Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
01-01-2025 00:06
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4029c6489194649ef6fc6e60aa8d2d43.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_4029c6489194649ef6fc6e60aa8d2d43.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_4029c6489194649ef6fc6e60aa8d2d43.html
-
Size
139KB
-
MD5
4029c6489194649ef6fc6e60aa8d2d43
-
SHA1
a865d70ca4c3360668ae0e4e64eafbd43d35669e
-
SHA256
eba90184860456f18c59ff1e3d0bf56d01b3a1ec3f68e68e9d96dc238d2a0d20
-
SHA512
8e179779145d960f9e24d9a671241b37cfec5654f8be51a6e320f7fbfff51e5b86017ae9e8c355d8980b2fc43e18f1533e933fcaa4eb7da026e30f9cc5e61aa6
-
SSDEEP
1536:GuWpIdjX24v45vj0aQS0Nxy6KUYOoxw/oPtv/+3:G8t2u2DQXNxy6jYOoxw/oPtv/u
Malware Config
Signatures
-
SocGholish
SocGholish is a JavaScript payload that downloads other malware.
-
Socgholish family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1001b82be15bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "441851902" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{46A855B1-C7D4-11EF-BA1B-C670A0C1054F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e78a69453f00554b9c7935775bae7b960000000002000000000010660000000100002000000065d71ee54fb4b152dfc83cd9d72232157e695cdce97571f058c9650f73f27f26000000000e800000000200002000000078a413e03e846767583e652b9988dd9b375aefcf4e5e82d3c26be539ad96cc95200000006e17aa11f00a5f9c94aecaed4821497df4aafd1b0feecfc806f068bcbb7b2ff840000000327d36c192b011732184c44a38aa42034817a65463dbbe83862c054e8393bd14a9a09f6cfa4ef5be91a30cf2047ab88e9a4c9862277d1de07bc84987d61378fd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2888 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2888 iexplore.exe 2888 iexplore.exe 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2888 wrote to memory of 2212 2888 iexplore.exe 30 PID 2888 wrote to memory of 2212 2888 iexplore.exe 30 PID 2888 wrote to memory of 2212 2888 iexplore.exe 30 PID 2888 wrote to memory of 2212 2888 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4029c6489194649ef6fc6e60aa8d2d43.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2888 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2212
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5d7d2aaa66077c8a9a378de89ec3cbf3c
SHA1cd72e607da9df378a8cdd5c665f18f20bc8f1ea9
SHA25616ef24f2e583953cc9ee53c8160f826258237fce662d9296dc026f80bb447cf6
SHA512c0c853a4247ee7f44b737cd85c31711bf38214217678b78bdb6929ae740f77c084a399c2f9265c42549582cb5eb7e7d520e0073b36d17d971bcdd54fe25a1c67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f89b715d01b29e282d76652ed654653e
SHA130a7f2c7f882825659e0a39342ad9dfd3181ad48
SHA2567db816553115c4353ecba7162d5ac05fd9ab3922c68ddca17df17e108810e91c
SHA512b53e2ab9130dc3952ee9c36b2fb1240ae840104917cec4ff3bb88ace1e638ce7614081d7869d21d5463b31eec293e7a6ed0503fc1c3a6e183d3c5000fbabdedf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7576ccbbda3e773ba953673d73f5686
SHA1d01962e3db03b4ed79062d2c94923bffa9160ca5
SHA256e6b581612a5901b9030b57f9efee6d35882b40e72a44b20c2f7cc0a4b7b1fef6
SHA512acedcfe22e8ea379c4ed2edc25ea4064d0cac8cff76e5d96dd47b7fea071d312ec09ebc17e74fbcd5821d617a19181dc12dd53c8474a07e08f0466f50e9d24d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5197cc00efa5cec607f863e193614ff37
SHA15e843766150c08809e3de99212017bfdd5d2f7df
SHA256c2a7a33fd126ae96f82d5d3aeca8148f74f15bf9545eefc0927fad5760345ee5
SHA5128286bc5446fe921fdc02f318ddd7c8f40425ddb6f6176d62e533e4d047763da91af985f503f3ec1b8225502d1590e550d843f5f15340c4a6cd785cb0d3066781
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533a4aa55c822f33517535f67c9e9828d
SHA14cf3bbec0c287be66997f720197d594290281017
SHA25672798bbc0a86667c9b52e5242e11fc739b41576a92d53ab7711e57f21f56a1d9
SHA512e96a3fa3dc31c7589ebb728abeb80d50c2424635689aa1ccd7c3407cf7343d1b82b743c2c1b166a567b69a780644db4129fb630039e5fd72a2d587d5ab0b08f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5061d47b75376355622443098e58dbd13
SHA10fd02e2c1c524903614d91706f569a53e5f23821
SHA2568b187dc4d25f024a53396f77c12719066e1adf90c7bbfa1b7e8cae32ddfc5bca
SHA512af5b53bacf8d74412b851e9a76772879d7f77a048d6cb13a86d6eedc2b5c9c6d039e44599e96a25844ab88bd9edcd85611f3b055578aa0a2b6e0b781fea5f45b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0f2d2912c5d990b15fcfb36a2ebcc95
SHA103711584baecadfef661ac8f2cbe98509574ead5
SHA25607dd67b65c95d90020de32fecbe2e107e09be463842e196d0d860c30e997da11
SHA51294f1e7cda2258bcea35be76c52a0565d950b9bd1e418159c414adce6f4ecbc53a69ab95963e9eca23c0b32ebc3a39190654e505132756fb6e62f715fa1a34205
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584ec03f1b029bd247e84eb62d44d02b4
SHA1357a727fdfc8a88003e5551cf5a29dd861d88680
SHA256e445b0983d3b9c715273c765da674a9bc1663bb442ad8c32104b8611a820d752
SHA512d0e0481ea3b4d758aba62a18b4e8e9ee65811483e3a7af37b2ef43e50af9688955bee6107ee06baa9e5a7463adda5ec1634a2e10aba49327c81a1a3db6310bfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5969366c435382377f69eebe9a671c1bc
SHA1887be5749363b5f81a4104a69c2ec2fa1abd488a
SHA256ff75fe8943b355f35f9ecce127f36f5ecec25ebe7329a3aa81b42d6585b59042
SHA5124c10b702ebae3b4d79595a44dfc15a210aab3b1b53ac1854df7f91c81373f3a89b3f9abc03f0c550946c1ea37508fc68c808757561c3bfa4928ac66e40f84262
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD56eed9fd630db4d663be2ba084ab33780
SHA1b898600185b53ad7ff04b293849b090ecc6c86fb
SHA256f8072b568ae261717fa744a25ca46fc8c8e04673e402f177c9dd64e9fe77ffe0
SHA5122579dd20784b8d4cd9037b59a0b53312fa17e67d7735d668068b26edcecc4d831ad18a1617ee354ae8e7c8c5ef27293849a46ed4d31cf10d95bb7a68622b20da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5afebf0e06b311e59e3050a0ae63aae4c
SHA16abd3e1bda967eb6fe9461b9ba910f979a9799e8
SHA2562b3f49ff7708630999194a9a824fb02c5a5493f0c34827dd539cc165dd6a4056
SHA512cb7916491b79c91e36e3906a492b3dd622039a0da57bb340ccb89830e0eae5fcc4fc55391f94bd0de2f2ea7e97aed34d893714fdfdcd5916e343b6b57c9d7a02
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5GWW47WY\Digital-Clock-Islamic-Ornamental-Button_3409w-13429459711t-1342945971824i-0p[1].js
Filesize12B
MD56bc56500657f8c3b71b20af4c69e967f
SHA1ada097ccf9c5403197bded7fca694ca72511b6fd
SHA2564a16cab41a8f641d77f5c3cb94e7ab34b15c97db8f816c124bca9ebad53340c0
SHA512c7fc55c879b85e0da474c69b0931cb3c7caacc44b5cd0ab9dba6df4fa27fdfd61832ea5f75ef241d6580954cd2ddcd727a8844cf6e1e1edb7223b8b5ff3c4d40
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5GWW47WY\plusone[1].js
Filesize62KB
MD53c91ec4a05ec32f698b60dc011298dd8
SHA1f10f0516a67aaf4590d49159cf9d36312653a55e
SHA25696b335b41362fd966c7e5e547db375ef0be7dcb2aec66bf3646782eeaed4b2cf
SHA51205345e754b39e9f83514bc3e14b52f3cbf321738fd7d973da55db99035b11b4152fedce2c203eb34376cc9e18571db514ff9fbcb4174a2dd7cca7e439cd25944
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\K0PVW9XR\2394333829-comment_from_post_iframe[1].js
Filesize13KB
MD5e6043769fbe3fe7fbe9581e55c743257
SHA1f7c257ee6c0fbe5506fa4f2147dade5fcb1eb587
SHA256d4a6c030a7731d05c695f2279168d12d28ba93bbf00fd6b4ba381ab1590ecce1
SHA512cc0a0c369b085a9b48f3db7043c121185f3e887526f2d1c7fc6dfbfc43d539ac2b503969d0c937d5fc6e0fb5ed753f5afbe081b388dd8117393dc75186a407bc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
96B
MD5857cf81cfd3449fd408ac0604cd3a326
SHA169209e67fdd7533fb3c76a7f3e2430a63909e4e9
SHA256380be71e72fb28899a6cf71bad4434677a6df3a2fcce56d23c28bc4794549047
SHA5128b6171180e1145953f185cf01651a3ef0fcecc2cc44a921d70f0e6fcaf58b42672943bc4f3e933fb333bdaab8ec0350dfb34c14aba30645463c12239d8814dc7