Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-12-2024 20:40
Static task
static1
Behavioral task
behavioral1
Sample
e321fbf0093d6ae4bd9a5690b5cc7664_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e321fbf0093d6ae4bd9a5690b5cc7664_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
e321fbf0093d6ae4bd9a5690b5cc7664_JaffaCakes118.html
-
Size
62KB
-
MD5
e321fbf0093d6ae4bd9a5690b5cc7664
-
SHA1
2c2b9cbd4019afc25c4de3eddfb595d793942990
-
SHA256
e026839be9d115447d3dd557cd9bc7c5b4fd32d874cd4c0dc44e3862371ba717
-
SHA512
4ece16a32caa2f556d34ae3f53defef04a9115fb7d6755d662785ae08ee82dacbf002a65ed7e7634223dedd7b85a83023ef8f965ca79ccf07d0973dcc044382f
-
SSDEEP
1536:MB9hPI8l+n+M6qvWWuWuerQy5+QBczcAZta1:Ur+n+M5v/uAF5DMZta1
Malware Config
Signatures
-
SocGholish
SocGholish is a JavaScript payload that downloads other malware.
-
Socgholish family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "440166061" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{334D0E21-B87F-11EF-A51B-E61828AB23DD} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2672 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2672 iexplore.exe 2672 iexplore.exe 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2692 2672 iexplore.exe 31 PID 2672 wrote to memory of 2692 2672 iexplore.exe 31 PID 2672 wrote to memory of 2692 2672 iexplore.exe 31 PID 2672 wrote to memory of 2692 2672 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e321fbf0093d6ae4bd9a5690b5cc7664_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2672 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5a8ec86438ee435d9b2da87a46d072739
SHA1a1f12ce92aae995d589e895d2775847084987c3c
SHA2569f1d5f232a9e19a69a11b2b94140e14e7f748ec22c4f1e61017c23f99312cb9e
SHA512a39d6cdefac6780cd9e22a7fc33bb63835262681869d966282abaca13b03de920cd8e806495577768907bfaea4f617e0b8458a36320f4409293196cb57c79a23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e807d8085c0a994c2c22e912320b6dff
SHA1d9517260add512656b89f1900154b94087a0439c
SHA256cacf0854d87992af676cda4f589250bd3b67d427a5a8bf43cae687e9b0044d36
SHA51251eecfe0702b4fcccbbec3dde39b8a375c980d631c4f0dde4df4023e9d6368dad1f953ac2968c15bd4607a77577918e21791653babe3e05eb6f3dcb16f05a095
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5209502f1fc50d10e896422b07cea6b48
SHA1f7ea39325b6c157b3b4cd800ada9165f956379ff
SHA25628b8fb84916f21bfcd5cf02c7bac167369812814c905bc843bf97876d28636b1
SHA5126f1a1430af1c0044a5c8a97bd3db2e16e0fccedde4afeeb8f4f4c7ebac0b25ccdc5d7ae9a24fdb288af936ee71415513058959b81d22757e2f9cf75749e8c996
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57241fd6838067ba1fdd3beed32d87f75
SHA18877074c9b4abd3eaafd36a79dd1103d0fcc8228
SHA2565b64a193ed1eb8f9fe3c5e7fe274c22ff73c55f2b86d4f3b0f4c1a5c343981a3
SHA512e35830e2203807cc59f63d9db0690cc88b4af39b0f9e75e80b18c72fa7db9c0c6c09a3cb04d94ffe1c910a2bd80835c67c7bf29f3e70da995d6e6a06b8c7d531
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eba8efa9fbb5060e72187c8039f32762
SHA19104e0758f0fc3950f5d699ec790fd25b26e795d
SHA2564c9e6bf9f928c7d6f031411b4c8f878dff820a377f65de3a1e450133459690ed
SHA5123963bfb948736fb1682857b4e76a4b6a0123ee524661755cdeb3058134ec493c241c5e58a1fa17978752ffa28c8f524d042a98ac96ce103348d6888c5ecc1c32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5136ca56bfedb4ef06ae9dbfbdea5c548
SHA11f1a3d0a3d4660a892547e6c3e0985d71f12cf4a
SHA256034902381c73cf0f102654848d95302892e8d060cf7eb91cadc630d325ed287d
SHA512cb69d8629c26a766bfb1131920c333dea812f8ccd8e2a7ded2892f0b86789ac6e87300ef8dec9fb3a0fdaa14b33ecbaee67c2a13515a0a889ecd05bdb39738bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f50bca99789b62b75429886a47b3f9b
SHA15d4fe64e42c3ff1de4cc9a0efe5a8632cbe573d9
SHA25692d9c841fd6f28fb9ad218ea5af642ac98962f253a49c33bb14af9db92ad4368
SHA51240adf18ace09a2ed4fc79d9e7d12e57298cd90630b02288a975b984af6153c61b395efd9fb689f662ae41deaa76dc641297abb388e7dce787737641b89afe8bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5831a9c4a78ee3a6c8f63f205ac7156e4
SHA169a86c68b6dc2e4e6210ee017dd9f0c932f9c8cf
SHA256f9d3530a19b5e714d9d27267e4fbcac62e0f7a48cc826ce686208e08336c043d
SHA5126a91c77d25411a04a951bcaaafaf671ddb47684dd5b965e8430fedfc96e7c3702bafa997b73e8eb92022d4b47ef9dff7739cacedb947c04d3c75265a83f25544
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5325795bec7f0d6af036e1164581affba
SHA1356d440db6cb74fc08d9b100bd26a2c9ef53acc7
SHA2568bc03c4ab5e115ffd89fc2eee288e105bb9c2058e83d610ca07147895b6453ad
SHA512c644c0973a39245e524b5edb8398e46bc10a417e66186be7fa8e802609c3d536791bc3850590d0614d64272918590ed7863cba4194f92508b692813fa1536216
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b286bc3b5ac8f263a4ba96ce030efe30
SHA1443eaf8541a8068a135cd52437f07aeb350ea170
SHA256193427053bbcc1896af599e7f0db07a0736fdfaf7395582fada72f6d06f70f47
SHA512411b2b190f05968441f4e61061ae88d96eb5cdf0020c6f2152e3fec86c5174c131eefcb401abc2c06bf4f824b186db88f7f592d235c075a8b96df2a3270b6802
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b33e6d1c45b3d43247e61c5f7c95bd5
SHA13cab5a57d62d4bfcf8e02c416c39ae46cde59e11
SHA256fbe4da93c0a51c424b4bf532003bc8785edf5d8ca30be50072fc584566713e15
SHA512dee97ed592874160ec4bb4310df49a0f84014491d2dd1298f67f49f96a19fcf2fabce5f37f0a2d458ec1bec130136891b9c86e87b94068b1ba11cd3e7c5a2019
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD56e88eaad735a42e3377055df76cf9978
SHA1ebd9a49b34235fdc6fd674e8f75a6f0c62d8bd8b
SHA256b87095e7d3bbf06769742761ae8349a2ce94616e51f6cf89f091b8c1c23a595a
SHA512ab463003be528974a310f6320fb47d4bd00e4e97f9053ddfc278fb2fa0e897d2127af8dc27853b7d806310e470aab91c8235fb67561a28e4badb4c615ebfa781
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b