Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-11-2024 12:56
Static task
static1
Behavioral task
behavioral1
Sample
b160a88a629fd3b1d06704bc55ca883a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b160a88a629fd3b1d06704bc55ca883a_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
b160a88a629fd3b1d06704bc55ca883a_JaffaCakes118.html
-
Size
136KB
-
MD5
b160a88a629fd3b1d06704bc55ca883a
-
SHA1
624f0c8d30be3f03d64fefc3d2850ba45544bbeb
-
SHA256
b248a2e94c33cd06c416fe197a17810ee77741e54d021a4297d3e58ce29685fc
-
SHA512
05026e47c887db0f4864b55427e9cf52f5acd483d8b7eee9c1ff10a6582bbee8513772ddb90344c0d8b8ed1c1e745956f0da0d0db24c6e00920dfaecfc35b861
-
SSDEEP
1536:2iJEEJXFAvTCDrnDD9BVZfkj/f5w4w+i2:2oJXevTCDrnfVZf2
Malware Config
Signatures
-
SocGholish
SocGholish is a JavaScript payload that downloads other malware.
-
Socgholish family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439046866" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5E8AD6E1-AE51-11EF-98BD-527E38F5B48B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2092 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2092 iexplore.exe 2092 iexplore.exe 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2092 wrote to memory of 2864 2092 iexplore.exe 30 PID 2092 wrote to memory of 2864 2092 iexplore.exe 30 PID 2092 wrote to memory of 2864 2092 iexplore.exe 30 PID 2092 wrote to memory of 2864 2092 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b160a88a629fd3b1d06704bc55ca883a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2092 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2864
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD567e486b2f148a3fca863728242b6273e
SHA1452a84c183d7ea5b7c015b597e94af8eef66d44a
SHA256facaf1c3a4bf232abce19a2d534e495b0d3adc7dbe3797d336249aa6f70adcfb
SHA512d3a37da3bb10a9736dc03e8b2b49baceef5d73c026e2077b8ebc1b786f2c9b2f807e0aa13a5866cf3b3cafd2bc506242ef139c423eaffb050bbb87773e53881e
-
Filesize
436B
MD5971c514f84bba0785f80aa1c23edfd79
SHA1732acea710a87530c6b08ecdf32a110d254a54c8
SHA256f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895
SHA51243dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5a5643657796a43089253f4db237e173f
SHA1dea3c8785b750429dd2638da37a1b41b4a2d2342
SHA256a421b3f92ae947366ab85f0f4a68d80855f4129bb68376b54b128033253e7260
SHA5127c5ea30647ef992122e9c5ced4da5b5da99200726b6b3bb221de056af13b40826ff2e1d72873c687469dac6818fe599629ec03335f82f61e569083e57921c2f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12
Filesize174B
MD5cf187881554e3f9741146b8cdcd4e2b5
SHA117a532f6ad376d6ff04f73f5a6bedc1e1250c3c9
SHA25699fdbdbbe39635ba056e99b4a9fa5598aa79db9766ab6defa2f91d8cd28508fa
SHA512f6d51c1d4e492ccb26ba3e6aa9ab2a78acec8cb132df1b027c15f03e945662e72cdc20c796ccd41f0670fad9861f904f2aa7b00b20ddfef834b811abb06b0899
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592a3c6761fe6d3561c13bf6e4b0c2fa6
SHA14e93f74b91918570f2d029f8c6966096e5061ccb
SHA2569fbe4c9e835653bc2b20e1e28f43a44b25ac9c1c4d4c177e45fc534b38104071
SHA512d3a142cdd1324334b41cbf7ad6495603bd5f1e9285a8f3bbc60ae63de797288065eda61d70c64908a2a75d1a20094ad7f6ee48f42fadfea4cd7251b8507efc02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5041e903159a10091d93923e0815bdc6b
SHA1e974223cb5ab5f760e77d8f2041062824908f183
SHA256df58bc70e803feecfd5196454a42869d6460b039c6024a28f63e25bddc7c5104
SHA512fc11cb5e1976aa74e5c130b9c1536a3113f7f1525e103c6c2e3347d11260c0b8339360ac4002612aa824e072880237f710d12085754f036755a4f2878095a491
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560178994a5d3fc3dc2e6abfab8847d64
SHA1e79c8aa00d91cce8119ec2d9cdc8c46fed93806d
SHA25637126d6270d743082289e792f922259b5e8cce549ba71f87b7b46e05ed72e9bb
SHA5123abba62a7004087ddcec0b9580c03bf4ad48ec4cdb27ffb8e5d50d6fee256db42e0330ca78e187ebbd9c5a429d1972da67967e416b68aa690e527c3fcea54b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59672c346ade0acf58c8861ab415536f0
SHA1ec3eaa7d15235e45d66da113126c916843d5c60b
SHA256a89b0d706393f2d4b8442db1a4ffca1ae02dec9f7a4f2ef495ba2fc555bdddbb
SHA5124a7f4250817fd7bcb60efff7c97430bd08e7192f116f02ae1b2b3beb8e5367015747273ffab3bf25cddb4749007f8d0071da5bc79c985168acdb26cc10b6f65f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58798418c3b237c4345bdcdf7366ffb58
SHA16fe645927e5c98bb452d20df8ffb85ee8f116595
SHA256ec639c2d09ba62e82048910f3d622649558b991b1a677641712141e03b45b9da
SHA51274f57396bbd5a6842f33e877fe06131bb74ecc0245788dacc162b881937f51c52921282a4cf5cd9e576c04a1ee4aeb0ab133941e4f7c36c8a85ab98cd10e317a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0c2e68ad27652b930afff23d54bade6
SHA1be72b01c6e719a318970d1d169be3159616110e1
SHA25604c42ac815f52633669f71793a29d35a91a11dcc582825f55bed051eaa0f6e85
SHA512fb649142705eced551623fdde00451bf79e1617c16ed4751fdeb359b59bcb0004dc7c458884d96535db9ebd2626bbd4db12e106c11de54e64f3f5007d2c17a63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd2d106ab0f09d9e58bde19eac3b22df
SHA159376fc416a6ed1714bef4a6df889b6ce941994c
SHA256433b74af2d1816e04b5fbf583632bb705e5ffdc0bfd43f95570d2a8dbde5233a
SHA512e5fccb0989cf96e5e5913fa871d4db67baaa23f9882ced8355b9faf368603b1c5d4d4975ff7c1243f75e69900280e26f508866c75bde4699c80c81ab2b6177ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56128cb96247695b5e4fe2ca8115b95dc
SHA1cd1214ae7934adbbd0a11cd4efdbd04843cd2fe4
SHA25613c8ad85153987bb481223c5c767d364094d123246646b916118126ba59701e0
SHA512d662b24a0b3193cd7119f56af669a6d887eafbac5561eac905904f73d6c64f159cd0b30b8769eda4ba883ef971a9728636a064b8e063d986ac6545f1d9ca9e26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e90f066beb4210628628cae42b8479a1
SHA147a5d048fc54a57894e8616ff7bbf5daf7fc9b69
SHA256793e33cbc077e5279d842770a901a800a47c039c50e68c7317477a7321d72284
SHA5124429e59d4ce9e28c0c199f2e1a84b5919758907f4a4bdeaa5580cca0d12a9d989bb2b1b5a3b555fe5fe0f1aa40f321a0d6d56167f44a73f89021f9d2c0f709ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57603bcf54737bd9f0c52c82b4d64d0a3
SHA133b900ebe44dd4be2b83f626cef244a79f86c3f3
SHA2569dea85a2a6473da6c24a924d35fd7b9c2a52c7119748290f330d2415827a5ed3
SHA51244bbf082bfe82dae985d4b4e34c56b2f8b15221d0df18a693b3269f11821dafe54f1b16ac2c0641db23bd737ce0954b194a1ea9d885081b85ed3d558e5e269e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566c5286b8fd1d7cc14dc961cae4cb278
SHA174484b62d11cc807628afad32cf7f506c13c85dc
SHA2563b8c9e4ed237bc168b4c87cfbdece606b973261ea8180e4752d6cf43ef9fa599
SHA512dee4c4d6cd79928a04c9ac4a76b52427348e08ac5f06d010033d123390025793bfb9fef9bf875c0794992d09e2e76eb9f712533033c861419758e2b52900f786
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533b677e7bd1c8d982839ed4b42b67875
SHA19dc14a6d8a82609be7fda898c9fa1c9f67f61cb8
SHA2565603282105550a1bbf2a7d54a99af1f4e3cdb4e3fc21c4612b23508476f836c2
SHA512b2f4901703f84d48b4290c272707b7372ba5b2bef6585cb00c20d3f1febfbaf12409be0b3675ce88987e1d75cecc9c57d05d07a0d078eb396491c4309e918413
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50861d1c4ea07ce6539fb649cfce57f2a
SHA1c4e8ecf81f677cacceef1db44952a09125bea9e8
SHA2569c054374c7b8be00c53d6c29dc106fafa0b94c7e5228136af282635b45918ae4
SHA5120694d36efb4ca362736205f6dcc45996b65aa14ed63c5056b1309d295afe9e9c6394f824e6929fda3da9d0a59d2687a1913d6f71246d7351303ec7e0884cb256
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c888802cdb159b819124d2e4a1e4d32b
SHA1d89abcdb3757e258ff6f0cfe02bcd5951120861d
SHA256cb4c12dba37ab3e8ffc640541d2412e554fa95f0b48e09be94c8222efd67a0b5
SHA5126fdd88a2f5936fefabb223507f12d275f80c6e39e61541effda07f785bfb0d6b1500eb578db587505c08436fdea1fc7118c3c9cfb55a02004918c10522bc5b72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8
Filesize170B
MD5d902cfa3244cf4d56c21b12c20be0192
SHA100aab57e61728f66c7878dfa494b218383a61015
SHA256143615fdea60c2e8c005f887285b136417d1a6bb74b07e0ead9d2fd9a07623b8
SHA512a22906077797ce9a38855b341004958e00308fd657b79567cf4fa78731b463a27a0d453a742aadd7c6a34640068909ed3964bf09f446601afde14e253f4333ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8
Filesize170B
MD54ba1ad5d5a1f36d9f46d347b92d0cc4b
SHA1a02ddf5b54bc5d2801dd65b250e3098b792cfaec
SHA2566508ebf9d92fecb0183dc9a96092bf9350b2c947b97d3ff2199bc6bd0cdfab37
SHA512ce29dfc1ff7b4a23ce5f9251a742e8d4ffc09649a88d6ae4529342acce71384744e1040d6704cddaa6ecc4c0c74b94aaaaf5e7d12995c2e04b6d5e3ed2a1dea0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5029f15689f819550eb71390e295f9e14
SHA1c7dd6f9f4c7e42090242ddfecb583cc83882a43c
SHA2563bd1c07201cdd8015dd46a3f43e1234d9a7a5ffafff14e02db23a9220457f035
SHA51229966903ea4ebe981324888345d6da0d5fe6b335e90c0b4eb79841857cdc54973cbd061ba211360b7860c304c3653f9074310697b9a6f63516233c2dc060cf25
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\633SXO0D\f[1].txt
Filesize40KB
MD55e4d681e9d5d3564e26669710fb5f408
SHA1fc45cee7c2044a3c14e5e2b1b4cf3cb40ca23a1c
SHA2569818fc29391f69d6020c6752f0aef79efef3897e3eb0d189cee0969e6b226a6e
SHA512408f9dcca7b8d6c2e193dd1bb670de397bf4d677ba878e01f09d7c62f638ca6c9d90d2bb20c67aa35e4ad0f8ea3ae670a4a9697c09e00ac8ef07231dd9ae4157
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b