Analysis
-
max time kernel
141s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 13:11
Static task
static1
Behavioral task
behavioral1
Sample
2f456680be64ed75be386dcac3112d0b_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2f456680be64ed75be386dcac3112d0b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2f456680be64ed75be386dcac3112d0b_JaffaCakes118.html
-
Size
225KB
-
MD5
2f456680be64ed75be386dcac3112d0b
-
SHA1
d07ff483373c2d59c131c46c97914e058ee485bf
-
SHA256
6215feaa02b7aa75e7a549fa634720369a011ed8e2083836a538413f22fe462d
-
SHA512
637f7cb5f679218a8a57dd71848b359b506e5001e23b2d94b173922571b11ba332a17ed8cead799e703cb5d3d4ff406571d184943228a1c9399ee51d55d52ef2
-
SSDEEP
3072:h69C6mreaxKY40wZAQKwb9Q5blc7fWMOxe+xlOlDJju2Jr:h69myaxKY4069XoCR
Malware Config
Signatures
-
SocGholish
SocGholish is a JavaScript payload that downloads other malware.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0249bfadba2da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421508699" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000c113af5b2477f44cd6450618580679bea31f1e40751f3fd8c135cf6b8bdce3d8000000000e8000000002000020000000176f3105c11d61325ee457c7eca010f237ad018ce5847066b30208188a49e4ea20000000bc3caeb4d15862c02c2ea43ff2b52f8518a2b1a377de05d97f642b2e65d8b324400000004ff5cd65aaeef588817d21cd59ae301e4ce8aecf35eabbb8f4b50f267dde2a0c30e1e716aedf123d9fe5c7187458b26407e7a650a93bb93aaa3f4fbbf4637930 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{25003B31-0ECF-11EF-B97B-5630532AF2EE} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1716 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1716 iexplore.exe 1716 iexplore.exe 2196 IEXPLORE.EXE 2196 IEXPLORE.EXE 2196 IEXPLORE.EXE 2196 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1716 wrote to memory of 2196 1716 iexplore.exe 28 PID 1716 wrote to memory of 2196 1716 iexplore.exe 28 PID 1716 wrote to memory of 2196 1716 iexplore.exe 28 PID 1716 wrote to memory of 2196 1716 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2f456680be64ed75be386dcac3112d0b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1716 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2196
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da5f1347902d9bf0828089e4147dab19
SHA1a0ef159c407404fc21890e3b7e6af237fdfe1258
SHA2563301463f86398c07f496a4954cabfcb7c1889e18d2a41b9dcf3140103e54bcf6
SHA51208de97e46412c1148454fa406a0826f0e4d8c37b2a947cd67a36f4ad1c2f38cf8a1d5082382cc3d35fa24cf8e3c6d7c684e93f307690637aa125399da436fdc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2197df44bc0ce9ac39068878bba5f41
SHA105abb1765b5a65ab2f4356ee420b27db2e0a8a02
SHA2561f12dd4413d64ccd73bf540d3268105f5839577e13ee964238d61a19d72fa968
SHA512371004ac568b110f3aa9dc78def894c8a8ef4a2fc2b0258e14cb5dc5c31e602b82cc5e686a7218f4dcdabdb30611f473d55b9f2ad06fc795748b9a9657801da2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54825662e5404a6817941ebd0cc36232b
SHA1991a8c3b0d54ec73506530dab1d0486efc94b3fd
SHA256b7b7badbe570fc57e56a8ee2b171d1ef530b0658b5de496221c5b98e4317d214
SHA512a8c7b01b2b503e8ff38cca9ed820dea0797cfcbe5dbbfca04dc90189bf330e744f587ce97bf53f466eca2b05581f7b29ae7616f0efd8c83894dbd5b069352337
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501a4cf9b2e872bb235abb221e0030434
SHA14fc486d74567afc7efbefae0cf843a94cad1dff0
SHA256252576f01e3a28ef7c9d51f8622f053ca90edcbbe414f7dcc058298225cf0d4d
SHA512300dd2497a21e090cde48d7a625de283d0e8a19fd07fba39634b597cfd40ba6fe8d8b8f7bb7eb49edbb8694980d5a9d70c9a26b6491ee8219b1bf88fe782e2a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aee101fe32d0cdc9211c79083d92d513
SHA18f5581003f56b6dc392ab8e5402ab0c498d14b74
SHA256c213e237f6d13eeb7d833b7dd3016d8b2579bd9cfa75f810b65ebaaa4fb4e6f7
SHA512d94b4890d911a6910492a5ba8ae9a326368a0f6a54d74b0961690d411c8e150dc0a4cbed1025742f1bf7800c9be99a302769c3d1a1f0b56e736cd1be19fafbc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55efa3bd2056775225b5a1cf33372d540
SHA1281d0b17262662e1cc12c432a663dd44ce0873c6
SHA256514e35ba0a5a049f9c8ce4cf5ab83476a7a8fcb931aec04725d14785ac7df4ce
SHA512ee87f29045169277b7b4bb71fb68fb535be2164d3e81c6ada075fadc3c2b8c47fa07c3e43cd9ad85b39d8656f4e563a03b81700c2faa6e1f2d9f57d9f3e6f488
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565be215ee7b35cb2b3a9193f7f9e9ed0
SHA142fd7c2e68b061921fdcd0ba2fa6df61c07c06ad
SHA2569d007c1a4783eec5b763d96c71c510185735494892e39f32921b623ccde28fc2
SHA51268b87da28f3be01fae6b2343a230271172fe02354086657ed40ad12c978506fef5b7a5cbd6547d1d3fda14a0b96393332b52f09deb93154423150b23a48fb8e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5522e40617aef35c605b80027df1fdce0
SHA111c649661e5847297789551c90bf32daa24d5443
SHA256f907fa32f1940bc5d7ac39a5f983f807f79150f35f46510fa0ce18ea89e0a8d2
SHA512df1e12d5f3066bfcb9f1fe04b10aa49647b0d7827465c6f2e1e1d7bde049674bf3670457324ea749cd1f5df40408ecd5bcbf8816031e19e836f409c72e90b181
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c40c52cd9ed4323a7cd6b12c641fd86
SHA1ed9e2342b72034bc5b798123e6b6c19db032b1cf
SHA256005b73c6025925b70a2a533519cff535c710a54ae0cfa5d07cd830ce27349684
SHA51202bb170df41c195f919c061424df2192c450a57f460316055dfa75c1c1f1fcc74843f8b2b9d9f0378579955dda607bb2b89239185ba010f5a7625ae15768fcc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56af5abab6b6faac48e001ee025ba887d
SHA10e0428e44fa88f735022238f74c4a5030571df96
SHA25632ac452aa8b70451a5c3663654d058338f21d70af6f378363cb575a31fa73277
SHA512c028f935d99cd6bdaba5c09b053986686ca022ac67bb86fea0d5d5e9bbce15468f7a9619f538d11d509ea4a71226a24178333fceab402032025dc10028aeefb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52241e78bd76197014f2fa2cd87f01e1c
SHA1c2d5e2483c9e1a70323f0017526c7cdd686a2cea
SHA256d50596d7e5738b5636a947f6a94a2b48c6bd5a62d0b37e0b88daaf6db311b0b3
SHA51253c488fe5dbc244415438c24413ba183ce7089859590c6e0e823f3a72a2a8275764ef3e23d22f977943c9fb5d941514324995713c874ef70659360f719a156cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550ff55c5d6bc96d56f296e2703456606
SHA19a11027b6d754d510e8aaeacd17e32761a3981dc
SHA256b3244e363d749e179107a2852d35d2c52d734c5778da5def3be042ff705185bd
SHA512aee5f36a1cb1f0a74bdbf5fec31e33f2c6880d9aabcd24af32324f0f478baae727a94f589138b5ef83ac92dd5efd9698780a6e5a1a8e826c8f865666a7bdf89e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538f3635ad49f41111d7b1c0298a33979
SHA1afe09a613a3d9c94254fe37acec93021fee64144
SHA256895d7217617851c2fefb931ec0bb8908f5345321f553c60a607c1f821a41558b
SHA5123729415cbf78cc784d5d4256ef8f2cd9ae996df30fff93655bb886865b0dfa6c48afcba1bc8bab55260f3c7341f01b093a7d688da995df1cecb4571d381c9208
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df986dd5b5999304c542908939854859
SHA169df6092ee71789548255c0286f677f9bff14cd9
SHA25621df60b45032ce553fd07cea660f8373f1e13aabcf45ce5fac4af3fa79343649
SHA51264a5e09de04da4f57b938f01bab2646d0a7cf8332a574790bdf9f9ccac6c9d1fe3fe18558ef52be318930f0fcf5c2664d0b34691c89accfa17cd31ca05e087e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5ff52e78e22a87467843c5cb0e32d46
SHA1b5276db6ee6c0eb0a660b347fd2c0a43e7caca87
SHA25659711e5de251f6266d627681b4a02ea753d9d3bab0acb3cf1164b2d5db3cd37f
SHA51205eb88ea1b4412e285f9f5bc8bbf3b3d2e8a3e7b19eb0fb110bce358084ac25c2544aee0aae0c063350d1dc63f05e05aa59aca7e5d64fe1f074027492f9b35a0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2XHJXO3H\plusone[1].js
Filesize54KB
MD5fb86282646c76d835cd2e6c49b8625f7
SHA1d1b33142b0ce10c3e883e4799dcb0a2f9ddaa3d0
SHA256638374c6c6251af66fe3f5018eb3ff62b47df830a0137afb51e36ac3279d8109
SHA51207dff3229f08df2d213f24f62a4610f2736b3d1092599b8fc27602330aafbb5bd1cd9039ffee7f76958f4b75796bb75dd7cd483eaa278c9902e712c256a9b7b9
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a