Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-10-2024 14:32
Static task
static1
Behavioral task
behavioral1
Sample
6f67d74ac7abe20b52f481197ecd345a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6f67d74ac7abe20b52f481197ecd345a_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
6f67d74ac7abe20b52f481197ecd345a_JaffaCakes118.html
-
Size
132KB
-
MD5
6f67d74ac7abe20b52f481197ecd345a
-
SHA1
e915f675a74a0fc55dcfd8d54049e175218d00d8
-
SHA256
fd3b564660f7d0ce684eec7adce6588a8221ed9dfe6607aadd2ceaa51277ec85
-
SHA512
a70c3031dd8979cf33414a6363c9d4581537c984bddfa3edb4f1698bfe453a163f1dd437548317c0f608dde1b4df0c20cb52884094e325247be2768c0aeaf7a7
-
SSDEEP
768:23k1ATx+Bw24Tp7VhOPqcipt+CpC0/gAtnEktNYkmQBDCheNQzDXB9kCjclp06co:2JHhOPfCpBgfktZ05jclpXcDOctPNC
Malware Config
Signatures
-
SocGholish
SocGholish is a JavaScript payload that downloads other malware.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000000badf9a5f6027ce2c70268f71205c12eac87785d28ecfef38330770f0ec4266d000000000e8000000002000020000000c2d324c456743e067e1a92c0ac45e2a871ddb50e31aceda76b8688e3810998ee2000000086db47bba1472694ca62efb353a8d1d256106ba79d4b37d37796fad3fc7642c3400000008a1c05d52867e812c6a23bb4e5cd4e4bb156045983b1266e2b07f8a7cd1e013b0d2cb2294ee3d85496bfa1ffbc8567873e6017c74a623d0e6a2110b0e1f62f55 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A4B0F551-914B-11EF-B8EC-E699F793024F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 901e767b5825db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435855822" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3044 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3044 iexplore.exe 3044 iexplore.exe 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2812 3044 iexplore.exe 30 PID 3044 wrote to memory of 2812 3044 iexplore.exe 30 PID 3044 wrote to memory of 2812 3044 iexplore.exe 30 PID 3044 wrote to memory of 2812 3044 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6f67d74ac7abe20b52f481197ecd345a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3044 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5c01af1009927a8f13c3e41685262e262
SHA1de0a883fd57b7b5e08180481115f97c1d7347ae4
SHA25664dabd18b7a5934ed057b00bad4436aeb1b65725e1efacb22cfaeef466e47b5a
SHA512083b696e4dcf1a5ddb0ef8ef9c3a9733cd33c2fc9d3dc4bed8af415607c22d97b657b36018cd8b8db4c5f8f49a94c52e46539fd7a3ec3dce55ccec79bddb58f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599d0ddbfa534b2ea4438551b1f56457e
SHA1d0fad600cc315ba62bce91fe1cf53002ce0ae0b0
SHA256235fef023d2e546e98b543b9c876797e9b6525f88b37fa272ad51a48f6bc10bb
SHA512f38b2ef7ab28fa71a7f3726e444b8e17505a3fbf02e79a6dcc076d3bd9c53b6e8f846cf4d390364fbace7581ee4b5c302ec6cd169b2d1c8c0405a7ca7c3e1a14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51674b6821b214301b5b4723de5a3aedf
SHA1b9a9f42e7f2974c49a412fa27d5b0cefb8841bfe
SHA256927b89eed60200a99ec5e27b1cd3878fb41b04b3c204546f10d26809033a918a
SHA512c8de2e67ae88d81fd5f528f90fa29a8c834df5cc5f25ffa589624b2108d39af8e43d896a6b991fd64dd73e8fb3156c3ea16aabae02f1521584e698635b1af967
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4c3366bc9a28a01863d6a3970d80a27
SHA1c8df98ddcd9da4512bfb1b85fb0c95c1903726fd
SHA2563d0b833b998b38a1f27937a7021516df438370f8dac2601ebaf5df077da8db66
SHA5124ff57a096f0865496106e68760cb3f7cc4136273c2865cad646e5c49cb50f864926185d1299f5b6872a7f7e2a38633de9fa0e2520296cee1dc1eb57bbace765b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52555c5622f99b4a25d498de69a86785b
SHA1ef0f8e88ac9a5ad58be1b6c71f7cad4fb5d0c64d
SHA2560f44880a4946ad762e62d108c6a5d452e811d7a7a5b6169d6d9c269fa68b722e
SHA5126db5347f1ef8bc1be5bb179fb8a463c9182f0162c8c5e9d7f9742fbe3931ec4952a7af7f4f3c4f892a3af36c0b0173f84868641b7ae66425f380107074b3b38c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54508414011d594b5002d40796540d76f
SHA17a45b2bc327ae63590fb848af761de73c5438581
SHA25612c6799a67dacd08df3c406a23a24ef77ed876bd8b21a044dbe071a0095828ad
SHA5123f759eea847c673e99499cf8d63219071e0a9e23707707565169304bb8870ebdcbb7f61fde03d8e233656259bc4caec4f9cc0c0f50849f10d8d88bb72b957f73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575c29c6a149200e363bc2076cf49a4a0
SHA1df9434f220ff2a5f2707f7e5402374fa8b4801bd
SHA256c4c7d27df9eae2d51b09a2631669dbc1efd2e0bfc892b371791a8c8072f6ca92
SHA51232b818ce5712811ca3cdef4ac3fa5ae24b3aa5769d7c13a02b67c2a343e32a4b7bc3b11ad775fe254fa8abd5eefd70281e5c8fa49d33b56aaa11a817110cb698
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5593a5b3fc6541398307c7678a5639875
SHA1baf6c9606c2fc50d242de33f3efe56b030710a5d
SHA256c2130e2624e43dfdddcd774ff7987058882e7344db0cfcbb30a8b60ce4b6f5fc
SHA512de4b4574c742fc55dcdb0aa4c4229c12c488cfb3560fd59b935da3e501e3d601a9d355790462976454367a9bd31d74c0c923e9da89f9562f1251d0f855a4b2ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55faf746e28d655a2a6acf635fa5220b6
SHA1d2067157fbccd4551b58883921b6d00c169a1045
SHA256fc3ce37dcd7a766c5964a31d51bce6998b0c2a7dd3d860f0d5e4ffbeaa3e9114
SHA5126aa2fa6184e8be6d2da3cc944b51df171e387f083bb9e572d71e69e55426380bbcfa6ba33035237be871fa7fbb258b189d9466dd0a0181abff1f45aa0781870f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596cafd27aeebb64d00cce1bb1115ad9a
SHA177719e4774217442e99fcfd00e50c984d9ed48ba
SHA256e94391fb4999bb615493ce36ffc240039b04b7d49b86ac1d06505de96222c74e
SHA512acffc269e302ec585f5ca0e8c6a3d4f07ad74a9363d5f18c1e69e12a367ba415c00cc317c308ada657e7396290aabdf0c3a41bd2c42a3c33145ee877956ac7df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ed9fd11856201e2b68f536da4112c07
SHA11d1563af10d91013e0512811c9fb6deabc4addc6
SHA2568668c05f1311c76118d9edd4294224a4e57ebda893bf33c6ff175331da0f43ac
SHA5120c3dd5f07c28f1a97f6c075afa1b506c54e1763bbf43849bb745d87848d4b4dd492b28b2772ce7ef3d44bc08f8d0f140cd6c2032d7ce05ed4c7383dabef1f8b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1a2686954ddeaaf8511bb43c9c98668
SHA1c63a3dac35488445b15e2eab62fda7e7b2cfc3fd
SHA2563eb5a73d644c6225bb3b5c09a744ec57d7f6cc105056bf66ed16ae3373cc0407
SHA512855b2dab2bd2b2ee5ba5ef12c534c4b5661269078ac17385edb02a306b6c5d74f59fb96ab2a4ce556c7aedeb27b0e905dd9788b5fff214a6f3e8ef341113b344
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53786dcd44cdac6df0f1eb24631cce4a1
SHA1e7101dfdff402652295d282cf98acb48b8dfee22
SHA2568fa71c44da4b32ddfb08bdb3a9975b7192f72133f4bcdf34d750dfa76d06e0e6
SHA512908a8ec2a4072c1aa257efd089687e4f4860ed79930ee88a9cd92da0d8bd3e266294ac808ceadd7d635ccbae38e3dfde98e211bf456d17fbf1c7f5e78ea00af9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c106841c37648f2af9e989a61ff48f03
SHA1b94df6484757fedf08a6cfaf6c929164448e0995
SHA256773e2888823aa087a440f4423975332f6ff7e35a5d98cc208ee3eef3d7f4f663
SHA5125c4a1d40f8dfae445c6049935ca8b14f413c2466b2e0b78d7a5e094329650065c0a7e7f09996213517ef4050c036021fb4d3b91389317c220f8c357e2757b69a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a99860f9ef685a0fdb35023467e8a8a
SHA1fd2132b354eed81b0bb96a6fe09c01c68939e115
SHA25634f49f6ebe6f692b432f5724104294e8da7d38ea65c969c05b15c193b092a469
SHA512cfc6f8cedebcc247ab303de3d0d7ef304088d7f1cfb82d90b549d1679aa267881ce73114cd7ee3015e18a38662660fec3c04d562030f06e90ff7a27ba0559d9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57619b495f3351eb606643f6a8c37b92c
SHA1d236fe7313d6cd976b042e5cd1d78ab359174e9b
SHA256ca26c42b7731de52ce6040f58deb1b52f1e50dad349e1b8325edd7e415d6ee22
SHA512117b0751642a2474cffb04523aafb367e174ecebefe3abfad327d21ebb0744257b0f874cdb11baba6d73d344ae3998a31b2799350cf4ae9ed3558cce242ca389
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD50558b3186a8b229d7f97feabdc5021ca
SHA1c6fc204927e2d4f706115c5a4fb96c84759aa7b5
SHA2568bcab745d735b57dedbd27aecf9b218d91c38460b172fdb6d65a32195f85342b
SHA5123efb9e3cf2c70e9097be33d2e132f55fcee62bffca4f18bd93285f2efbebe01dae2247521e85ebe1732bf2372673d682bc3552b17b9a9e9948c497d12c580347
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b