Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-11-2024 10:27
Static task
static1
Behavioral task
behavioral1
Sample
8aff3bb0c4d74f6526d73cd526f70ba2_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8aff3bb0c4d74f6526d73cd526f70ba2_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
8aff3bb0c4d74f6526d73cd526f70ba2_JaffaCakes118.html
-
Size
47KB
-
MD5
8aff3bb0c4d74f6526d73cd526f70ba2
-
SHA1
e8f1afe8fafe30598aabacaf5f7def1af91d6abd
-
SHA256
fe3c375ded8314bb4ba9e7e41b41c9c9d8c554193c1042158878be91cb36bbf5
-
SHA512
9bdd1120e2d6f91a52300a34c28ab1c8cbb186abc59d6d1ca9941c74f37ef8ee3383c065ed2ace1e455f7a92ec122d7ef25ae8cb4c4cc3b76665b0aa771f4aac
-
SSDEEP
768:/HRHSaVX3ApjFOoLrEkgIbb+0KVTdH2e5:/HlS+ApjFOoLIkgIPwVTdl
Malware Config
Signatures
-
SocGholish
SocGholish is a JavaScript payload that downloads other malware.
-
Socgholish family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f0000000002000000000010660000000100002000000050ed6b9c1da8b48cf14394b7ec306b3d69cf886b605a1506a44ea79fa5576d58000000000e80000000020000200000002e7733fa105e21a505d4dc9a8afcdfed1c6680f9017fcce5c93bfa36fb54ae4c20000000503068bfffbc9cf76f0cf667d7a6cc3586c8dfca61aab0b27f3ca1151923604440000000b7b690240ea35545f87547564c567873cb3e81a460285eb7cd5c0a7f120a1b7385af15aa9835384babad4360469cabd78a395c4e5eda9386a711c1c7cfdb21a7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9039e029db2ddb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "436791523" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3C3AADF1-99CE-11EF-9D09-F245C6AC432F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2772 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2772 iexplore.exe 2772 iexplore.exe 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2772 wrote to memory of 2744 2772 iexplore.exe 30 PID 2772 wrote to memory of 2744 2772 iexplore.exe 30 PID 2772 wrote to memory of 2744 2772 iexplore.exe 30 PID 2772 wrote to memory of 2744 2772 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8aff3bb0c4d74f6526d73cd526f70ba2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2772 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5900ebf9159f4ea826e3f6541504cb1e7
SHA186e18f8184e9243fe4c06218bb9f5cfdda4ce83f
SHA25659ba9511b87f1e6b6d5eba6b85b530f33c333bc0a6f2ae27dbb0cfb4faea9b73
SHA51201b91e65053ef60f7e74cb489442e00c38b27e9dd0bf15576ea3f34bb6fee10273c4d2de821d84849ea5bdb9b8abc23021cef125a65f073b4e8cf544db5c9a57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571f909d3a0bfcd89167bbfb2f3581d00
SHA1582046e27caf5af47c1be0ad07c4422c89e70590
SHA256029b35954accd55c4a1fbea7db1eec257cc4fe499d3e2edd959a78510386cd00
SHA51258b7bc03a224910e0a4d6ec9ad67d65eeff3ab968d39964c13aad9bf5a0fd2190311f4888819aada4eda58ac0e1ec92afad1b7d187fe085313164887c13a989f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc74bc6c84300e08794ce89df2bc9d9c
SHA1d5255656509efe67f2aa35ea494a874b7a148527
SHA25602c1d19d33dab5cb1a6f460252421f307ec7415ca0bb282175dd4d9bae6e63bc
SHA512711786b54a9968c865f9b401b47ce02bb93d64bc5fa3f8a824daa757bc8102f6fb40ecfcd31712357de7cc09ef28e7d50a06093e8cf5b55fb199f41c0437afda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57795539f7b4ae8c2a296d619b3ab735c
SHA14ade4f3285480fd1ef3519afa0cecfc015066f59
SHA2568cb3768301a679a69e4ecc7078e2d4413ce13c61be6d5e8bbfd73240abbeace1
SHA512dbdcd971ae3fc64663eea1cd7ae16d434ebc1282507dfe7c01d4fea071eb67e550fc303ea9c4758f050fd724072eb57c7f8d841b5a44ac03ad6ebe3708cd8058
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5301c2838570040b0c295df0a0272f5ce
SHA103573c501555981352d5de54cfac61522fc06193
SHA256016230f3243825145baf9a816d284f6541cd623078ab784696346990cbddbc9a
SHA5124ca576cde959e87f19a6d84383479495e95cebd7dab242dfbb6ebff151b9250a76b50726cb461aa978379b6381ddeb2b0de346232c5d24ec452d68431f276fd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebe742db30e8b8de3cd2113bcb52e161
SHA142b2da4a743fd624589c431c003b3f4531fa6dfc
SHA2564b7f836041a55570f21dcf3f3602c40c7d7c91ff53537901241498f86a8eb84e
SHA512a934cdc3fcf74de1513bfc80450b3142ec7a1eaa86aba6036fe2083fec3b4a0e8a1849496555134ccbe8ef86e60b6d0b5191c38fb87fcd0413cead22d5b670a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fedc159e7242d9e8085caccf40c7d48
SHA167fcff248c7c31d0ca9213cdd37bd4f75198e0fa
SHA256b5233af037a5e4dc272e5a8f567e231291f31a6ade6d8ac3f88101504ebabc4e
SHA512140a7e20865dadef071967f68a4c667d0190b6f5f38a401dcec4090f820abd7cc8610a2b0b635d7559caf630f58c736a65275d0c8ac4c4955fe9f37dc18008b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52629a24d8b9b59fc8c83c347d526939d
SHA1f84f0541eee642801944ccf40f0b0b6255fb644a
SHA25675067196c7eae54ff9893a43de78484a95e39256ed3bb75293842f37af99e3d9
SHA5125aa8241881429310b94d24b2b5260db63fe516e7ee1bc3c017846ff6cba925951b84d911feb25fb6d14f57294b95340d6b8da16f60ad77080242d44bcb9da5a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a416dcb7941122cb5425c42cca272719
SHA161ca0904c83a52cbc9429e2394fdddf8309df19a
SHA256704a29b1577bab68bc41048fec4c90c27d659a5c47063c5646c2c547f6b44b6c
SHA5129f9de45126cc92aed76207b19f8636f5383703fa1c4113ae6288dfbbcf21e66c24e57ea4147aca2e20bc947e84cab4c1b54dde9bd347702562db900176d6c50b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540ed7a0959002583f68009aaa0c7d08c
SHA11177896c8f64e4a4552c3de872fb6c2a09c66113
SHA25656ae66f09ccb1a0039c9c53e8787ca5d7985084f1ab8f854a4e8d5299212ddb1
SHA512933847ecc636f6bfff80d29b5d3431239b9a162748721f712671a180f5167cbddd5c937aae8484ff36f870197e3f956ee78a3b672861843bb59732a066b7f4e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8b06170477b58c2ebc30d6052904c00
SHA12526a4e1c203bbb031a4d17976b5b2eeaf4a8211
SHA256cba7ffbcdfe4f778a86df06ef887149090049db9177a7400a16bb6476c0d2323
SHA512a8d4d63b54930d26622dc27d70dcc6196e4b10f18d77cfa07326e0aab2e87bdd9e2a736d1da6d4f56714075c9aadd304189c6f1b8ccb70427c34e3a9ac66af92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ffa46b7fd881ad3970e2a6c361b59ae
SHA1349d0a1bfe6d721d3012af6381de9757fc974875
SHA2560c421d4b22ac0ad1cb818648e9b1421b821bb84b45fe12d0ab38b10e459ba3e3
SHA512e1b011a347e2e92c1b014fd9742a5c994190b7f8e48c12a28babe70ef5bd70eccd27728661157e84627b57c6121d0eb200e78334e8a22455f9a2480cb5a8ad3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1c9848a2eca5a918cacefe32262d2ac
SHA16613dc20bd1acea2a2c08fbf98742d8f3255f751
SHA2564d889a5cc14a19732d6cc7ebd32b3e3234ef0b2be0b95b4c8895511d283a77ca
SHA51262815e7181d5fa41b5ce59f60ac55607db96ca3cab72098fc242cbdf33cbd5bcbaf4c0c3f88568ebbd59e2791668bdc3dc124b56b6b2f06444eaad8ca1ec56e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532c84b67631b2dc35839707c30c4e2a2
SHA114c798d5f2852850d424d7f30c275d168ea79a3a
SHA25603af8d83933e2d5987644908a18ca8c588c5ba87236360de3f58f3b380000c4f
SHA5120df8613e46c9442866fee61212f0a43aad88de5b46c4e031a4321f1e3a1d2fbb1dd3da86005db280f0a6ae37207f794b3e32000587dec09216a48faef166ea8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5526d205c30098e0921f1fdcc93695359
SHA10b8e0b6742ab077c309cdc1d62ee9cb4a4147544
SHA25601ade357515ec8ced3fc0449ec18e1708be29b160c52c869cb76ec899b9d42d4
SHA512f0268e9bd529619f1b401e5f52a8314c61f07e56463119a599cdd9720c73da191365f3e1594e374ec4ba58b3bbefe47b23b61645a16a45d29ecaa0993cae037d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b