Analysis
-
max time kernel
138s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 20:38
Static task
static1
Behavioral task
behavioral1
Sample
971713b09c01c8895e9251f97b40e948_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
971713b09c01c8895e9251f97b40e948_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
971713b09c01c8895e9251f97b40e948_JaffaCakes118.html
-
Size
48KB
-
MD5
971713b09c01c8895e9251f97b40e948
-
SHA1
06b039f30d6a7e76075e401ff0fb04d127bd908a
-
SHA256
bca31707a2398e9563a0c128c35a93d04594b7a280f72325fc2c827e71414f68
-
SHA512
abcdc177a753985c873403d82b872a98f95fd37e64c3aa08feb128c3168922c842fc28b2182c0cc087120ce0efa74ea79b7572bb024fef9628b9027a667a8b7b
-
SSDEEP
1536:ptUtUKuIMkUn2WwUAUUU0UY2B+UuUuUDUFU8QU5UU2UQU2UzU2UwUFUOU+UnUDUd:PUtUKuIpU21UAUUU0UY2B+UuUuUDUFUk
Malware Config
Signatures
-
SocGholish
SocGholish is a JavaScript payload that downloads other malware.
-
Socgholish family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{16AA1351-AAA4-11EF-9B6B-D681211CE335} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "438642587" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2324 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2324 iexplore.exe 2324 iexplore.exe 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2944 2324 iexplore.exe 29 PID 2324 wrote to memory of 2944 2324 iexplore.exe 29 PID 2324 wrote to memory of 2944 2324 iexplore.exe 29 PID 2324 wrote to memory of 2944 2324 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\971713b09c01c8895e9251f97b40e948_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2324 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50776e19e8e405bec6b9b548366784627
SHA1132f5936d4bb945c929aecfdd2ee26cb5cb7a734
SHA256243e60eddd7156a9954073a9b12321ec3e4291e32488e4caf04e7e2d32153ca9
SHA512375abd69d7eb6c50adf07df32c5e481c7815ca68b1b95788536a98308e36a761bce97e6f0c23745aeec6833988f08bb760f373e5f138cc4e1f644ce35a1485da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e584a395115ffc1c5aa161d53ea47a1
SHA1c510748d46864bf5cdc4ca1314c893218c22ec5f
SHA2562bf520dd8935d0932d906742ed9643d2fe3c1bb02f593bcdf6542dc92728a51d
SHA512306bebebf2b925a064b93612fbd8fc0b72816294f50fbff3475c64c3accb42dfe862c2ad0ed5f2b0ede37d373d48b6f3f3d69e3adf1a5169b79ae22b31cbd5e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf2ea5fd792b3748b0d0eeced1092cd0
SHA1555c0867a84cc50701444ccc45e41e08adcabe64
SHA25617dacaf84cb90aa934de295983aa2bf31f2184f2ef581084ccd1b49ca07d11aa
SHA5129b99f340eb9ee80006f4cc9c366aad550db9daf1592bb5935d3c7299de22fbb3b4a681a6f8933f51c7c829cc3284085c7fb8e93a980d4a9e51e1f74fb5405a68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b336a15592911b68cabe56cc973c3ac2
SHA1c6e42a7beb75b624447f2bf172341e791a21616b
SHA2564bf95ac38f07565d6a7ef89d8f5f4876f3a31b9cbe8e6f225f5e66ae9c2e3996
SHA5125c0fa8907b38ab7349fd7c834e294ad9508ce8923f62d5d386341f0b1f3146dfbc6cc33a01fdf1fd9c78918000def11df69e64e3ec0ee7bf1f776ff220720a84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524466633c6fc10402731ab306ef57889
SHA12d0adb6d12095915f39cc08740133fbfe43021a8
SHA2569a52381e3fc787721ab335cf0c3e7cab5b73a83b0673fd0539ed9d30c422c643
SHA51226cd8c109ee68cc0de422703338b170ac6e775c35d9e3449027aaff1455b30abab07d83fa1dca5ba024d03efa297bfeb4c9af34d864fbcdb3972a5bc88f6aa09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc6b8cf88f216603d748393e520cdbd8
SHA1860b3b4b2e041b14518af1a618f373ebf710d6fd
SHA25644cd2e07375e16a405396f07a5673ff913a6553be453e1b32e84f7dbd56abd32
SHA512075fdc3bf72aee34ab409262b84b8b3f643a917196f91fea006f1d82fde757bef6c4f67a32f9ccc03b75ba8690a03dab42feeb023d6f8416aff3278e3231c6a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b18676f1d7932b66ae5eb4324aec1029
SHA1e67528d08ed1c67812d720884dd71076a2dd39d0
SHA25637b1a9b5259ad21f6f624d4af331b72c5890c87f2759e3f6c737b0748ec4cac1
SHA5123d8f97534666b22cb9bcff9ecbb907157a466c3590ab9c7a882335fd9bc917e7da1cbe4aaba3cf64f5ee3498f65aef1c5d474f2acae5ea5b5d79a9e67adf0d17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faef18e7fa74ffcc45a09d816767610f
SHA1201effa69c6348c655c7a61e3cf9c680ce70740e
SHA256fda47c292789b47854866b028aba680392e01ab63ad3b0ca5147a0436e3ea229
SHA512a1e1135ec2c1d53d703a18e5322cee18bf49eb4b04d4651d374d6f4b46c02448dd273b852ecd1919cf753e4a1c77c07bbe3137a2db42aa7f9b51744d902620e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575d212293582d1cf80b1a01445653eac
SHA1dd902e55cda03c9c6dec0148ceb3a4ba88401bb9
SHA256ed37925a533c6115811590762b77a11729efe5d80c96437ab98cc85a272accff
SHA5123f6ee1bfa65f8861aad776953049fe7b4c3e6dd85d5d6e8460aa87e6263c91767b3f58199712f40f2d969f1e6a6bd3089b4deb4a185f3f9f50c791c317cf419d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f86fc3d3a0d8f946e2b7ad21d7e1f4f
SHA191b8582da064200de25a00c19a1e3dbe87fd99d5
SHA256aaf9e96cbdec65e938724785fe01e450a59a56f000f342ae193c56cb606b820b
SHA512f27d1dc4c6eac4a9f4ec7250bb2a80f460e47dd94e043138a9bbe3292aa7f451bf1bbd6f273df32eaf56b111010f11ceea7f417774e87fdd1264bba5946bb752
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ec802efcf06484d5f3ad6b538ac1e0f
SHA1cd8723b6853fb33461751f9bce2f6b67fe16d21d
SHA256f91c29a763157a4bb1030925c94ce34f708884c941ede45dfa7b56da39020a57
SHA51274c31460152edef95a7cdcb0c2ef32ec85de83ad76487c868de0773a7e67daa844cc5912585881cfc0d0565058dca5c49f642ef1473e32b45a2ccc891475a72b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2398082a5870ea1dbc3a4caad914d69
SHA17197f22eb72c0fc757ecb9b589a763757b932497
SHA2561f0eebc8a15a05d3b17412699ba0bcfa356929f6a6ce11b67e13e149e1242884
SHA5125afe77e33771a25dcf89e7e72238aeb96f3c806e0a3ae37e32fb35f513bcbf934e6a405d78b70b284c2cf9ade30ca5d35d4c03eb9867dfc0f945f9cdd0e197a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bbd9c911009209d7aa708a3ce4b9252
SHA16652511ad4bf8561c63d82477b0febfeb6ec1301
SHA256f7f1827addf4f065c3ba31db2f33259e7d369d460454e6fb1f98a93630b7dac3
SHA51254474978d190fbcc7cf86ad133103c5406b285d76ca9ed99ba79c2b23a2586547a87f67c6922906f26f0fd08ef60e6ded11a4f89d7671a777b33711b6585b5ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d78e09a6f87e97871a6e119f5f7dd0ff
SHA165414942eff48f287d6dee324c1a74e2c5898564
SHA256cfca371a971baa724061fe85cbdf4303796c1329007393cbb399a3b1da1aa794
SHA51204c2c5ff543d102a97fc398b558b2986ecca244540149dc434290c8a46a8727555c4ab58d8adb087339313e37d2bb8293ef8a15d8b17fa6e2fe145e38b6a4968
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfe006ef2aa0afd44e2a7f0c2351e830
SHA1d6a5cd18ef330e75a17044d1ff5f60afd65176c4
SHA256cece4c7dadd3f2a1e7cc81d06dd54e511a9d6fb8f6b9ba2ea4fa8eca45246a72
SHA512951409a2e7941574db5486a3b2feeaea1a85f73f7e20d6b77cc6dd8bde798a1e78e7e5e31497f8b5475d74d56aaa878e83312bc6105bbb4d3b50ac0512949cf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f25eba444f2b8ce29b52cafc3cbe1d44
SHA1676f2d0f370fa8e0b15394d1524a007afc988705
SHA25633a4ba678647a1bf827d27f8639e5d95368c0b9679fc36f84e9c91f87da9bc4d
SHA512f2a933053663346bcb8816c4f12ecd5504e529e45b49c6b88b709175f6a195204189e1be5dfbe669ce1700e07ebfa8b5f42064ce18f36689936dcb8067c084a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5706fbd47ec9e78877dfb71fbd91cb4c4
SHA1f3b66cbc77441da3121492001cce9308e55378a2
SHA256a8cbdb624dbdf1472df1e07d41b17633e5dbfe69ad84e72e45a9b4a98dec7c9b
SHA5122eed374a1f836f2bde1906533966a837b76ae61799bcd04c9429c41598adec5acf09b912447cd16425ace176fe41a74feafb727a984880f2568fcd2bb3ff4475
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53858f59f9a7666a4284da760168eadfa
SHA1fee02980f32c0b538175c166c9c0dee0ca6af7ca
SHA2568e1225cd6cf41c3d0a37dc77e7c6567f337017472d3a85247666ece2d7b60b69
SHA51249a30546b7a47770056262a83286562e45e61bfc14651100ba408069f52f1a6ace0e98afa980fec01def892ea97595c5b7a2f55f21255c36d98b959e2d7ab1f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5400f18317ac6ec61ac795490fe352aa8
SHA1931a0a1b053b0b4817115ede6ead9f531b987a8e
SHA25617f46706226740b81126d817c05ebe000adc8e4ccce5833fcf95e180a33d9272
SHA512c468590ecd4f6889f81886f4a0f1bcd6b1c7f0987ed4f47e445530265286d9ec6eacaebe35f6344ab9a2eb487e7823be0d163fbfd0a8b594e3ab04879dec34d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fabf610f4a7e5a405be304f2aaa73c7
SHA14627c3521c4f8caf074cd3a02123e77c490a8ca1
SHA256c8e4df82f14dd625a0d2eef2a5dbdd560092dd886910d0657894761598ca4165
SHA512062df40f8b374723d915bc01bca159636663ba414ce58d0b94753f09d2d4a0307e118c7f33254c41db04fe6fab8ae6d66cfb2eb85b2d8f76d7e3b35f6057433f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5582635508730a83dfd9b3284a6e69912
SHA1c2dad19c070301be6b01c173fe5a860c216bea12
SHA256de001a7a0445d646d53fa0b2fa7cba115e343b306aafa46378eb721229ab92fb
SHA512f6d8fd634af224d12f654833fc5d77d01bb6afaa2a44750780e43e8106d707420079c156600f4806b38186708070f21fd396aecff7133107e806dcd13f27bb42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fbee55e729de016d211a1d08e1ba9d7
SHA16daaabe1ec5fc4f82e813b74f5b566f8f0c01e67
SHA2561c16a74a90f2536b9e575a78781fdcba87804e3b16951223230c444c8439ed19
SHA512ec82b89be9b2ae7d4c01035b5a15cc858bbddc0eabce38ae37a3ffb9b887052aa2961cb22d04561abc17f6a1b0da1938fa47d8ad4e84bb8c8946b04388ad86cf
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LW44N8OS\f[1].txt
Filesize40KB
MD56edad6d964263e6cda2a4172cee22a1a
SHA14716941fca830751f7a49c50dd5eb54abb1cffbd
SHA256287aafe95e8063adcd2ff9fbac7c5a076f3cec236a2a335aebc81ad60d5ea96a
SHA512037674bd7d54235359e26d54a04370cd936e121362157934c064c26980db416042455f2461b583c076b447933915546f19c19bff631529aabb3d9f3b799cf0da
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b