Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/12/2024, 10:16
Static task
static1
Behavioral task
behavioral1
Sample
f38952c2cf05ec8d5aabd3140775e379_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f38952c2cf05ec8d5aabd3140775e379_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
f38952c2cf05ec8d5aabd3140775e379_JaffaCakes118.html
-
Size
180KB
-
MD5
f38952c2cf05ec8d5aabd3140775e379
-
SHA1
6c4198a8f065448a450a15b4d76a719cae32a127
-
SHA256
0eb41cac7234c00fc125c548395da41159953b00780163a0ab4dc2e102aa21bf
-
SHA512
992756b8c3e17f6430849da18b7ec785812509476a9da03d81b7e05c5ff21d6f85408787889bd021f73643f46e38cbaed51fd6bbf6c6fdaee64b2970330a377b
-
SSDEEP
3072:VedxbjvG83mAGXmNJUzki+JZgfdGJ2PtMZKmBxYfVo:VeHYXmNJWTHtRfVo
Malware Config
Signatures
-
SocGholish
SocGholish is a JavaScript payload that downloads other malware.
-
Socgholish family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B41CB141-BACD-11EF-A0FF-7ED3796B1EC0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "440419681" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2168 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2168 iexplore.exe 2168 iexplore.exe 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2800 2168 iexplore.exe 30 PID 2168 wrote to memory of 2800 2168 iexplore.exe 30 PID 2168 wrote to memory of 2800 2168 iexplore.exe 30 PID 2168 wrote to memory of 2800 2168 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f38952c2cf05ec8d5aabd3140775e379_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2168 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
854B
MD5e935bc5762068caf3e24a2683b1b8a88
SHA182b70eb774c0756837fe8d7acbfeec05ecbf5463
SHA256a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d
SHA512bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5d90416d78a12dbb8fbc4655cda803ec9
SHA1258f11463c6d3c593d52a354c964015f4d29d4bd
SHA256bc017e406b2db2484873417ae81a295aca47d909566f78d8bb0ce1299e466cdb
SHA51299bfcf665fe7314eafff3198e58655a09c5a8d1f270e70d42ba010891759861174e60e09cc0c524548a11b6e93fb13a2a7ac29374fcd1a614ee8941678ce3299
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DDE8B1B7E253A9758EC380BD648952AF_86F2A83F54EA52E2D59C5D2EE00149B8
Filesize471B
MD555cd3c4eea5ba01c7012e345c743f6b6
SHA123c1dc9e1691e8755bc2f8a25622d94fe8a0dfb0
SHA256b80ba8627414b71449f9aa43ee5e355e30ee6ec443481dbc503d941886e7b5ae
SHA5129f1743d0789775c9d106f83cd3a51daa9469184dfaf6591f4f46657dfeda3c3c7d9d2450f422645b8023935dbd4616bbcb93b10fd09df72407c8bf27081d76f7
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199
Filesize170B
MD501528f4ea5b0ae0d0153dfc06e291ecf
SHA15ee5b6307e849104c83312effa9e392679a1eaf9
SHA256e0745c9aea1fd8444e5d658b068ade31e981996569e7d93a15d3ca58264544f2
SHA5124944c4a50b35bad050a7efc2b0aa559ea2eb543c5aa6295b014019213c1188b9d7ac2b79d10d16b249dcadd7afada75cac623db08864e53dec47738bf5625bb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5afcd8688bb37fc25347b8aa48620c0b6
SHA12097b577fe8c9541ed77efc7e0ae163a6255ac83
SHA25661ffb6d05c3e783305f6db6d7c5b3d852cfc05139143456bccea9d768b8dc23b
SHA512d12259c78113a9450f791ad21e89debdcf81d20f0385a6a899b2d79b2306784d3b5af5892a5bb29829f80950cdb57f8deaddf09358ae5731cd9e8252b82dcdad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5eb21e89b7712b4379570868a29b0f8bf
SHA16f8b81533667ce0fd32d2fa9a338fe6f7538da6f
SHA256f7f1440fc2e21eebe68277aeabe984cfff0e02f377af7233bceb3d144425dcfd
SHA51239788f580fb2df913f10261429785ee34c07adc0b6f8cc04231f04f8b2c7a46147f73022a4d11ec5b147bbddb74af82dde437e59f44de6d280dcfe237cb12854
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad312bc03d72c65feb2ee8127c09a02f
SHA1fbe00a06094a4e05b22d021a865e23f181d3c382
SHA256d380ade91c97c46a9d9a41e7419261fc88d11a8feff89d0ff46bfb0889903e21
SHA5128eca4f8728e99f6a36a898b0ec7e1e9f325d3bd7b040540b151a4302f888d41b5ac4e66b75021d8aa0d97b01f0fb3a24d5c6e918991a72052a2d7453e87d87c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56037fcdafa123a3ae5b1e5604bd8bc59
SHA1d76d6669f68ba84af7fd6896fdaeb090fe0f8682
SHA2565f60d06ee5a36ec5d7f61a3d6acf8573afc919f5ffc4ea4a7b3f0d0a3026bdc6
SHA512479f512ef68665c752b05826a78fab9d20b31e264b08015f54dfc04508cc8fa1e7776e7f0339ccc5b6b5c07795f6d271330eb64c98976300cf9ab4d1b969d143
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eab2dc994b3b58a6ea5ad7e0ed2454e3
SHA1ef0f281aad0d2cae83e3a680aff3886e4302e731
SHA256888706760b4fc333fb37e0b07260802c7b6468ed48ea4f3361d9f0ac9577ae6f
SHA5121cb93e3369162bba007f77ef0e99e5b458d5c79981f5e57b532cd39ae81b44fcfb91b82563ad9aacf8f5734aad0493617f093c9218bf9043c9cc94e1bca7d3db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5012376ce52e2c4da710354fdc3321ccc
SHA12d781e4c26d2db3fd769d8e551f61f5503bfeeb6
SHA256ea748f21b35ee550cdd3f5b2832a237c311eda6403fbeedf0ea04ae2623d7406
SHA5128dabe884c9dafd157fbd9e294472b934c792d24c9086c505c95664e1a7520c2253bc63374896efdae6bbad8ce28c2ea7a824139bff0eb2d0708c9f496b22fea8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5840c3afac1f91b44b39e943f2bfbc3
SHA177c14a0eb4952f7699ac928790d3b9b48e4d05eb
SHA2569b231a991efbada0450bfeccd200035eaa9ee155aa2ac33e6096470a9257082a
SHA51256a580d0129972bb72bc138d2f622933db6c7c2bea66bd8c25d818379c3fece0a2066b04ff9e5e68eb867aab49233e1afa1b706dd049a742d4c868ccf9e18c9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c020bb6ed8b4633dc52b54ec845d6924
SHA10f281c61bf48c9228e0316a42e8c65257111bfe3
SHA256f59887c27a243c815e19fb6f55faf8308d751dc31235a9b33a04494fa68f7d39
SHA512a1c2e266f65a1986d97f7789fea959e115b075b155c4c70b41fb467b0f07dc9d7c80a3adc01168ea2649b79c86f60358fa1ba810c2bf3595126d76b98a84763d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3019db53ea3b83c3ef9fe1f9ff65e77
SHA160db74de161dac0b72cf5af194b46d586aaca087
SHA25665f06f2b1886ab6a1c034c0ed0c404aed758d5ffd4481013dc8646a288e903bf
SHA512f4520b37bc2ff0097c2cc1545769f3b2417b2c91f5405fc1508845617963bef9668e795c0ddd2b32b0905a8e203caa23f5abff71ae554b97ccaa0a7cde05e8ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56899be9bf3ce6eda4456621b0ead607c
SHA1d8945fa95a63061d5006bd04f624b06dada21a5d
SHA256b1ebba03382800bde8b09dd8b82188fbe77b6ace1dd4d27629f2d5124241aeb5
SHA512d464fd58a243abf56bc2b6d67f40a5f5e2e9d89d87e6be4dbec0546df632e06759a76911896cf209e78ff9b626d3168acf3759af30c20f651a1d7b4cc4815d4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ad527277adf11b4b7228be5ce477ca3
SHA19d461792e520f52fb40a3f4dbac9d8365eddb691
SHA256584179ae448f342f0dbf8a6efa5478e1cb690036ff38d5038baae4e4c3f75f97
SHA512834d9589d0378c98a66cf33c09a0037304ce7429d8d0631fd4c28bedb18f6332e4b5185c9fc57476660f2d6e77421587676b9486e9ecc55aab230946d314f90c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f74ece13d4d9e01a63bcd38ac5e9e8d5
SHA1e75a7548228c780e66fb8ec66e264ed9cab6e21c
SHA25603a36bd9720fe30021f5edfec518d93083de654755c6af20d3ae3f2c01d07f55
SHA512d9276c303898eaa870e0967a37158ed3ad9e22166dbdec0a1c0744502caf2751bae4c97ec1b38d9655bd5df782af31043ab0a8b3cc84bf8333fc259e6bc0e8f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568fd9a5b8a966c2cdf54bce84baa5d33
SHA1f72f5ef8f8739aeaacb21f8b7554bbfa02d18c30
SHA256775871997b999ef3362c1198ee64000f27151899c5711044a9444ce869318913
SHA512ddc4efc4ceb8c42dc3b03c55f4cd93b226a2bdd132df71a7c5084e4988fcd74e3343b2354a51773a113f0058925ca4d8982ae48a6e666d6787f54bc691715aff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DDE8B1B7E253A9758EC380BD648952AF_86F2A83F54EA52E2D59C5D2EE00149B8
Filesize406B
MD5da659c19383e4d6343be0972d8fc6a14
SHA1a282ea5d228bf7d3cac62700db2bed02fe3f0ead
SHA256bf39b33a20e4b9694241823f7c5bccf1fa8cfb09abf36ce8e3376e55e69262cb
SHA51274b2b20db3a791e932ccc3bc2ea915dc07a8f412864286891aeb1ee10571e83ebcdf82e073d852298248e167131e3520dadd436cb9045cf999e13c8835a9fce8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5c7f3037f2b6cb680b9b3d57b77777cf5
SHA118b4dfa54b2cc3eb3bddf7e8d7dc44493ac72b95
SHA256821bc47fd31aa7a9983f538e49af27f80c592ddb6e3c3413f94b6464484209e6
SHA51229497ae43ca6d60fab12ab9f59692503539b5da5bbb2ef12c636787562710fa06d1a14e399554843f68f51de04338772dc77efecb5afe428f0076d25c6314b1f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\K3VL8XEP\plusone[1].js
Filesize62KB
MD53c91ec4a05ec32f698b60dc011298dd8
SHA1f10f0516a67aaf4590d49159cf9d36312653a55e
SHA25696b335b41362fd966c7e5e547db375ef0be7dcb2aec66bf3646782eeaed4b2cf
SHA51205345e754b39e9f83514bc3e14b52f3cbf321738fd7d973da55db99035b11b4152fedce2c203eb34376cc9e18571db514ff9fbcb4174a2dd7cca7e439cd25944
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b