Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10JaffaCakes...4f.exe
windows7-x64
10JaffaCakes...4f.exe
windows10-2004-x64
10$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
AKV.exe
windows7-x64
3AKV.exe
windows10-2004-x64
8HTV.dll
windows7-x64
3HTV.dll
windows10-2004-x64
8HTV.exe
windows7-x64
6HTV.exe
windows10-2004-x64
8HTV.dll
windows7-x64
3HTV.dll
windows10-2004-x64
8HTV.dll
windows7-x64
3HTV.dll
windows10-2004-x64
8HTV.chm
windows7-x64
1HTV.chm
windows10-2004-x64
8HTV.exe
windows7-x64
6HTV.exe
windows10-2004-x64
8Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
8qs.html
windows7-x64
3qs.html
windows10-2004-x64
8Analysis
-
max time kernel
119s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/02/2025, 19:31
Behavioral task
behavioral1
Sample
JaffaCakes118_c69a4d5254922580b97027536e71354f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_c69a4d5254922580b97027536e71354f.exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral5
Sample
AKV.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
AKV.exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral7
Sample
HTV.dll
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
HTV.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral9
Sample
HTV.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
HTV.exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral11
Sample
HTV.dll
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
HTV.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral13
Sample
HTV.dll
Resource
win7-20241023-en
Behavioral task
behavioral14
Sample
HTV.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral15
Sample
HTV.chm
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
HTV.chm
Resource
win10v2004-20250207-en
Behavioral task
behavioral17
Sample
HTV.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
HTV.exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral19
Sample
Uninstall.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
Uninstall.exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral21
Sample
qs.html
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
qs.html
Resource
win10v2004-20250207-en
General
-
Target
qs.html
-
Size
1KB
-
MD5
40d00fa24b9cc44fbf2d724842808473
-
SHA1
c0852aa2fb916c051652a8b2142ffb9d8c7ac87a
-
SHA256
35b0f1bb808e1623ad534fbc1e72cea25ac28f71340e9c543f01d1bfdd094035
-
SHA512
9eb750e08ca9750988290626ae8ed32a2ecfa7c8ca021b3e26b3da0a94de952b991a9a6a0ad5729d7d5ccf7b3b36fb36fd24047f705d0468ad04908ba8a7154c
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b03602b13f7bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3b438cfae0ece47b32b2bd0a23e4751000000000200000000001066000000010000200000007146c3c8b8df8799526ce336fba5a5ab5ebb660fed86caa6a90a1db5e36ba9d5000000000e80000000020000200000009e9a1e8e86cad3f074d565b0b1c947a10474e59eb12cd698ff69ca7de3885d15200000007d271d39f59a99b44f2a5b91cf1084f22047b4cfd0324cb52e73b44082563e21400000004db6fdc2d85af9460f14fe93ae4feabc1698429b0ffa565ea3965dd00e13a38a4dd2a0cd8902c2ff7f2c6a877d1f17b02efc2bfd73f08eb8fcb010629947e175 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DC6ECA21-E732-11EF-A51B-E61828AB23DD} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "445300992" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2672 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2672 iexplore.exe 2672 iexplore.exe 988 IEXPLORE.EXE 988 IEXPLORE.EXE 988 IEXPLORE.EXE 988 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2672 wrote to memory of 988 2672 iexplore.exe 31 PID 2672 wrote to memory of 988 2672 iexplore.exe 31 PID 2672 wrote to memory of 988 2672 iexplore.exe 31 PID 2672 wrote to memory of 988 2672 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\qs.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2672 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdd68875b162054bf59ac9bc4cc15e6d
SHA1099d5305ca4d20ff0b6e299ae1d0c953268faf0a
SHA25693562e8d9216bd78f8c84774fcff5b05976463f54c9938ea8bd6a15d02236a2a
SHA512a73b60eec6b3bd21208dc9aa4552ae9fec1c11238e9192dd0c21959208285d8d099455de985d222c9802cb3cb72d1e06ff54632f62465a9e28377a6ae69f45a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa411a862b2a09cd9321dcd582b3f11e
SHA1a05f214249b1a80a98d8361885b672a273b3f7b7
SHA25632d5a8d0b07d7a87d6a0030598895b11325d8a6b1581ac5be5c4d688f878c2fc
SHA512d702af72e6030c7d4c9e95ae890c405882871d34a5dd886a44ec3a14d364bbd144829db69733a724fdf1d33aa0ea8da2f61d08b7d0ff7188f4904ec30e227c10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2377cc34870af3ca08700eb02a6b3c9
SHA1bdddee57a869e8ef1ec8c63ffb7103891f23a8e6
SHA256d60c14bb895e123aad7a8690753dd6efd08d9af5e845ba67786ea1cd035b8f41
SHA512c4568b9cd8acbb9722c54dd9540c3217b2eaf7c4d2ff679de6d3f2b18114faf67b7ae601031d411449270ca5dc615d662f9c8f5f2315957c602163b6924c1b95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d8b476ce4abf13544fb03cc76331de4
SHA12b2f1e21c8230725244e342fdcd9207ccf388d70
SHA2565d92a58ea8dc4618cd568e7bc351ea3993894ad5742daf0d8d252a86a90948b9
SHA5128f2f397888f2109f9ff2595ffaa5996b6c843f9d52021b3515a783cfabc716bc436e9055d99c72acba74a5ea7f4597e3790098bd2fcc3c97d53f94feb1939996
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e2eeea1175f38f5bb6c921d699b1335
SHA1841b11400c1b1fe8ecde922280944f9a82912995
SHA256ae5ffc0ed23ef65901c5a8f15d313ffb04227e38bb0f1213fb2176ab7f068ffe
SHA5123d07f368178ef85cdd4eacf0b026367518a21a6750e9f94af794d16a81456bc1f66d1659ad41156bb5490efc67a9bda2024fc9c438022f24a8f8da12f5344cb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51688f96b1356464b66fcec8ce2d7d2d5
SHA13540a100165e1b520669fa30005dd28f363664ac
SHA25604ea434cfcc1af0aceee9931348025418681372827ada2773dceb690afe54bff
SHA5128d4e56936fb2bc2f7f96fa21b25929c4ad98b5b9b063a97515abeb66f64ff6bbf06fdc80a0fd5e3a19641be8f7d43bd8dce912e393c60cbb17cc77bdeb829c8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559d53d1b51012f5be7a4eca551abce0b
SHA168db23d2016d351364ddcbb92d5c7697e2b1da51
SHA256a9bc6fff655590849f3c1da0491abfbeda6b4a7ba0638cb1225f66979b4bdded
SHA512de83653e9f0eee266014d02d6e44cb960f4b9e8f07941144c3e46a150ec51509999616e4a86e026eb7914c780cc6360ddf2c2799c18b12604ec51eefae53e0ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53148566887d26b8ab66c5d0dda6750d7
SHA13786c085c795a6fc81bb7c83c2d3856921fa9976
SHA25683fa654c056375687f5ec1368d94715d739778004b393dd2ed01f4a013ed6329
SHA5125c811208038b53af37acad7dc24d5d6f675b366ba53aaa2ee177f77028eff62eaf07c7ad564428bf9f22d77afb95394a56ba5f0d18bf3184c58ce9980797f536
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527f0755a2657981eb911760a13fde940
SHA11509c3b54d64df1a6d549449b75ac995a184bb31
SHA2567c4dbbdb645abec51441137d9945b5684f7eb0a41639e0c947a5862bbc7afe81
SHA51231aaaadd2a105bde64de321d90dbe9ae3a54f0fef61b12682c5fa79bc1d07d8fa1eeca77e5f795185188623669494ccbeb13e403f9cc572010b8711b846e18fc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b