Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
06-01-2025 10:58
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_1fa008c681cab3a96186ef69318441b5.html
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_1fa008c681cab3a96186ef69318441b5.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_1fa008c681cab3a96186ef69318441b5.html
-
Size
253KB
-
MD5
1fa008c681cab3a96186ef69318441b5
-
SHA1
6bf1a74aa45c78086dfc2d5c237c8daa2f609a59
-
SHA256
e96aa1f1610454c014d29dcce1519241526e303e7ab3f33ffcdd49a39f2ec025
-
SHA512
c146b77160d490ec7816f0715634c766d0c351d538326ea3ffd2d9abee8f65619ad8368e206a5ebf48f53902c14bbe8ea157ee44561e059de36e3f7de7c6602c
-
SSDEEP
3072:P5+ApjF4ONjVLyeKUFqNkyGsX1uLIhCqd9:P5+ApjdRxye3FqXGQTP
Malware Config
Signatures
-
SocGholish
SocGholish is a JavaScript payload that downloads other malware.
-
Socgholish family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{27A33CF1-CC1D-11EF-831A-D2CEB2690DEF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "442322976" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3064 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3064 iexplore.exe 3064 iexplore.exe 1700 IEXPLORE.EXE 1700 IEXPLORE.EXE 1700 IEXPLORE.EXE 1700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3064 wrote to memory of 1700 3064 iexplore.exe 30 PID 3064 wrote to memory of 1700 3064 iexplore.exe 30 PID 3064 wrote to memory of 1700 3064 iexplore.exe 30 PID 3064 wrote to memory of 1700 3064 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1fa008c681cab3a96186ef69318441b5.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3064 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
854B
MD5e935bc5762068caf3e24a2683b1b8a88
SHA182b70eb774c0756837fe8d7acbfeec05ecbf5463
SHA256a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d
SHA512bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD57c58e2a7aa71731498dd2e8e0cebadfa
SHA11a9d8e0a2e670d0da1b33856d5f5357753dfd2d1
SHA256e7fee0cac6a23b919f8e85a84fcd8c8d8d451296d1642c5b14fb27f6775996b9
SHA512a8d8b970eb42e01df633a16176477184464719729a02ea575e560fc7a7e682c4e5847c50692e58835826060c1fe194f2d9fd64865948331f9dd84231067dc514
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B3513D73A177A2707D910183759B389B_DFB78462C65FAC2750B89E1A8A1F9A53
Filesize471B
MD5c47297c01219e14791e688f34a59f32f
SHA1dbf1111eae7a7abb2855fe83f6a1854f37a17562
SHA2561128c192a0317f0b845685c51fa0844009d642e7f141f6d38a8b257edac8fb88
SHA512d51d31713e69c6b207446fa66afeb8b83c3e17f01bfa2b575e111cd7a62ce8c2fc53dc03ef123721f49de7bd34015892340864de8f11083bbcd1f7ef554daef7
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199
Filesize170B
MD5209da1a1c3d476f8c144693b7e1d2908
SHA16b2f1a1bfe4b4774609224b5429d88e65ecfb564
SHA256f5b969d47a414c4d060aeed089f5bafb7d93a7d0ca715c53c5c427508f13624d
SHA512745e536805732bde05af30e2c160151fec8f45d709228cfd4e3db24105e69c6b89c60376f6d5c8b7cdec171c1fe2ae5910f7ae76e022abb9d44ec067d5a7ec69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199
Filesize170B
MD5e44da7c5abfa462bde34d5e152d079d1
SHA1bbc74aa3d17d195d158b455de66635c49e51ad78
SHA2569bb9a3855ebeccb9940fd4c5b589f50a1a64df0f3ff4d69452eccd3a75790e7c
SHA5120e3ccb00e29e59af8a9f2ddfd23f87732e1a8f47fb039f35e6e41983776a695d36811e9da14c3980e51b5997971a105f78f34684a17902d7cc59da76c9bc9107
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5fdb3f3525186e6d15725d0b06d831b5f
SHA19fdddc92ce7aa531c3574130d5bd0a5a3e92eeb9
SHA256fc711119cb3c9af7a7b01c838c0c67dee401db7deb643f6d47785640a0f9847c
SHA5128ca3e4332c5dd4c7a0a95f204e6b8af69b9b1faf40831235efd85cdebb8bddf0d50ea8e5b8510c8bfe81218f716dfd21727a36940d1ff3cb98a7237ec1ba7124
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5ba1968747c5f9dceea0d3fd49075a58e
SHA120cb909817689591ebcafdfe94a35d9058cca034
SHA256f1e616220047687c0a6345ce7150fe19015e1894f2cbf201136ca4a19f07a67c
SHA5120f6b923afa9c8dcea5bf339d1d5462bdd6a8a15609cb1d396f30d1d1b1ad72a0024d1dcef8fbc1a5b6e9ee2c04c32f71f8674696a76bc9b8e3ccc89d651e44b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD561ac0fff6b0b02c5c9e1697a4d81c1e9
SHA1709bebd5e198816f81b024a62d5dbfae24e855b8
SHA25646c438587286ed36b647b45b2dbc565307a183df96ce6cc9a49876238886931f
SHA512ffe21c9d82bead7d6da71281d7594801bfef1cad41c6192f4d56af9c5ab6b10d8d5439d0604b262d25a386508343b67873dc7242f0bfbea13ae55acc21716126
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a109d3c5ed0c7d604a79bf0ec1c8cb5e
SHA14eddd344ec7671cb673091e30d49197eacdc480e
SHA256212ce979626110e49d888595e530cc506c4c461b901e0223ec2f21523f15ce57
SHA512f6d3e029f002d047d363812fe875c74e47faf412b09df6736d459260743422668e9321a93d04666697b915e075461a13a06acdb652ac26effc89dda7b3cbfaea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b52e00bcd51c933d142d61590bf39b1
SHA1323bf03b13de4fa3d8361b290d7208c9e652c16b
SHA256c52c3251ffefcd6f209b5d983fc24b5fe77b7fc229f50b3d75e9172e985d6da3
SHA5122ce31c9d52c4f2326cb0a33d5e88a04bb3cfde50d6001732a4004b7e81002289e997f10258d7dc4cc2f42b723721db5a1c4f511e9b5cf6a215dd9421d7d24f6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c2d5116b35c2c680775ca9a00be96ae
SHA1d565682ee43c59ab4448bd0509c36e3cdc6664fd
SHA2566dca4f099022fa81235ab55384ebbc44649b3cb1f6a059669c212e0cc38ed87a
SHA5121ff5ffd591f14e143166b5516457d5cdf32d4a2e75a0deede4a966d83be3eb866b1539f8e5f4133d263dae51faef817666919403c31378d571c7fa7bb64aeb3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5234dd37a4c9d1521c88426d1740e8146
SHA1be053ddb65ef8f2eef191ee2afb31840dc4ea528
SHA256ee84ec61f9e59874c47dc3d5eb5b20f85443f6a9bfe6d4fb50d415676043b1bb
SHA512758a25dd88bdc4a125a9832a74a8e903b45c4145354b4da6ee91a406aa88b341f26f520cf83d43ca6565b1c385a6debdb826a25870fdb29ff655f5b91019ddd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3b14a4c2cb8ab3c0d9a21fdc1529fad
SHA12b9662ca94a2493b8c7d180cf507fefa13584cb3
SHA2562071f9e2e5847cc6b6468da89b8f90031c0601e5304b9a76b401af103cfbc8b0
SHA512db37b5ed01efbc75615495e21ded9f41ba9bccb62d8f628d4b530aca977f8ceaaf984b518b25170b70aa695c04bc090c864727f30a3dda55a1903672b1790cd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d32f0ad88d715e0f8cb5573c0d7475e
SHA1f038e925ee3b6f72fc1ca01839346b17713b7536
SHA256157e69e850ae73c65778db3886d1320e807a19d958d4ec8b460173f9a3d00b1d
SHA512670bb3871d016b03eb572425fff71eb9d4c89565a4be5c4934a79c04ee9336a1662c6be461c28185f26cda417dad8ab9e8f0129b14b5af9d047a1261fb38c611
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e79aee229ecffe401afbe77bbc7c9d1
SHA1b020f33cd2bb9466e8db2d3ada46b934c31aa0a0
SHA2566dd14a78edaa9752cf786ba239fc7ff6a3ad42dfbc614490b48dc5d5bb84608a
SHA51273e5d1ea8b813efe0f10a1f4d07e76f81f2ad88675018c6382c58172c5fe10f2947679180094033f2eef20635a73798bb589af835822bbe89a40fbad0288ff7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e51ece4077b31b9099344bc06eb912d
SHA1ff281ba12468ea4d9729b9e76f4fdd7e8e2946a7
SHA2565fbecc21a117d607a27947935d28ba47ef4d318415971fbd46d92eb77d1cca56
SHA51225259f050e0acad771927abb03b437dc11a42b99f7a60477fcc567dbba13842cc060b820d6f4085c12d4781dc6802b0688d08dbff0bbc15f7b323bd2ead9485b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571d6a52a6c6fc7d1f1a442636dcc4801
SHA17311889aab3e44d59af0b7629db112753045f9fa
SHA2566bb510ccdec085bab7c7dbd65d5f256b3dfa4e1e62c26b731879cb68b7f8d741
SHA512c469b32b5776c121d34855aed1540c92eefc09e96c628cd11956e772bbe8cf2582508bca6f21a808f85dd60c00a3aa6bbcc33b4edb10619fbeb146682a3947f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba4f3b832eae4c272012f894e9799808
SHA1f40eada4782cbddbeb12e819d4c83b719c93150c
SHA256e73fb4d1ac2300c6da3af101063e027a04ce005e852ff277be5ab16aa034d5e2
SHA512d4f7d9795868aa94fb68a43bbba507f7d8acf8fc31158646d52dc86fa64a5f27e9db30c5b9f8cfc2c7fe668519ac1c80dee3247995833c35dd0e049470259431
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5723db972a8402867cb23e552a7292e51
SHA1a123d17c99f2b15cc1abf5d95a6b9006d7a6fc91
SHA256b791a07d72940b8b0466e8e0f4080290ed6c11d114b7b918444b52a63863d2c0
SHA512bf7b7a04a0d194ab169d38f987b879023e8fde6649dc82d334b2853d78033cd35b84f25667d41eed3c9c5f4940dae8428b9b0883c2a1b44a06a1f36afdf961f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5116556d6146cbdffe672723c761229df
SHA1d0c469e4e95000ea29d23759e7029f5edb894f07
SHA256112c70be265c51e55b3e313436892a6442109d914be4774070dbb218be9b0548
SHA512e22f3cc4e5d63577e076b4f778e85eb95205aaa54c5361aef89b169d14640f608509030ec2414af6e6ee8a2353f321a0aef0b1ed4a8ea73693b4fceca2a819b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B3513D73A177A2707D910183759B389B_DFB78462C65FAC2750B89E1A8A1F9A53
Filesize406B
MD5cae8faef784ad290376ed3b780909acb
SHA13fe5aaca86a68a2108f3f458e05e9f5679ebccf4
SHA2562e026b58a1106dc55430008d164f9dbe7355ae0a907683fbda49c3a39e875bf3
SHA512cd853ae96ade34759dae7d6eff2bc871ec81d16c6fa382186d9cfcf28e5ff8b06048bad0f82eeb410d4de0face936a8ac65865f74ecc61dbf3ed7b4af7b24831
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD55434ec8eb9a733bac1821bec1a8bad16
SHA1365b2ab32341d6d4681b720a68d7058199f17089
SHA2563f90ef11135977113edb4cdaf97d0753a90c6c822d18d0a3e9c94d926a522d56
SHA5120823793d525e2fb59a57b08b0be7796af60ba749c61e323c4d733cdbee19d326f0b90965291d9a969a58290d0096e6235cd5f84c218f1b974e0b6b1c7af325f0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b