Analysis
-
max time kernel
140s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-12-2024 04:21
Behavioral task
behavioral1
Sample
fe6a5c8ff1b88ab61d0082d6a5f30431_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fe6a5c8ff1b88ab61d0082d6a5f30431_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
fe6a5c8ff1b88ab61d0082d6a5f30431_JaffaCakes118.html
-
Size
157KB
-
MD5
fe6a5c8ff1b88ab61d0082d6a5f30431
-
SHA1
1583a3390dda08153f84ba40e4dfc11ca40901df
-
SHA256
b6863d358a0d35f9b8fe5cee4c35e9ad19fdb51327276a3723b45fca15c6fa84
-
SHA512
3ad07ba077b32d8b7c59f63c1c846ebabae7cc15908ef2ed6b99abc14d7c98eb99e91d6d5ecea29eca2082570e18ac88fe3926355928558d5db611034046bd48
-
SSDEEP
3072:0XUkSw1QRYuRB7aYD/aDZ9k1MY3kBD9biUa2v/K9odxhFPzodxhXodxh+4Xg6Cn8:0XUrw1+xB8
Malware Config
Signatures
-
SocGholish
SocGholish is a JavaScript payload that downloads other malware.
-
Socgholish family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B8CB1C41-BDC0-11EF-A322-62CAC36041A9} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "440743959" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1404 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1404 iexplore.exe 1404 iexplore.exe 1676 IEXPLORE.EXE 1676 IEXPLORE.EXE 1676 IEXPLORE.EXE 1676 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1404 wrote to memory of 1676 1404 iexplore.exe 31 PID 1404 wrote to memory of 1676 1404 iexplore.exe 31 PID 1404 wrote to memory of 1676 1404 iexplore.exe 31 PID 1404 wrote to memory of 1676 1404 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fe6a5c8ff1b88ab61d0082d6a5f30431_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1404 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD52d561bc2817270cbaf06aad1f6700338
SHA1f48a887715f453bca1cdfba9c3378e486410b806
SHA256ea2a03b8c7b8fb754143eb4119cd6973a95790b4d6f46abd22b2d77f5a626660
SHA512c6f63b69f19d9e200a769783ffb55b079252215134a23e2a32cb715b7c6af49038b64883dca020d082c3148cf0419c7809d40e0eff5422398896c3b3096d7f9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD546985083ee8b9afe980be5914b3ac4ad
SHA1d96b8c92c4111e459fa9d6a98de1ab48331cb3dc
SHA256055d01a1dbfa110eea952b9271755f13847fbadf1423383bf508f5a6f8b21cb2
SHA51266992b969cecf6f9e5d0feb5695ce82e8bd822355d70ec7bee94b667a93d1276e01f391e2f224b88908268a5a266726072580383d1dee627f8bbc3a17d380465
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de85d073a623b3a4e2ccb43566f50604
SHA1216ec578543ad54e6fcc0eb4e27b822359693075
SHA25610e7677d4a407947e66e5a818cf30270035abbec9055e8fa9af2d7a5974011f1
SHA5125d4499bff9c2038e1357de77d61fbd8ce87952c8c85a5f0b4894e3f2b085748b49d8fb6be749073f7ba91eb14f7d7547f4f58353f223e25587fcff27473ae55a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bb0383f71f70d20c9ffa586a2718ca9
SHA101985dc006dc0b853ec2889f490671cb2e004953
SHA256e88913ca30368910c1d33361557c40f8cdf76d3bcb654147df1095b8bf0edee2
SHA5126e786bd8e4bc0b201eab2ae15d81a8f0d11770e32168f98dade7a2b61f23e94db715860a5ab77582549dc56e547af57f300777f13c10fe360e808bb7b4222a7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5002d57abf053304bcef1a4b771e5d2ec
SHA17b9ea44267cd51d558944c9e578c8c9de78488c9
SHA2565dc54e0a39bc309c65dbf122ca43f48c6cfee189a672c103060b2c9aa553292f
SHA512eb84c61b4e92de495617e9a934e11380256b8a02426175385e11c1997ba69f761b99c3321b73d2f085d945a3d20ac7bbbd86136a918d0e32e04263d142fa85bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5740b15abf098922f1827fe27a8de7870
SHA10878629fb572d6f29be2bd3c48508626867055da
SHA256cccc9efb372c1d1a032e8a890562887f77b51db0cced22e3fd1aa3bf2db47538
SHA512e6fa2af64a804ce4b9467146fdd5775aa236d797ee3badca2ad3a0e6eae9c0f7b89addc9691d98cc86891da36b7fbdcdef1d9f7215e91319090dc7c14877da20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed66193af1780ee5642e591d81ed774b
SHA1a173320958a15026e4d5b530a43ea5da7f414b8c
SHA25610f6e125b60d0d7c893d71d0b703f162645ed35fbddc8e4f6f8c8e852d8d97e9
SHA5129e3bfcd5cd50a509ae5c8d2c50a572728d9b1c8349a7e1eadf0c52e001fa3288bc2a5f5ab866b8c25be368446e64fe380b1944aa4ee3cda61dc681c797e423ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56da2dfd4f5e3caf3d47be3a5d88668e8
SHA1ce0d10f34fb13fe3988f4f4d9ce70811b72a6e7d
SHA2568955a652f1426f51ce3f52db6dedec2d497b03862ecf95de2da8e0bb3b2cec4b
SHA512a862a48db3d44e2133fb57eaa164be78f14a9d41096ef5cb5e577e791ff76e48f483a956607d5fb14a4c78a31949c84392ec4d357d81be362a0b240e32939fd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f55e4dfd066549e8167b8c1b89aa278e
SHA1781a32e7380c7e1b7afccf9df27ae77552b6c4bc
SHA2565c7685e7b8307cd1e8d732a868bfc71a45a6d257e8648be5f61f5b89bbfdf6ab
SHA512968c9ffcd3e25f534b1f9b8bf532e71fcb56c7b5c427297b6ae01056b064b9a52f6673c9ac05dcf0bb2db15447417908413854baf2a1c283ac3fc16d1a8da5a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5654f33359c97e226dd6bf5d52525c61a
SHA141606bce14d54d83c04ced16313e76770d192e68
SHA2564fa622707e0e899fec1843c0c1c8151610f4ed6587b2da996dfe7df6edd907d7
SHA5127ace544f6c1e69a8070fc8983acac198343da335b4b7df5a183ab4033a3eba17d219f403ba0629b089e16e2f34d7f6d68d73975ae2775f09e3fcd557fd04e611
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530f65001eb23acb7b657ea5480fe92b8
SHA15b27d709169f7cac41e44ff14083663844ab5645
SHA256b4da38e7e2b3f0742b87433fc133088a370521f78429af27ecb51529853da01f
SHA5125e0c955d46092dbf50f061cdae042b7ecfdc41ced4d1b9413acc961b746b672ddd0ad001114642b6fc5b65c90899d88392deb4608706b1e532f39c0f41fd5824
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eddea3443c7a2a509258c0124a9f56d4
SHA1ea4115a83f72edaf925490ac7ccfc5139aebff90
SHA2562973bed31b7e7c68fed17ea27775717efa0ee841466eb908c9b014da9618b194
SHA5126980888aa228491140ebd209dbecfea3c10baa6cd06ee7551638a67e3e79a4451c77e76384c0a0236d76f4945752cf01069608c19c1ac2241a4b68f89685c762
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ad339310ce722659a949e045cfe5068
SHA1ce3c1a0fa2c4df939f0f0c98eae2bfb9e7ea1fe6
SHA256c7ba667209ba777e578ccdb2173841a0a25881792b51dd20925aeae97c38b7c8
SHA5123bae4df36f005f6c0062d80b0f9aba33cfa52f8fc6b7a90d9bdc790cf3a51017a37dc0777c271246710c9e504e68f9a847f98829d08c3ddd1db1ac79b6b58793
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5200704e574271bd39022dda7963917e3
SHA10f094b7dcc6e86dfac44d8c4c44dc4a0a75ee4c5
SHA2568b4f97a945454cc072c4b24c69984c9bc882647a47b60cbb27ff145d76c912c8
SHA512859a4808bc31aad87ccf766e844071bacf377c497da9805a1e0e21ee97f9b38df36564de5d9c2a6eef227e2d56faf3a387cc0048f5a9fc98a99111e21f801fd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bbf9a8dd736c845ec6ef03f899faa76
SHA1626a562aaa65541752aa7f9f3592e2dbcba37530
SHA25609c4d5300fb75007bfa27da8c30cdb72f1877fbcaaaf23fca74f8092d3300cb6
SHA5122630248fc6a56aeeed6b05d1cbe9437a9e825a91a735568c13a9af547cfa0275ccd92e9796a2a27acc1b7d49138c84800e690b4e572f92a13c10be457745ccd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbc4bc72913f57e37627c26b7fbc9324
SHA1f56325cedf0cc9b6cd5d84fc044646460ef41c06
SHA256c6a421b9c94165549214e923e8712b7f21362be8f3886a28f26c1f36147d8278
SHA51234427d4ca87526c9d02bc7298b0f056e160536629ff81db82591cf780ba9cd91c26de0a8769f56a31d79a9b0f9147aa86552aa75ac1eca0885614b8063758ee5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555ebb56ec30415a3741b33e9dbe03dc0
SHA18b7b40f04a1e0153dfecea218dad21844bb9b967
SHA256a370696d055a7ab47bc28ba691914f8b23a52b8f25f1d370ca617019b6d0a0f4
SHA512cff367ca31c32a71cafeada8c82fae579e80491f8e553fbdcca8c73521f67e5acdbebff64b996c311e39e79231f6983a7430785eede72b01d1d0313487ce0215
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58211f37e5dc14694f524b75afbeff4d2
SHA1f8d514c4175de8a63f969923f4dc6a2da2e33085
SHA2567dbd0bd6cda852193b1f3833c02931c47fd9a0b31f33f935df0ec443ad918a16
SHA512929508c5609c674636124210778fd30f46628030a14ed590689ac853317cab2c1280745e1e92212fcf2b0eb557b9397bb8c405dc1730c5281e999196f36b8c9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcd22a79f755beda46e8efba3e9f557d
SHA1dd7623a5d1d086db8161dc2de135aa8e175b9774
SHA256248df283664dd36eab53a22b629838c61041f4edb4452a0de5441237687acc63
SHA512185959e4c6cbbf5204d6f20988cfdc1f306a70cc2f4b9ef5e3183f2104be18f6b8df5deaad8a8d7bed5095a9edbdb87e3b46c723fcd31ae2155deb2969e7d25a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a50506f7e4ae93ac391400af5f06f9f
SHA1f9c5d6dd448e0632a6bdd412cc085af4b0433dd4
SHA2564e8f86bcab708f6c34f2a1811232912c092cc9957dda70fc3edf08dffb213023
SHA5122e01841111e32e5bad56f0c01e3e8f31e01197f69db6ff1e271c607946da79c958632ec7a3d92b9088781ccaf32bff250606f1efb0c91a70bb6d5d42161993b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5a9f1952363962cb293c25c5591831895
SHA14af0558918e90b1aba246b607d80e6df6c1a9a57
SHA25639a22a5a0da533644744226ded1844ca77b09010f4981d88f5cc3b2a3f2596bd
SHA51258b5db27bafc752aaa7c98e549975532e05bbf5d71a076821deac4139598e17b9392365462fd72ff67146c40372d31a08cd594febc0f239d815946f9cf1b82fb
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\AS91FDNI\f[1].txt
Filesize40KB
MD5fe1b77737082c636ec1a252bd04ebb5c
SHA133fd71824dd24e228df5240fa198ed1c65d6c510
SHA256d9a661b515bc07fea0f12683e5a9eafbbf38398ed4767c9f2c4ed3a155fa1bf5
SHA5125da8275401ffc0a6a4eee020940961deb10453b884149bc83afb33ec2a7697f2840ef56be08d6998e336cd7639942e27047f59097092668b5470d80aafde64b3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b