Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
1Static
static
1GRID-Autos...t).apk
android-10-x64
help_scree...en.xml
windows7-x64
1help_scree...en.xml
windows10-2004-x64
1help_scree...en.xml
windows7-x64
1help_scree...en.xml
windows10-2004-x64
1help_scree...ja.xml
windows7-x64
1help_scree...ja.xml
windows10-2004-x64
1help_scree...zh.xml
windows7-x64
1help_scree...zh.xml
windows10-2004-x64
1help_scree...ja.xml
windows7-x64
1help_scree...ja.xml
windows10-2004-x64
1help_scree...ls.xml
windows7-x64
1help_scree...ls.xml
windows10-2004-x64
1help_scree...zh.xml
windows7-x64
1help_scree...zh.xml
windows10-2004-x64
1Analysis
-
max time kernel
148s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
08/07/2023, 20:59
Static task
static1
Behavioral task
behavioral1
Sample
GRID-Autosport-v1-9-1RC3_(AndroidApkData.net).apk
Resource
android-x64-20230621-en
Behavioral task
behavioral2
Sample
help_screen_font_en.xml
Resource
win7-20230703-en
Behavioral task
behavioral3
Sample
help_screen_font_en.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral4
Sample
help_screen_font_italic_en.xml
Resource
win7-20230703-en
Behavioral task
behavioral5
Sample
help_screen_font_italic_en.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral6
Sample
help_screen_font_italic_ja.xml
Resource
win7-20230705-en
Behavioral task
behavioral7
Sample
help_screen_font_italic_ja.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral8
Sample
help_screen_font_italic_zh.xml
Resource
win7-20230703-en
Behavioral task
behavioral9
Sample
help_screen_font_italic_zh.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral10
Sample
help_screen_font_ja.xml
Resource
win7-20230703-en
Behavioral task
behavioral11
Sample
help_screen_font_ja.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral12
Sample
help_screen_font_specials.xml
Resource
win7-20230703-en
Behavioral task
behavioral13
Sample
help_screen_font_specials.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral14
Sample
help_screen_font_zh.xml
Resource
win7-20230703-en
Behavioral task
behavioral15
Sample
help_screen_font_zh.xml
Resource
win10v2004-20230703-en
General
-
Target
help_screen_font_zh.xml
-
Size
2.5MB
-
MD5
973ae314678783813bb938a70faf0512
-
SHA1
5de77e09f643ef2574f51bb4f465688b9c64761d
-
SHA256
c536e3cc4a8eebce69115cda5920e7eeaf50b2aa3a5f56e6867b1b7647cc8cc0
-
SHA512
625e1d08c40a8d903497dfa370f66af6245b31145fbc1a12d58f41cdddacbe9b5f910f50a5c31faf5ceb5142bdab5fde764ea1ca7b3be8a34f5450e2dc415037
-
SSDEEP
1536:A1KeuR/n71cO5H1rPokDEnAFhh0x5FH5PR4xMVB3mCXQvQPyi0ulP7OJCFOcMa02:y9
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{65C4BD11-1DD2-11EE-B8B5-DEF85CD8AB75} = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f08bee3cdfb1d901 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ab35dbc53fd45498f88cda789e11c50000000000200000000001066000000010000200000001afe15851c9803e1c99a2c358f19d118aa0a6cda6a101dad79e9996f8aed7962000000000e8000000002000020000000ef72786ec3eb7934d17412e238b624bfd6b9ac77a298199c5130426013153ccb20000000282b7508186a2aec5fb827f0ae2c21efc814040453a92df699aff43687a27c3c400000004f32f6eba44120c4eef3df2f6aab3ae9c68998c7e9e4232b6e2d62940a388fb756b2aac396b556e3b87e810e864a974e8ea34a272569c824f8dbcaf39dcc84ee IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "395614973" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3000 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 1192 IEXPLORE.EXE 1192 IEXPLORE.EXE 1192 IEXPLORE.EXE 1192 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2304 3032 MSOXMLED.EXE 28 PID 3032 wrote to memory of 2304 3032 MSOXMLED.EXE 28 PID 3032 wrote to memory of 2304 3032 MSOXMLED.EXE 28 PID 3032 wrote to memory of 2304 3032 MSOXMLED.EXE 28 PID 2304 wrote to memory of 3000 2304 iexplore.exe 29 PID 2304 wrote to memory of 3000 2304 iexplore.exe 29 PID 2304 wrote to memory of 3000 2304 iexplore.exe 29 PID 2304 wrote to memory of 3000 2304 iexplore.exe 29 PID 3000 wrote to memory of 1192 3000 IEXPLORE.EXE 30 PID 3000 wrote to memory of 1192 3000 IEXPLORE.EXE 30 PID 3000 wrote to memory of 1192 3000 IEXPLORE.EXE 30 PID 3000 wrote to memory of 1192 3000 IEXPLORE.EXE 30
Processes
-
C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\help_screen_font_zh.xml"1⤵
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome2⤵
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3000 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1192
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ffd50e2710a8b6265411db13e0f28b4
SHA1d6d260e61670b473542d967dbdb1cdb6cdefcbe2
SHA256be13e4e2664f4f5e7ad22739dfbe2dd0f8533baa609a25b5c873e97fa4e73963
SHA5122a9fd3fef66a649ccc15c9cf35aa9aee78132898f57e8e07edcc5bd8915fff52457b39e02171ea7262991bc1a6a0860665e80cec45904fad2ca9448e17075386
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554c3e6798968748bd5ca63b478d804f6
SHA1112050d57a9343b7685b6799148a2348ec9e59e0
SHA2565e47316984a4d6473a48e2360319f0972561d77b23616c840a944a185f3d9e64
SHA512446a4d1f8ff7164d6e5e0952a5a0ea9eb2176d4e3a156b5fd057003aa839533c154943fb86bdaf248905cae7262f10d9859ba54a59ec06e917fa3103d9917443
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54cf2b0dc2cac2bd79d75b96e53dbee51
SHA1a5cc6a438b45d242defa34b1a90b5760283863ba
SHA2566050abc2d3bb481755466c8c5e4d07e0fff8074f607500b6157278d19d1ddbf8
SHA512f334e080441b2404d33e953b6cb4ffedd18cdc44ba6b29634c5768d3a17fb5727a0928cca6a5f2d8f5a7add466e2c0d4c46cdac54f337649be6b9b6f091518a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51955243b05ad94ca43f26d180a9b5b40
SHA183304c20322ebf86aa8074c21c51804ff6b0ac02
SHA2565f0b03c49a5ed065c5e400f0ee43648eca6afc158c517b699fd1a169e5ef00ec
SHA51216a7fc8539bf4f6a7c5e54cb729ad5127e8c66797310871938781cebb9f9c393f2b6f13f57bfd2e0ef04d479a24ad31f6ce10b13413f8f902f7e08ca548c35f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564ae2085e8ad92129d02e02d672a34f9
SHA13d860be52719e4a03fe31cb563f0c7eb1c250bd0
SHA25620df6393ed4fcc0b9e5bae581aa36a764ddd08cfc5e3f650d08f15f74cd4a82c
SHA512a1eaabe6665c5d581509d3ab1b7a88a8261e4d5515ad33e5a82c129daacd205ed72f41d616e4c714f67c74ad4bebc5bae76dbaed07d8f400df9325aafdad19ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffd44b9e71fd23d8625184d3b7b94cdc
SHA1e34562c497ec58a71fe3ddca2218302428a036c1
SHA256648e183dc8e032fa10af94da043079cc1a3b522666985c7a5f3e64a97cf7a328
SHA512537dd68be237b01a5799206ac634f42504b8b07211480f4949227688c9766d90a0c695fc8173554d48df360acb65f167067351d455f12351b143a5712fa296eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee60e46e89e805e2ee3ad0e650d9a1c6
SHA1d7b9dd8bfeba8b1bf00c90b3f69c3e83a0bbf574
SHA2566623181dfe3f560e17aeeb42844fd7ad12702c68b0001ec0eb9c382ceb6c0bfc
SHA51221b16da6521ed238777f223c9c81850eacc79f7a8fd2c9bc6ba9978a621ab80c8feedac59bbdf7b8756b07a9062ccc31911ea201c0d3143fcc52bbe3faa66311
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f610624e44df2bc71f0f4e74ae5cdb47
SHA1b107efaef60e76f1782ec4e026189d894a3179e3
SHA2561819ac1cd47f6eb29adb6e42ffe9406032ecbbac3cf342be917c44e70402b0b5
SHA5121182e6c763a9f510d96e7c0059a43bf396dc91d823ec558f4f37e0a58f551e3fe4b166e06b72930eb966b345ae8c25c1c533285de6ede4781e9eff055cc494fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a33e4c2b1270379b91253dbea304065e
SHA19f12dccdf69c049212292c43be0a8bf02561b08c
SHA25618a2fcffc31e44198f435a1ef65d51a195c803b93cc07d2f53dbe36d3475854d
SHA5120b661dcdc9ab96115e1c2b4e95d41dce312e97bdb096ef534dfe5ef93a3d4375c8c23bb209b5ab2a0e47da181e742c2b7184262205ab4cddc2cb19bf96b92950
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9JJ4U5LG\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
606B
MD54ec85e2dd3c3a608b9501bcc6f559199
SHA12f58b80b123f7721314adf12dceaa8fea05da3d0
SHA2566c15f746c3aa5443245e07baf8835268e5e67ad13ac1c197295dc3989272f14d
SHA51217e0a3c51509d2a95f8377469fd2d0e518cbd60a03a01ecaf57becc81553f2740f24d64fcb1363cd56912ac5a63877bfabe904495a95fb88f81494c514383c80