Analysis
-
max time kernel
140s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-10-2024 15:56
Static task
static1
Behavioral task
behavioral1
Sample
5d6b027998bc82db1af10ad03e7d87ca_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5d6b027998bc82db1af10ad03e7d87ca_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
5d6b027998bc82db1af10ad03e7d87ca_JaffaCakes118.html
-
Size
35KB
-
MD5
5d6b027998bc82db1af10ad03e7d87ca
-
SHA1
539a865b83ac24f054d25491d462a6edeb85d320
-
SHA256
6d082d2a43a5553a41b948e9852b09ddc1879f0027a80d8a1d82aa0e857acb6e
-
SHA512
3e94fb4e0cce4ad1e6b7e3ab11b1d46871fb07c744a479bffcf3a14487bd6247156072ca30e9136216a942ed1889b297ad81d298bfcb4ee502ada3e7c169b9f2
-
SSDEEP
768:SW3kMESPjYqnMJ2AAyhS6PEyzTAmYiC/7BzR70JM9dkc:SW0uPjYqnMJ2AAyhS6PEyzTAmYiw7BVz
Malware Config
Signatures
-
SocGholish
SocGholish is a JavaScript payload that downloads other malware.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BA0E0A31-8E32-11EF-BE65-4E0B11BE40FD} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435515271" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 000870a83f22db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000009163435136519625c436fe932156597b78ee2b95fea28f1d6ba6fb00c429de82000000000e80000000020000200000003ab8452ce4c190e76a925e04d95da3acf233d241cbb62e9cb84aa8f7866211cb20000000e2eacd64430ead6833b896f6033d0809e0b165c48717f0e4667841106b7df89740000000a054fe15649eafe46d797d9e4b3009efdeb2a0345709a89585f468417f7c023d2dc6510a297038f7fb14ee7e7c96e45f60fdf903c59767d6b2878a2e4dbbdaa3 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2820 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2820 iexplore.exe 2820 iexplore.exe 2644 IEXPLORE.EXE 2644 IEXPLORE.EXE 2644 IEXPLORE.EXE 2644 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2820 wrote to memory of 2644 2820 iexplore.exe 30 PID 2820 wrote to memory of 2644 2820 iexplore.exe 30 PID 2820 wrote to memory of 2644 2820 iexplore.exe 30 PID 2820 wrote to memory of 2644 2820 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5d6b027998bc82db1af10ad03e7d87ca_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2820 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2644
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5cf67e505472abd00af95affc2d089bb1
SHA16b6d0091f097c3a724cedbce5d69d34915874237
SHA256f977962e8d7750e2da45d9a67ebb181503f74a096bef32f446a0d287bda5f6f3
SHA512f08db195db33b3df0d6dc1cd3a38b65000ac91ea38d892e085c61c6bafc9a32953e57ad26e89e91cfbc22ed21d923cdd089bbdbb6d65de1dfa9e32e9c7724d86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5771d4db7c409edc4db2aa2097fbfe6
SHA1d08122115430975471bbd8c3084bfa9a00b2b51c
SHA256b7f1d5ac4d18e7dec27bfbca3c7dc434c5cd8de33f1699027ac4225e41d493ca
SHA5129edaee2b80a53dd8c0cdce04f741bc8fd0a2b19e607704050b00e9f2aec34a86472aa2544c410864fe5bce3a0be903d560903198bdd52b04e01aeb70e784e0ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdf973f1f08586b8207080c8637b5804
SHA1bc82654a635f3e46cad0bfc3d4d22cd630a6658f
SHA256737eff473f9a4bbc346c04e9dfd8789f1d2cd24c82d2bcbd5d14c6885ba44841
SHA5127abc69537c5be9295626695cff8448e79cc58bbcba46bd8b6f6448fe581c17eb738d41c5ed1978b90163084ca1cde0b0413819ac6968be7a0476ba933c1645d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2c41714dfb8893355949435f5f9dfd2
SHA17e2c70112b146be00499704501d2e2d0d38585cc
SHA256a5711c255dbe7136d4439afb211def08ff7c0b84ad483c68d12c4dd4a46ad15a
SHA512b228381cca4208da33df8503363bb4c80f6cfaff35840605f696d57377fdbfa52fe92d617713346a098e899c818904f172c2ca75173a8c8c1d9724c4d8c0cc63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545dbe7b12859a39fd0e58dea7e1e05f1
SHA101c0d2384aedf2d33b04119a1bafc780104b56e0
SHA2565f3eabec54fb2e165bac4aa14654ae0d26136faba84fce098bd2af4d35917323
SHA51283acf364878088ee14fcc6e6406e1690d60569a0c3d4ca982697c5e048080b94b727114a31812f3d0a59fbfee0a24f3a1fe19edb386146f0d3322efc403b8e2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52335c2ea656d8e1332be8d8db47d89d5
SHA14bed20b1b545fcccba72f721c5e2342d4b6a1b97
SHA256b017696c8f03e901dbf2c52700c3b07c76a19021dc0ac5cf1a1642fcf2d56d5c
SHA512f2cceb2f755a4dfcee804c84f1c9d6c1e04d69dd40f447277ca303821fa665d1042c2cdbfe9b6eed733e0b53ce125f9e89c835d0f0b75b4f25c0cbb971555db5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5684f4dad3ad323353a5328cb09330eea
SHA10b5d3d81b6194426deb94e4d5f6a5bc99e2c234a
SHA256a5c6298add7837b5563dc8ba775297a8e03a4eef46038e5a123c7bf814cb54d7
SHA5126f58bca5bf36afc243f11f20851e7fa8e5c43968fd10d6a46fc06ed3e84dfb749f7e4bf7ebea63f6320d75297722c51fcb09bfeb5a584603a674fce262d59b97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3b97fc9e73f22cf4777a0fa33ce536a
SHA134d0cb4f44a872ed8271ae084ed99127028d2293
SHA2567be6958f02f185b71ec928721b0beaef12e5af83c17f8bb6b881beb24a42e6ad
SHA51205d703fc64ba679a9f6b816e3aff21599eccc4d5f3c9ec501cd8f540e6c8bbbedabddaf327f992b5efc27abf37a83d88f40e0f8292c693a1af0654d5fc257532
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ee1f85be6a9b351ceb1f9b0d9906c0e
SHA11b9066c4f6199389a649666ccaf4ad184e512646
SHA256d55e71e91f7148d358323f9163dc540945cb2345e4fae68e4d205cc7ffd32b2d
SHA5121b9bcc8c64b7529d6ecd6cb1c0df04279ee522067f9de38e035c4bdb3e797b9e425813b65f11ebdd4a8006fe11d30833905256c0bdf55539d80f99a1e0975ce0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559e2b37f70e26ef9b2334f61ec3ce257
SHA13f44b6aa43f3f1b4b1072693065712a5774b3bbf
SHA256ebe26f6816d1841de551c950374ed401058e323272707e2f9b7ee56d7c305d7d
SHA512989d978f646c5a454ccce625e3ebfd25eedb708327c058e1c2da499825f6c5849efb9560493238f68dc836319e71985b96f97a8d62a778b34cdb421deceddfc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d92d1d4db5378cdae7565a5081b6b8e2
SHA11794760f81ed45a03fa194ff9aaef90175960b1b
SHA25625d69e86d7624a7c5efc4adcbebafffcb7341339e313b7ee9f02c1e3f4f41fa2
SHA512765fedc3ebaeeabd5b8e4b62f92791114e263c21554bda0ebec20f768f57c7bd869c6612224bc971636f431350cf121b5b24de66c2a5a013d59cb11ca4ef323e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567f8973843af3fddb39beb09a6e51550
SHA1215db3deb2651a6e51012520b5ce9f96e32364eb
SHA256e766724373feacee7901e235310460a269f7b147abcf20adec2ffced2cdee637
SHA5124c399255a656c899787e258841487784893ab8c4cfa2b94a350f2aecb0533725c9e34c14e061ec5b693bba4cdb763a3d887aa429d1f85e316ed841afa5d644ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55068782d50c645555d1fd7bf51914c47
SHA12b844ac2ef7ca80ca3386b67e210508aec6d0e39
SHA256c48a08b3ef9ce4900b1d5997b37570b1f749dbe0b8ddc2fc293223781ea27353
SHA512d25b852a275ffc57fdb6d53832d61ef76ea237c8a72df6fefc6db96eb89f1152b6bf778fb0273f1b6a28c262cf71be8194cb34300f4b7b69aa1a91bd9e5e446a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bd5ddb50ccf84e77a2dcd97805abe93
SHA156b6ec1183f6b6eebd1a7996a8991b1df21af211
SHA256e432560c12314baf8f3d9e7bb4f674295dde91d9c9e6d07afb27d846b77c07ff
SHA51256d238c73d4d4f872cb4e3f1c7dc332f07fb78a455e75396d45661f865fe17bd3cf905e5557ad3c9362f7eac7bc23eb900f46a52fd2b03fda97a1bd85b4cf1fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD58dc61420e53f0babec71b6600373b5f6
SHA1a1f76d7029ebdae1782626a7e41d21b57d872916
SHA2560c4739dddc4f92ad1f74d1a92f9ebcc054aa353401dd920ef0bdb905c62b301b
SHA51251c136a13192a6e0933b8ca1850a8105c16b545c34f5d87b925c69ab791f853db67627e102aab212588ff522ab2991f9afb8a281e68ae61fb5d376af394e0e4f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\AS91FDNI\f[1].txt
Filesize41KB
MD5c7fc651a34014e0c8423bede2b03b7e9
SHA1c6b98dff51bdfe6229e15862a294d14d616eddaa
SHA25629dd6e2ac12af2b9356dfceb525dba419b8240894ce4a775d6812247d3f1bc6f
SHA51239f1b2fd99e4b47a9af2a228c77e14662f4dbcddfee11fae8455b6a1370d1ef4c154cf99665a147019f4ce854161293ae44d57510180c8bac8409d38668f4919
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b