    SHA512

    8edf1494d57d5e708faaff4170f21f435658be897a6fe0acf243ced0701a7fd574b3c973c5bc5e8d92815e966c98977e69ac1e3083ab00c11b072115527ffa19

  • C:\Users\Admin\AppData\Local\Temp\is-COLG9.tmp\setup_rayman_forever_1.21_(28045).tmp

    Filesize

    1.3MB

    MD5

    3d8b5ff4bd4c66d3617970db120168ae

    SHA1

    1a44a4b0279b74b8b6846fa955b321dc65cb1feb

    SHA256

    fec770706d7a740d426734459b01ed9ea9767626cff7f71a9cf5adb5fb1bf478

    SHA512

    4afd549f6232864cb91f15deab64e83261dd41402ee48ff4aef20ba0c4f17e67c975232387f01dc7ff64a7604d1a76121c840cc3fcc734bd1923cc97a114babc

  • memory/1512-140-0x0000000000860000-0x00000000009B2000-memory.dmp

    Filesize

    1.3MB

  • memory/1512-62-0x00000000051A0000-0x00000000051AE000-memory.dmp

    Filesize

    56KB

  • memory/1512-154-0x00000000051A0000-0x00000000051AE000-memory.dmp

    Filesize

    56KB

  • memory/1512-5-0x0000000000630000-0x0000000000631000-memory.dmp

    Filesize

    4KB

  • memory/1512-17-0x0000000002DD0000-0x0000000002E87000-memory.dmp

    Filesize

    732KB

  • memory/1512-138-0x00000000026A0000-0x00000000026A1000-memory.dmp

    Filesize

    4KB

  • memory/1512-152-0x0000000002DB0000-0x0000000002DC5000-memory.dmp

    Filesize

    84KB

  • memory/1512-11-0x0000000002DB0000-0x0000000002DC5000-memory.dmp

    Filesize

    84KB

  • memory/1512-142-0x0000000002DD0000-0x0000000002E87000-memory.dmp

    Filesize

    732KB

  • memory/1512-141-0x0000000002DB0000-0x0000000002DC5000-memory.dmp

    Filesize

    84KB

  • memory/1512-143-0x00000000051A0000-0x00000000051AE000-memory.dmp

    Filesize

    56KB

  • memory/1512-149-0x0000000000630000-0x0000000000631000-memory.dmp

    Filesize

    4KB

  • memory/2824-139-0x00000000008A0000-0x00000000008D9000-memory.dmp

    Filesize

    228KB

  • memory/2824-0-0x00000000008A0000-0x00000000008D9000-memory.dmp

    Filesize

    228KB