Analysis
-
max time kernel
140s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 23:19
Static task
static1
Behavioral task
behavioral1
Sample
ff7b285d4529350b4d107634a0eecfa1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ff7b285d4529350b4d107634a0eecfa1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ff7b285d4529350b4d107634a0eecfa1_JaffaCakes118.html
-
Size
63KB
-
MD5
ff7b285d4529350b4d107634a0eecfa1
-
SHA1
c0c3cc9640636b3fcdec25124a0ca36b861ea364
-
SHA256
555c1b62b210b7ae544a33cea15ca7f4d481833e770dd6b2c915929daaca6cb1
-
SHA512
18a164c49182dc45da66c43e887d06335f39d797bdbd4225f98266d3b018f6a669c39612b4e9207be33026a0f3c5e1cae90723d20d38e669d40fbd635571c037
-
SSDEEP
1536:FOlJTYrUkTFvVO/RUEB/4fSE/f0708ZlqVUDDkQtx9jjLvEZxYl3:+GLLfS+f0w8hx9jjTEYl3
Malware Config
Signatures
-
SocGholish
SocGholish is a JavaScript payload that downloads other malware.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433813849" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10741a3dc612db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4DEC0651-7EB9-11EF-856C-4E0B11BE40FD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf60000000002000000000010660000000100002000000034965c45dd6f1ccaea4793a70498d02edcec71da490678d93b7a92ad7b7d6f1c000000000e80000000020000200000009d8f0867758fd220b258bdbfea3dbb477904728e7e5535ec3148da0b567c3f4e20000000b3a7bbfed8ad49fcc3cedcd578e29e1844fc4622b876c92fb4b4286acfa2a77d4000000068f784c7fb8ceb8a19d99eb421f2fcffd43e97ec9f1cec95b703aa2fb119bb267600d7c87d168258119a5812b41697d048244e7d7fcb1fefc3e8cd3c9a0c8bc5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2936 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2936 iexplore.exe 2936 iexplore.exe 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2936 wrote to memory of 2544 2936 iexplore.exe 30 PID 2936 wrote to memory of 2544 2936 iexplore.exe 30 PID 2936 wrote to memory of 2544 2936 iexplore.exe 30 PID 2936 wrote to memory of 2544 2936 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ff7b285d4529350b4d107634a0eecfa1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2936 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C02877841121CC45139CB51404116B25_0BE30C8E6128C0BC8455FF6A9904D7CF
Filesize471B
MD5835bbdcfd058e2378954d164488fc9d7
SHA1bc148bbfbd08d5057e0827c9c494720941e802da
SHA256df5651707a7e06e686d87b36c094efc73c9c0d4ce8f8691355bbdb2a60bc7610
SHA5120c14fce23244b8555986dcf6de797b05d9ed7a7fa6b0028cf36f43b1193a0217701f2ed33225db4d642672c64000469edbc6ff2cdd385cd2383aea27af0daed1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddf8fcf5e3f8738d65629dbf2449c687
SHA1c53a4d614cf0d73d0923564f96cf03366092320d
SHA2568d42d44beb08443738199b4d9f6aeed084a6be07cc07dba5b95e30b9f6c00588
SHA512850285c23a2387cbeb4370d1e5bcacefd4b3aff109ba587f7c69691f3bebaba56d65f349512db51ef70848fca26750a04ad767e18c387ee183eafbe07f2d2de0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5961f450d2e53a2504a9a25e1b00c5d9f
SHA1e28c0538ce5e7b298c48ca87d235401f5ffe3071
SHA2564babf3f4688fe7d03498c4f7db6b34bfebc1b37ec8d5a3efaec1de3f70ae9516
SHA5127ae5ee8aa020b5c3ed4873b144ae53fb5c94b308c1c4f21880dd4c8d83983ab93af9475efbdae89615533acfb61e42424de3c5c8c98d24a092c972de19a83013
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d60a60e8d2150d6d78822cf0c4baa195
SHA14097e90f6e8f1f06325cdbf8fafaa675c9075c45
SHA2562793c80df5b922d5b80dc12b43ac27633e2dfd58062d98bdd481cbcc224f51a2
SHA512a6edff5528622f86e6b46883eadbe3dd114fc9f9a5f38ade244cebec926e9462e08312e0532adda5b935a5cc791c2672974d21e9515e472c4a75e5af959c112a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4917a69ebf82b003f90e8425292de41
SHA1be0b869c4a66cfc4e6103b238c8bb470e4033b88
SHA25610b9ced553a27765c33bf373610515b570d8c7a76da0d9324c73368b8938589e
SHA5122081445aee04ffce0321e847bfd6ec9828ccec83342c57711c6ec2ccaf609a075a54b52408fb36ac77a8596ee9d5335677a3b4bb796dc2f3d89ec02c00f3b85b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536b9ce8325d84f45d2c57303148ed555
SHA1650d982d6e1d027c69f43615b1e3d133de912b14
SHA256b8f7a557796645f53e6ff4a640f96612106a7240be46d4e7864a4d7dfee315f5
SHA512b92c878c445bc6eb1d46491ccdeed5c1be7cb79e5400a97026763f9ab66a3f3c6a957fa42e7fb54c4b79a6b05ca2e47d0fd0d879f3d8a2c529fd7f8040160a74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517a5c4263ba3e61a8b74d564b5a469c5
SHA1482cd93589808c7a7c05193ef900befe797cfeb8
SHA2569edc39539cf76cf40be43f0bac8ce12a4af6c2f4046bb87f36f9ff8596be420d
SHA512f34d383d753e6c869c93d8a203436599fc0358981f2e34b16b88c5a03c3c88efd7761f623bfa73ff54e8998b3e207f021b9677dbdfbf6d03f7007d0f296c5ba1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da984423a1e944453be2916eba94de02
SHA1b00d9ced5bc5e6041da01ffe488b12f2888f5f9f
SHA2567012e1d9d90902b48bcda4b2adf1aa419d6ec79c106d9f985725e8572c2bc668
SHA51224943fcf69928aca418330d6a53bd2fa86fc91eeec546a614cb5bae21c47f3f0c6673fc5e3554e0eec79ce08ac9583c60eb1fed32d63f45420d310129e2966c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5341247efae366d541080d101bd6ad56e
SHA188bfd729ffadb5225fcb319ff2b2f38cf6158695
SHA256eb6a42d39495d8e8d02115d07e15dfdc437c28624867191aa4534fcebaf57a31
SHA512833d875416fcca76d8436990159cf887350bc98aa044e68a1fc5cd9e61107c5de753f391b262395600dfbc75a690e8ab651e9ab102897d579f584750df96d8f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c6345fac2f599904d6b3abe135800a8
SHA16a3bcc317df863cea4c7e92ebcc9c61aa2666024
SHA2567b4c8ae985e70b9034db952a670db9279515defbb14867d3b34192a05229d239
SHA512684148c0f86b4365505d3ae943c4d4f726433df5a0e6e9d85234e4dead88c7f12b9067d98a3c4ba1afeaed97f2cd0dc83f06b0e84f60aefa99af77793a1eafce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5259d22380724da64bd15adc661413ad7
SHA188d7578950ffe31c28686804b15d3f8695076a85
SHA256dfacfd89b4a45f9a2886b28ea660a3e1c1e824068c14b0716e6f93d56c29d08b
SHA512019d314b3dacd7f42f8a3e51804cef79a1e34dc6cb0b6532ce6fa0f8fed8bce4ecf356fecb516b6519828bc15e857fd6a9495e7baba21865ab5b65e291b609d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5586cc946f35cd364556674d15bdd65b6
SHA1529b9d71c699f812a888e05ffa3aea9e46b53a94
SHA25613d794013a7f05f24b49d9844e5de1e02a5e84f278514e19e93b0800ab036372
SHA5122d814a58a1473b94e637574aba45a5225ec0d2033c8cbc233ec6aaab5b564ae9a740310b133085562760a97f20b3754ead7cd5d7b63a3872d8cc07f334460620
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c83a72b2fd357077ade8f3fbde44ec51
SHA1ad19d373a7820fed54fd8f0d447b8532a7c4c6c4
SHA25663bcd3d50ae3584b5fe29c218e0cc93c2bd9f3acf327f3fb7d3f5808f19850ef
SHA512966d4547f6e72998d49711f82ec67ac07dcc310a34613a2d6d5003b9efd1bc32fbab314675657e9be6307ac7aea759849057f39ba753d854f90b6c438cfbf41a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583d56169e4c63de1718bd53fccffb73c
SHA11da221b68f5876660130b15c82c2b511e3ecf015
SHA2565296f32d83231b8a36ffb527e2de99483b9139398891d72637c2f88380596b5d
SHA51271daf1e77cfea2c1f4b63797234f5a8baf31cd3aa5c8a1168dcb7b2c1c09a9a5c204774454a0fa2ec820a9beb5d9760c1d14b267773da780976eade566719fc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c1c7c5cdf3b26d68c8e78aadd44b7dd
SHA16f1ef86753e15fd431b84617701f1c79f1230a70
SHA2567d1b6753f5fde210736724c267d6f708231e0a9730c264907acbde5b54a53b6f
SHA512d919ecf7d1814969fe73f3c074383e2b9599f31b6665b8d6554801d513bf6f9036b8f7d29aec8825eda6407861e90ddab99ded6945907feefafbc7e555fc5444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab489668549af3ca9aae80dc8571554b
SHA1dad347178f7312e53b72faa256db2f85dfaaef43
SHA256b141f1644845878d0a59674b237354ba8d612bbeadf5c97a002ce6c51bad6c6e
SHA51237d70c8e9b7256684d082cd8c9577947da9a60f745a25613a148b29d90817a802fb0af0828c2c3842d2102b523f99bdb577090fd8d84f4925617741019cc2c68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0e36afec55a2a2a9e6f3cea31e24bad
SHA1577f284f784001dccdfaeb5e0d096a61b5217f3b
SHA2569dd7b77d0ee4b7a610ef3d7053b2027cab399d42feecb3fc225a437882635a6d
SHA51292061c552d0a568edd113cd38feb813286c6c71b46c80acda1b9a5c2280fef9ba9c4c8b32197448c3c08e94d0fb085543b036d4649470170e4bfa836f3046593
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584ccb1c767f7b6ec910a248922b57fbf
SHA19d20d894c415c25be3cbd8dbaeadbf8c04da150b
SHA2564cb36a0e286a786b1f4d66b7d5bfede20ebf09b2b4440cdfeb035c54c79ac4b3
SHA512e2df9306c8f3130d41019e8c39a887780e3f01f6c7699b357a86ea552774ecba528bf7552648c66ea2dfbc726ffb00f76293fdab79db3761a2a07075c3634e3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C02877841121CC45139CB51404116B25_0BE30C8E6128C0BC8455FF6A9904D7CF
Filesize406B
MD550805763a799fbc90c43eba5feb00960
SHA1cfd6539b9843fabd49189f928b521cb0bd8b0567
SHA256573cb6854efa231506d82fd626104c212ea4f91f71bb1ac1d8b13cb7991d983c
SHA512ff77ca4d2627c66bdab0843803f630359727896ee33659560a8b9427ec60015e27c4c128ce50ff735d44dd55eaeaa7bf73bf95f186a9b57ce52746e2459e1abe
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b