Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-12-2024 14:02
Static task
static1
Behavioral task
behavioral1
Sample
b88eb53c4acbfb5a799e7d1cffba1498_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b88eb53c4acbfb5a799e7d1cffba1498_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
b88eb53c4acbfb5a799e7d1cffba1498_JaffaCakes118.html
-
Size
132KB
-
MD5
b88eb53c4acbfb5a799e7d1cffba1498
-
SHA1
ed36d8dfe49e3a209f6b92fc8a5303ed2a2deaae
-
SHA256
be0c297be9df1e96e9d18f4c94b4e809f7295d4ba2c92dc2f49260a431268fa4
-
SHA512
076181a39c73f3b6abcdd0274f2505b96d7a701771bc7417bd8a1c8c3997bfa40fd333d21eff0a80dce4ad37cf3f043cfa8e0c11bc863744ce1e46b82df51dd9
-
SSDEEP
1536:bKJEEJXFEEZCjanDD9BVZfkjnJKlf5wrw+iO:bQJX6EZCjanfVZfcj
Malware Config
Signatures
-
SocGholish
SocGholish is a JavaScript payload that downloads other malware.
-
Socgholish family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439310008" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0B68B291-B0B6-11EF-A7C1-EA7747D117E6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2536 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2536 iexplore.exe 2536 iexplore.exe 1864 IEXPLORE.EXE 1864 IEXPLORE.EXE 1864 IEXPLORE.EXE 1864 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2536 wrote to memory of 1864 2536 iexplore.exe 30 PID 2536 wrote to memory of 1864 2536 iexplore.exe 30 PID 2536 wrote to memory of 1864 2536 iexplore.exe 30 PID 2536 wrote to memory of 1864 2536 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b88eb53c4acbfb5a799e7d1cffba1498_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2536 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1864
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD567e486b2f148a3fca863728242b6273e
SHA1452a84c183d7ea5b7c015b597e94af8eef66d44a
SHA256facaf1c3a4bf232abce19a2d534e495b0d3adc7dbe3797d336249aa6f70adcfb
SHA512d3a37da3bb10a9736dc03e8b2b49baceef5d73c026e2077b8ebc1b786f2c9b2f807e0aa13a5866cf3b3cafd2bc506242ef139c423eaffb050bbb87773e53881e
-
Filesize
436B
MD5971c514f84bba0785f80aa1c23edfd79
SHA1732acea710a87530c6b08ecdf32a110d254a54c8
SHA256f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895
SHA51243dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5be90811122914b0f7190631c56e3f5c0
SHA1e1b19ef173f46b990b80f0f1db3f69480467f5b0
SHA25644ca2f7b1222e5ced862ae061e2cbb16219e0b06abb4117d83007961d544aa0d
SHA512fc6e6dd944902cbb74827bba9b9bf2d75037b5670f9443bed3392953bcda9767c38a32ec7251ccd9b29e26a66ee4e7006a5cfc60bf70a2edef02035acf084fe9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b0001ddb9e4d05bec9a936b3be2493e
SHA179ccc7f64055a99fdff3877c95155f627949535f
SHA2565b658ee17267eaa5ace835c45b8ff9c08df6b29316a1fac24a22a0220f9a4860
SHA51295fe54749c85afdb658de04eb7c47adf24bbd5f7f1792e626b12060fed708b3c3e336e8afff422f2afd79860cc0f3af5014d9f36ffca232f1246b804b5d6e7aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e7054fe824b7e79a778e2ca2c5ce035
SHA1895b891658810b3e0ed434cb1d25fb8602ea0c9d
SHA256a0d5dab3a9fb7c9bbde1722530c0d1bdf65328777bbda0ca1bd27110e5f706bd
SHA512a6d05068d252707078e123c98cf5ae43e584fa6fca5225c444fe9160cd7e573512c77a15c175e5e065dd5d0828a7bfd07157ab217bb1df37c314de6ea86b5720
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ece81c3b8b32d44586f4f41e83bafc2
SHA116db12f9168861aee4af547d31713120a5aac22f
SHA256635989e894c3a913d505e5fd95b384ec63a36c971c42fd12bc1431181348f555
SHA5128ed8e5b4d99b5a02d41507e6a5a9baa0d9787119f5ec086e42f1057b59d083fa378cde63d87684b17f631543d62313b52c9e64826a262654f39ac08286fe5c65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcee232e9ee3794356c9f03374186a0d
SHA1d24c6000b83296580522c25f2bb070f7b96862e6
SHA2562039161ec8067f7233cba857fe48ccc39398d51325b9aa3400a5f00ff31e1403
SHA512357a1704d3b04e3d68eb98253a128ec6d0997637ec6a17768f80f50a36ee15a57dc366a45f05a0aae4227c466cbd04210d52f17af969aa4d394ac14efd8177cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50433a79a4242572fc343e7d33385a8c5
SHA151153ce2474013b810587ea33163e115da5f1dac
SHA256036056979ad55f2eaeaf4d5e3e792f456be6e75170fbb877b287d74c38b73a95
SHA51229900e4e77701d720db864bdabc0d479d61dd2d02fba1e2fe0f709684c6ca8b91164b0b466e86263319af69fc4c73bfbb7c2328c1f3f27cf00e4af1ec9aa307c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dc486f87677df9add63429ca0b75ebc
SHA190c102252b9b705c709cff93dd63c0a3197d5a45
SHA256eb5b0b952ca2af11b6ecc5d0034d99dd3890ee7186ace7e7ac0e8d485ada0b2b
SHA5124dcfbe2b22029e213ae2de83235a70bcdf0333888298723ab90907eca0c95805f09634a3d70e85a6bfe0f8083f36467c73ad2b88d822d9558d46bf1723795d3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544cf3e7ad836c6f90431b6c4a3e595b8
SHA19fb9f8231d22c874aa0ef7e8291415ef9fc7c95e
SHA2564b0c9842e3e4969522358a145af957a9fe9e2c95ba5e2bd2758a700748a09145
SHA5121b752bc17b89997090070c25216230b769366105d08010d5505edaa85f7ef888e35b8d7edc86a221359d18459a3826a654866e58f98741caf7735fe01826ab65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5066ae355431bf1e8e6096d9bb04a0783
SHA12cb61a132d78a200ebf025a86fe46222407868d1
SHA256654bb7d289c0fb464922f0b5875aa540a53795c36cfcd3e7b5105405dd0db85c
SHA5123ec654cc59c39011f57edac2a8d95dbc4e24f873d557fc0787be422a63e55b0ee4f01e06964bd0b1bff41eaea3e3ec82ad6f9b1f98bae7923ab4e4fde9dc7573
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514e916cf24861b71e60ee33d0cd33b87
SHA16bbfa91388d3f76b29bdbe4d34f78b96554abc7a
SHA2568c7ab4e49394abe176fa8940ce7ac4fe9de8428feb4f62a22230ea7a8f502173
SHA5120246859f41dc1b996c2b5d0f800f5d83aede6c43e62d78c99b8bec6d60d8bc6cdd942183ef317797389934e4daf316bbd955433f4429cd3e40fd457ed522cd42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598a2640dc97f757ddc6fb103223bf095
SHA1eea0d5018ddd775674abe8566bde90b107a0a7dd
SHA256645c085fcfa4413b8714fdeffbcacf2080891905dd724d1852a53b8abd9b7648
SHA5129b897fd303c68f0f273d8b9280195c9c79543a180944a56cc3eeb4adeaf8b5dbcc19352752621c7237a4d47183057169229e4c423eaa02389f95a3188501c628
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b91853dc6e4adb5a5ebfe2d5c452f323
SHA18427c757d37271854422f823661134b0c685606a
SHA256a5e498bbf1ed6af28a1ffa589002c5dcb5fc2e8a537318a358be1e60808fd1e9
SHA51257a4609a7f19bf7625f6b9f7a00b70f30230be2348d721cb65fc48b258ef7318cb7cafca25692c22112b0dd756740b3513d3db1234a967fbd5663c7f1babf768
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552bcfd3456a29233e7770e7c971fc041
SHA15215bd09b77df6e3e9e813eefc5dcdf98d06d3f2
SHA256036957b4b6d825659c24dadfa3373ea3a56fe7c4ab282091eb0ab1f2cfe02f37
SHA51271d4b268fa357c599f620ee9d31f757b890ef8e8094af21866a937fc69ae029d01fcdde0d3299f6dd0f9d1757926a189c1d459163ecbc93410afe85127294b8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff63123547d2f3209cabee8752445aaa
SHA1bb6847c4eea9457128e58825ec374f73cb17303f
SHA2566b10edac0d571a191e4edad0503156336359bf0919c41b4c8ab34799a05bc22d
SHA5127954cef59d4f4f9e39b4dfadebf6bb93cedaacf58e8471f001e530799911f35017811fe03a602a8289f2b93bb90d7db6788d73f3bf2da3ead67dbed1ecb99491
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac0231abeddeabb55181d6f331eca783
SHA18b914ad35658e7e4616668c3729be2c4952d023b
SHA2565e73cafe589f49cb5322de2ebdb166018d9635744f9dc1c694fc712ff60c7619
SHA5124a2d85dc9ad28a733bfacb7529bded2ef873298256842d3afcbeb12f60635f434f2f8ab0b005dfe1025dfd8f6dc8e2310e2f371b126ab3e4dd87a6ceb512a52d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8
Filesize170B
MD537a1675a019f48698c2c8a58dd4d36b6
SHA1224350709758ddff5124096a79a9041bd7eb2375
SHA25603838715610391bbcedca578ead921e123940c7bdd814cf094a38ab78c130b2b
SHA512c160204f7aa176111bf165a9be3544704d8ad5018aa50a52831da8650034c5ccf6ada049125f27ab39b702cdf9c89e97ae333e30149169b69d02217c09397b22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C20E0DA2D0F89FE526E1490F4A2EE5AB
Filesize396B
MD57ad6532b656941849946729ba99149fc
SHA1dc2e265549d1c640c3aed5ff95f3b455ac46c4b6
SHA256b2b8fb9d6724cec99257f6b040401924bb6735e0b1f06267950c9d3d95f4e229
SHA512dfd2106943d1d63f952cb48b7c916c2f7b946be174839d428d213c5949db8eb3550f578382ecb64bcf5212b39ec074d309f39c998ca207122ffa41e3269454e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5b12ae792f4a6c97e5bb50284197bebb6
SHA1d35db3d136c3019757a494854cc44fc771dc0323
SHA256ebf3cbe7881ce83338ea910c6a34c525b22b84f4520b8c1d4396765154f1e109
SHA512fdaf6ff9948d6983121ea6b192c355c94dcca4301ff35a0b3a3de4e56d372a1056e32b110ec7a2c34fb221f9ca0ea26e4451932c72842cdf2183bd1dae0f2e8d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\AS91FDNI\f[1].txt
Filesize40KB
MD55e4d681e9d5d3564e26669710fb5f408
SHA1fc45cee7c2044a3c14e5e2b1b4cf3cb40ca23a1c
SHA2569818fc29391f69d6020c6752f0aef79efef3897e3eb0d189cee0969e6b226a6e
SHA512408f9dcca7b8d6c2e193dd1bb670de397bf4d677ba878e01f09d7c62f638ca6c9d90d2bb20c67aa35e4ad0f8ea3ae670a4a9697c09e00ac8ef07231dd9ae4157
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b