Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
04-11-2024 01:02
Static task
static1
Behavioral task
behavioral1
Sample
8e6287d494b7d08db3e26796c5ff630d_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
8e6287d494b7d08db3e26796c5ff630d_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
8e6287d494b7d08db3e26796c5ff630d_JaffaCakes118.html
-
Size
77KB
-
MD5
8e6287d494b7d08db3e26796c5ff630d
-
SHA1
0e05bea3846dc83fdd7c2801fd25beeb650d340e
-
SHA256
6fa6934f4b043c8a4b6a233ff32b46e5ebf60b2e0d51c27abbfe3dfaef8fb476
-
SHA512
e6ab365f7bd78adc624b81fd5332cc54ffc2f771cd2df2100733af1ddf81e7779e0f6e8e451214242530cf7b95bdc524c9ef3cfaa457343c35b0b74654227462
-
SSDEEP
1536:+BebMLnVXkIkIkIkIkIkIkIkIkIkIkIkIkIkwkwkwkwkwkwkwkwkwkwkwkFVklmZ:TMLVEkluQnWrW7OulK
Malware Config
Signatures
-
SocGholish
SocGholish is a JavaScript payload that downloads other malware.
-
Socgholish family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b131900000000020000000000106600000001000020000000b50a54e0fcf90ddef73737574b6d414dfc7ff7deaf88640465f960bcf02b4900000000000e80000000020000200000005779ff061068bce08ccc0a481f6e7b25546e9e85f246aeb22878580c49e3bfd5200000005ba9e29427a29cbef27f9acda86ed87f8d2a45cc62c282ebb9dac825d9c2377040000000ae6e6da8141ac91bd176bc5f9f686c6e482dff0999d2867dc8299807f91bffc71c2a18ea3448a1b4c2e8e681ec44b025d04449a443688dc43789792ef6a75557 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2006be19652edb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "436850801" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{421AF061-9A58-11EF-A276-7E6174361434} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3012 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3012 iexplore.exe 3012 iexplore.exe 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2912 3012 iexplore.exe 30 PID 3012 wrote to memory of 2912 3012 iexplore.exe 30 PID 3012 wrote to memory of 2912 3012 iexplore.exe 30 PID 3012 wrote to memory of 2912 3012 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8e6287d494b7d08db3e26796c5ff630d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3012 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e8078721a30f4ebc957e5d24aaf122a
SHA18133fda458b690b5bc87623deb920924268a459a
SHA2562aefadf656e6a54f1e2a1dce9eb0445435df3e59c07eb840f751614c688c8356
SHA5127922b2c6cd3d2c78b58b847b9f0138b2065254ad554c1289e13dd255cfd6180d386aaaf30f363e2a30e56bc33b69f4884dde99c2a5b44086f2186a57848b2a11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58df42300a784250cedfc7894d490b725
SHA1e4058401d8965c258d11f02516311b26e33c625e
SHA2562cbbfd8994b096e19ee4f1ed623a1a3f4b64712aff582593daf52a3eae1b437c
SHA512d5ecb043adeb6ce5dbf360ba0d0b1780a80ecdbabf00ed48ead9054446c864625f0f278ff90238bfac2d80d3255340cfb693ed9eba3436a5fb45690d52794a22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc36c155f0aeb8fe5c4e060dfd325a9f
SHA184ae475f36de94d51a0a8cbd7e00e1ea7d2f4738
SHA256abc7f9947b05c96f931ab5aa78f052922aa031612c6625d839bea7670eb90db8
SHA512bcb9f44781a7b6e58cc75912b459ad152d377efcfb1171fed3e449d93bc02d50bb1a8358667f544d89ee80e689d45206c2fb5c806648c54e49254f0aa65464a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c50d3995824daf105f721d4ea0b1b79
SHA1c1969a71445f022f5a5279604a27e4813204f366
SHA2567faea5e81d7fcdee2788d6ff13d65c85b8423d1f78e855be8d37b42d27602b11
SHA512b9261a9621b88ebdeaaed390639f1cfa29df9db6025a4c6da92253bba5715dbf7708114450253bfd2df427dbf69c8f2ac2c8981d34a40e57bae520bc05de9d04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc3b7fd8221972e278f45a61bfff91fe
SHA132b5f6b008ff770711c74d86887eefb53506d71d
SHA256f6cd089f766037aff571df1942b36f792ed93b9bc0585aebdc9e867e4bd15c47
SHA51262237a58ff251a772a4a7a0464bc566c5730b87ef4372442f81379badb6303c1386fa27abe22a18c917d3e13d7722821a7f7e5d98ffd817764d3c89f6afdd053
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b28e7646f89958e89480dfc102db645f
SHA1a782c6c8a3daf07248c26974c7302f880382bfb5
SHA25677ca2d338ba68323f0f48a9a2149a759b7d7a88852c7187603902765a4b03bda
SHA512a00aad416c7687e87d811f845feb19604971daea9d3d99c358eef0195edcb72de69e5d05100f4cd36fabc726140f51a294f65bf8633307cacd42f26314bbe954
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e797fab522e328d0acc157823adf5fc9
SHA1fb20b4c749888a9d5049aff402cd4221f962a6be
SHA25684032713a6f5db48069f31158d4642dc6eecbc6e7e5f6f25526339e66e052c08
SHA5128d1d83edc0744bdf602b40d000e908dc3a143b5f8d499a68e5bf58eb20dfa51213e8c5e9c69419ecadeee12a89bb928466f74c0d334fec77f552b380167d4006
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8890f9a73375448f02a6601dc907b29
SHA1d2d393e14ed91315c8910652894d25e1921869f6
SHA256a8aea3c999dafa46b94c67a2fdc2f7d418bbb3e46f0225df54fa30aa5c3643f3
SHA51230d8409777a08cffecca329dfe5cb3fbf2aff4b8e99185e85a15d094d5e159430f4cd590afbe229bc765d556f2fdf64da1ab6430b6dd1871359bd39d9f2e704a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5720dafb054a931989da51acf549d4232
SHA18a402c7a83cb20b60ba6db8cf946221bb50dd7da
SHA2563868dfc3107afb805deab8e69fe807a6ccf2620238e47a8ac6eb63148569df95
SHA51255ab3317094fce18b5f99caf736f266d32406d62761e83f9dfcfef491c833f280a20228b8b698ae5f460fb7e141117f0259f4b290262a70e60e2c449f4107b6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0e286d80d9a98a0d5495507b0fcb0d3
SHA198e23472ed7b21fbd2fa1bd4bf72b0c9028f47e4
SHA2565443b5b4172c82a56691bd2be369ee3e43a563ea706517195df9906d9c3d2a30
SHA5123a6e01c1ff96cf14add20198d0af316c5920db7fce7bd25d77b06d98e9f1a678da83780298d6a8eb726b80f0996bd4ff4547076f1b9a9c97375346151c3c0d88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543ac5968ca48b80312aed9cc58a29464
SHA155b7fcd80e367bbddd288d8e7d9986bb72047ceb
SHA2560df5ec82d1370681fb27380d8a395b1f2558297e9f46741a4497ef0d5e9b4290
SHA512215ae68c70e0bcc28a67a56305d3db3aa651bf4bd21546fc2d6a0121405faf2a7bb52a41258d475ab56a0b89936e1b8bc1dfd6ed755969103071f633d4cb70e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587e84f5cf0f61246d5d0316f0cdd1b20
SHA10dd4f9da491216a44d6bd39163c76cb40627315a
SHA256dbc012e43e84d7691d9d538ddcbb5a294e830839bf63aed330c939d678818182
SHA512f73d41a4caabc4adc6788f94e00dd3bb7765dbd2600ee3cb21374232f20361bf2a16ca2e0bea3333e4057202bbbb0251e625a2a4fac259c577ecee9cbcb4620f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1c3348633889b522d68f80efc84ad03
SHA1303df7c4981b269a23daa9e352c8700d8d71ca57
SHA2566de19a49e7a5c48dce8955f1070e1129088388e63ab77b2aa831b2e1bf75c192
SHA512716e5a80027ea848b0f5e3e867140904b78e3e261aa99bef09c3a310c962e33ce53acfa6a6a7f664d2b579cfe4d7eaa635e84680861f58fe420e79818a502686
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5984e5765795c75bf835e3c10969f3647
SHA1d3f7163be72432fb72d6b65b53f3089dc2b924f2
SHA256a2ee9594254e24af06dd271fd4c9d9f545e89d4f63348cc29bbd6dd4d83c0877
SHA51204884d8db6c89463a6c7329bf62cb371de1cdd7bf365c124d5891c6e9d75a14b474ec436096c87e3e65b309df3b2bd331f4727280c3fa91abecdced5bf6cdd03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551c3caece113e46fb4b94764d0e40818
SHA1f4d37d17d8b72c0a04413017db52e15a02c64348
SHA256f78790ebb7b73b2acc994a535b2ad1eb2390bee87558ccf29d2e01dba747d4ff
SHA51227d7d9474cc4ebe968d65b7294dd6784d9d9329a52207b59c12cc11c274a4362f0f904e4eef1ac8f9227951b5998c2b40fa8b51eee1bef5fa10298e562d70d28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d287aba7741fe2efa6a8aa36969893a8
SHA111cc4b383b24723c9b0ad55eee31e145a2a1870d
SHA256f7a8e275f8a4ce0e7b64df32f50c0ee1be6f2ec02f28cb825fa2520fbcb03e96
SHA512cc4d19cb37d4de24b5f932df0b79c812e0284e18308f829170696b2cca0bbdc238aa198d480b5365422ff575d1a08312352664524244385f105056a02d0e6351
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f3c995f62215e41e212654b18033cba
SHA1f1d6fd1d4f8b894c036c330c626c995c26a0c9ff
SHA256611c7617f7b228cfc55888c2ca1d567d3303e6b68afd26ced61f01246ed32231
SHA5121431bd638991e8d580b67f6d51dd42820411b0d71f79bf2b8460b848531a152f84dac040b6f5136e81abb8ae7c2c836fcaa54594eac5aeca07033c72ec991433
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1ba0627f5bcd9f4098391477a56a9e5
SHA11c822bd2f49fbfba232493501dc83f3143cbbefb
SHA256b77e9c8e844f8b568e7925c7059a3a888aa5eef3645d1b69d95e44e0fb3528f3
SHA5128faae7c35e3ad5373b7b67e526144778e02f92b6a6156ff04658399ed4680dd02bcf6ce4a31e40ba2891d980cd1af3dd61edd01954636ed8149e810b0e6effb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8cb5d3597bc0d94c1a90fa12a076c2f
SHA13a55c08513cbeb501b5209cd3251ef36767d39e8
SHA2565caf680d59d23dfef39feb4a6a07f3cc82d83ad9378e8754726478d05478b8d8
SHA51220718be30c84ee5cdbd47f9001fadffcc98c05952f89b9b2cd52ca861dccb7260cf837c266002856ba230eb4ac590ff98948f34cbaf06566d50af87e06f8feba
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b