Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-10-2024 00:07
Static task
static1
Behavioral task
behavioral1
Sample
3cc05e8e9a0676edfa1e557406a2cdf4_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3cc05e8e9a0676edfa1e557406a2cdf4_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3cc05e8e9a0676edfa1e557406a2cdf4_JaffaCakes118.html
-
Size
77KB
-
MD5
3cc05e8e9a0676edfa1e557406a2cdf4
-
SHA1
d0e0d7688b712bc56cbe3349cd762d1fb030ae80
-
SHA256
a9e1042d34932529e15cac9f02257f2e0b9a84733249e83bf65f676c3ddd0b95
-
SHA512
a6cd8174dbab2ce718523bac4653f68d90c50a30a41c167130f0fc3d9199112b1c29ebd480ae71b5e5f5ef0aa06199e5cfc55a4d64082411d3b7ff4321d6ee3e
-
SSDEEP
1536:MBeyMLnVXkIkIkIkIkIkIkIkIkIkIkIkIkIkwkwkwkwkwkwkwkwkwkwkwkFVklNG:YMLVEklfQ4+r+7OjlP
Malware Config
Signatures
-
SocGholish
SocGholish is a JavaScript payload that downloads other malware.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1210EEF1-88F7-11EF-AD58-7ED3796B1EC0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f5420000000002000000000010660000000100002000000035d21d68c3da2d97619278e4310aa0192bb787219c417217fea411e0fb95da36000000000e80000000020000200000004ab6f9b5d930b45e534cbbf2b9c7068a23ca4935c45d60035a03ede92bdf90d520000000630351f8cdced16dbb116c958710af6bb9ff37d849b6587ad0d146943e45db5e400000006a50e4fbdad56b05c58184b0d146f775ad138688f987a1cd7ea1147eedb2c3a31f862b3c1ccac01d708a2b647c0f25cd05f5d0c4822f29c4e84fd6da469447dc iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e026b9e7031ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434939891" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2280 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2280 iexplore.exe 2280 iexplore.exe 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2840 2280 iexplore.exe 31 PID 2280 wrote to memory of 2840 2280 iexplore.exe 31 PID 2280 wrote to memory of 2840 2280 iexplore.exe 31 PID 2280 wrote to memory of 2840 2280 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3cc05e8e9a0676edfa1e557406a2cdf4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2280 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD54e67c86f66c91c84eabab5d1c8fb091b
SHA1364ac6a4f02ece1b6625ec5822750ebb699dcd92
SHA2568d46af3b34c55c67a20e4819185f3182990de117abaa423ab7452854021bccb7
SHA5123300818e59f1d9ef7edcfe9ee149593c1ce7cb2a7ab34b3123a2cf51cd6372b82db9802d9345fef082f51b81bf76c53641b13b06fcb293f8d5254d11b4772bfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e99e3b5d3acdc41af361f653193c3073
SHA16c640f7cced76466e44df16b690fe85e096627a7
SHA2561c3c6b70cf0b43fc9b4932d264664b84fb2dd5ce13ab6a00370d145d10313d98
SHA512aa96d65e9ffb40960971e52d73b517ae00fda3edc52f5d82b632dd3bb40561eff5bcd9a2fd68d4bccc4e1b076b6da0644dcd0c06817d58cb32ce3c39b5e5f60b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50508653041025349cd4ed2979a34b714
SHA10394053d560d001537c2feb914968c7715b0f05c
SHA256f4aaf99cf58334350500ff44dd83a50130dbc2ed2919b0050e48ce0708c867ff
SHA512f307156ecdfe46d7864e487b2d009d6495aac9744fc514dd89e61dda3a8bee68c1cabbd5209c769f84793b6f91028bdf357df93bf7363be1264df9bb9232adb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51969ed35f347d4a45c0131e6d4489c83
SHA19c8c62303a7673163c3da32866d57500da12e9f5
SHA256e93b2045f2055a3f14b55eae8d0a7de81a20771848c90cd44ee0decad4b05582
SHA512232895d4a12faab67007431493043e2bff66cb7b6646bb95dc22422b71affd7491a5b53365eb01291483ba0a3b5dfbb456efdd678d5303390a93f4840dbdea27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c93971cc52d7374514e0a569acf55f9
SHA19525bff77cdac0272b3a8818f3e50e28cbac1b9c
SHA2561581012d692995ada32ed5b13b524e246a7fbc6fafb33c951967f9994c589480
SHA512619f700e2019ca89ce037065e48a8059723125ab1da2a14bb3fea1575c454f73756870a1f4c560c43dcd43cc54ceb4a615eb4375d868e1509968b5a02b983608
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e902491d52c5757f4ba74ecbd7d8d5c
SHA16d68d2a3440e1e899d84c45f6b662c595072f165
SHA256e5391b1d1a71d13b28cb24b051ffac42ed0c7f4181df4790331dae1ef7062dfc
SHA5124369850516c61c8ae9c5dad2e2f1c0efa47e9852a537846ac7d1d047e4d66d0c32cefd8ea0206eca7f18edebbdf884ca9600896afdfbbda08961135da23fd3c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1736efc53ce01e5bf65250f6ae043ee
SHA1e7442b07c527f4ac97f1b1f6b2d1951b1faaccf8
SHA2563ec621e03017fbfa6bafbada535b22f9f6770fc253d9eb318cdea6eb6f1ee9c0
SHA5120e23130003cd3563b52964869ba1a297e3899e301dc6fbd83ab66f68aa67e9b5829ad89219fcd9d4abc4310005ab281c40b3911921219a139a8d8e1830ed1bc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a24cc7c13a74eec2a9f98eb4ed63197a
SHA1eaca97d0298899b186c9558c993014f7583824c1
SHA2567a813993833d83247624307ebcad5de4d8b35cde02ba3d3f82022ac58e59a877
SHA5123df1fb1c03fa6ca76d71af3c022c179ac854a348c4ae3e39dae2afb6869c52e178d8f8ab8c8060092a7887125c72b217d6fcb3b2d2ab90dc3dfe880b68bc19ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556807d882b5da729b3123acbc639e023
SHA15c51971fa2ebefb61d4ec968a0c83644a252797f
SHA256a6a8eb29f99c1cb558cb5beb68add2137a713aaca113249c41112465847e560c
SHA5122bb2ba0a2e17da90a2cc0826d5211fb8546ce294cb7a4e457eada02b10eddfd608ee9e53f789d131c42ac70ebe1ad2baaab0821ef860e201071198702cb70cd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58caf0f5b21a60776a79f4bca861d60c2
SHA13fefe3eb8f4dac66b84c73ce2c439c43e7936e7e
SHA256d6dff23bf17f49bf1c3f07ce9d6f2178bccb072fc0a9c2e5def9aef061eae69e
SHA51204eb1d8ca9567d3afd9ca01204526c6b4fd0ae6659032cc398dcb16ef66d0c426c4dc8e4b5edbd5106846a79bd5438864953b25e06c228d4c0776918851226dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3f6f68ec99f1295a5dbca231b856ce1
SHA1b41fe620357b4b9ac40a34efc137d167219311ed
SHA256cdfd689a4329c5a60a460a8fe2844de72b0720ac9dc72a2c3baf824037b585a4
SHA512ff149df53af242f3a84cce883e83dab8ec0cfe3b71d93b1a2a50ed7d6f34aea0be1aec534050d356ac9134ebe9b8150e0f208dd50c713e1c25f651a6168f04d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5d2526fb71dc5b18c33600c516da75514
SHA1f9bef0dc86f64613b43b7cf9f34edaa77ba3ca26
SHA256977a5fa5a28f543628e0601be8e087ea09bea68043b8c144975729c3e118aced
SHA5125b170f3d17222411a12308812ed673826b35eae68684acb54f781f29caa0dc444e45513d8eadea644bc2d753ca334edb3dbe50c6414f8147a20f9a46068e5254
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b