Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
08-01-2025 07:10
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_924f2241e67db18583ee8c09e352a70b.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_924f2241e67db18583ee8c09e352a70b.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_924f2241e67db18583ee8c09e352a70b.html
-
Size
85KB
-
MD5
924f2241e67db18583ee8c09e352a70b
-
SHA1
0b221a523bfdd4eb2be595a93540325d04aab8db
-
SHA256
18a3dcddf0f3efc8ce2fb1e40442b69f0569dd81f80e8e316781481b2705d048
-
SHA512
5033a7358878f1bfff8b37cd7eee519f70198505a0b8ac25697df50255b4f8e301344b216c4d3b0763f03f6f6b15523994d582765e1b033acb47acd88badf897
-
SSDEEP
1536:9g+xjv/XRyGXmNJUzIfVZeDliFOzcYwPYMorHf4Qk:9BxDAGXmNJUzmZeDliFUcYsYTrHgQk
Malware Config
Signatures
-
SocGholish
SocGholish is a JavaScript payload that downloads other malware.
-
Socgholish family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "442482121" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B2AA0901-CD8F-11EF-81BC-F2088C279AF6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1740 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1740 iexplore.exe 1740 iexplore.exe 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1740 wrote to memory of 2560 1740 iexplore.exe 30 PID 1740 wrote to memory of 2560 1740 iexplore.exe 30 PID 1740 wrote to memory of 2560 1740 iexplore.exe 30 PID 1740 wrote to memory of 2560 1740 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_924f2241e67db18583ee8c09e352a70b.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1740 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
854B
MD5e935bc5762068caf3e24a2683b1b8a88
SHA182b70eb774c0756837fe8d7acbfeec05ecbf5463
SHA256a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d
SHA512bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD568633def49b0b9471878462b556f9402
SHA1299181eee5cefaaf03ae5e4f968baacfda7ce254
SHA2561df858c748876dadfc71081db56ff48c3d3c7bafaf538e368af96ff2bd532c30
SHA51211a27cc58c127bd76d28dcc4a1a21f5400457e3c14ca52d6dbcb5f0d8eeffc227c4ec2a70f4f104eac7f89f2bfc9dc401625e220407ccbb12a37e5580778bc0e
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199
Filesize170B
MD5a075e9d1f02632bcbfea49feda9af8c6
SHA16e005405dda960d7850a26e4f2d78b2ed94640a2
SHA2562d194faf746e915cf5c65d0b2c70b6398d6a6e7644e87d0aa543ce43628b76ef
SHA5124228a4b862012aa576d57fceb61eb6bd5b17cbae2adcde13bfc7f520e6525d9cbc874dab697c021caae8b016070db43b1465b53c8e578cd7af7157cb50da614f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5eaa19115791498d2160e0555f505ecd3
SHA1455089eac88c27e16706177f63f6b647a25f8e97
SHA256b125c87993f8589003eb2b4abfa41b64d9e78d55a190ca05c0c2591ead323eb4
SHA512b9c095f4325a405e6a78092ca595e324ec1a5d208d28b5f91510902be13b8806ccf719b880237cba8795f359a7e5f1e9efb6c585b50a3ad01a7424c419e566ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5b422097d5c0d591d492abeb0a14a7534
SHA11675628c3aa39247dd344fbad8151d26393e10e7
SHA25602ac5587c80258495067bf80ca7d66c9cfa2180a75ffa4983c8d909fd8e3ea90
SHA512ad591ae5586382ac8d22a5789d37e1912d9b401903cb68859779fad6988c151066b763bd13c6620d20f30ddc714aaacb994304cac9e8ca62713880a8aa73be7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5396401bd8742f36b21a91c6aa85c64a9
SHA1225290210cbcf5a2f25067a42718768a8a354af9
SHA256600a8b2046ef1e6d66ab030cac5870b7d52beb332b5ba256ad26660b0e31a36c
SHA5124323e4faf23f18d802598e43e019641e0db055662386fd582ad95851cbb86d169e4c87d96dc2537eab699437514127e38b2c5f92fc43e4f8f30e5478807a5788
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b917f51afa8292146dd2dffc8e603b77
SHA1ad8ac67ab98fd06d2f7dd8b0d187eef5c569c0b5
SHA2562009903530a68b006310ecf0d77bdd502049c4d1882e790e6c4b22050b05dfeb
SHA512253ac1224a807a596ebff00b2d757d376ea2e0e5c0a9cc79d27715942d1a4671b088b99530dc80521943506b804f864f366789f8f49f84a94972e7ca79f31f25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f483980a4e831955d0fe3759c57393d
SHA1c09acc99e71636aa4ffd26f39b2bf6a0e0761f8c
SHA256dc45c7fb04fe2c3b5ab9d2b78ec69365e783a5ee76d42b9e904c133371a3d7ed
SHA512a227632dd2ae0fa96438c1472d6751382cf72c32decc853ee78dcf3aaa518fbbc478c4725bcd9427d7325ea720d076c9057ad5611c2b9bb5f251d024931b993a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545ad818b0ce19caffe672b46718c7904
SHA16fdc12ea09fc60fcfaa670082db0d4bfb21ff6c0
SHA256dc09b407d10c1af85db6527b912cc57431fc8d2ffd877e0d444d5e95f8db23ea
SHA512908904ab64c5c2ccd64193c91778dd5f33154fea58c810416231b56c1005eaa58107805ee59e5c1cec594d399580110cd56290b589a55c142601038a2bd88da0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5325252a002c69090d0984be74e60807e
SHA1111af287b49879091e8d07c3021008a658caf4b7
SHA25623e77a420cd331f3e5152cb0c465a919ab9abe04d484cc6b0bb88d917faea55f
SHA51244e5f5d7d02159368e42b2781e28300d7fccd878e98f331081ec9717a334573b94aba461e9c3282c9ce1fd1766c4e50dceeb4f27aa29e3ee1832a6e09f99f746
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5719fa8450f8759485ce69d4f3ba2f305
SHA136d53d66547f485d3ae56bb683a8897dc1ab7a2a
SHA25669834db695967dbc08742041c80fd76f42ca03be5b90c3513b05ab3c5a0ce23c
SHA512cc83e4caf4ed49306d524f9fb4cf1e7b8bf98d6d1314a06a0c3b0be6da4ca9cc4149f8343b10e4cd4a500f01b659ef95b71c37a3a94553eb497e21d95086a5c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54357c251a09cbf754ab2d8c6220602e6
SHA17782773e6776ab85a7cf83dae9325d7e4932e2e3
SHA25699f70f17b61628bc10793aeb7d72b839d00c90e84a1e4c645f9e356782c4ce34
SHA51200989397bed7f83e958e07a63ba97124c37c102b97ff6967fe431e277ca45949141084611733b7ad508b0509c8848ded205a500f62091c78497bd2cbec138192
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531f5ebad1a319843b0050d0cdb93e4c1
SHA18894b71b1cba1bf82a222ce7c9d326f9ce5e11e8
SHA2565cbeb46f24915a8f3bf47841795a50bc49a0bd75377c6f115f78369412265fcc
SHA5129947b8ebda4fceb4eb5fa8fd8d6075614ac55e6dd5e8656539bbf458226ea9f7672c02d6814ee4f7d20e102aa5fa3ec213001fea545e7659036037398d11fbac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c5ba99429a2571c7342243d74315d08
SHA13fe968c26edae3bcfef3c80ef4ced9316ab6b75e
SHA2569fda20c1c9434095a0cebc2a973a14bb8319cb39c1beddea16393c00bda28a24
SHA5120ea6930dd55a592dbb636cbb72c1b151f15206b4c25bbcf2c81db5f4016f3f352082b67bb376aeab6ba40203347794f573c2c1b8ce80924737a137a5c58441de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c8fea59907935ebebe224cd00eb15a5
SHA1f28b41ff49d9e2f29c40d8c4a8bd12411ad18ed1
SHA256961036eb413644cf6835348cb4b25ca46290ca5191c0a25230378e6a5df9bdb4
SHA51246466907f242e0ce55015923671bee256d5bad7b780fe2db062249f233a42125c1a3dda4582dd3511a4c9c5050f6de30d3ae6c98974bf21130c28962062e6fdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b79ded6947ca83993b77b3fbfdf2eb14
SHA12de31b61962236c56e29eb5185bd5d15e179c589
SHA2564cca0be4704970f561732063da6cbb2752e06c85afef577d91a5af4e00634e54
SHA512cf18eb614c2985ea87f0e237f1ff774c3879290108c56bde7bd72cd35deb488503f5f3c2a6926a37e7db93eefd8833fefb56b1e11debab1cb83117ea1f5d127a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5d9430e5edc2466b2f3154b0b3892a854
SHA188c3deb926e5d8f0955cf3502036fd6158939f36
SHA25662c62436ddd0de065bb91867caa68ff6e2d72c06b4f112e4522c971adf113897
SHA512176de9628187ddce3f6283e977aa10d17bb584cddebf50bbb7b99ef2acd96ad9963a39ce6bb19e4b5f3f59d03835a09958020ce0cc18c13a4d6fb0847df731b8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5GWW47WY\plusone[1].js
Filesize62KB
MD53c91ec4a05ec32f698b60dc011298dd8
SHA1f10f0516a67aaf4590d49159cf9d36312653a55e
SHA25696b335b41362fd966c7e5e547db375ef0be7dcb2aec66bf3646782eeaed4b2cf
SHA51205345e754b39e9f83514bc3e14b52f3cbf321738fd7d973da55db99035b11b4152fedce2c203eb34376cc9e18571db514ff9fbcb4174a2dd7cca7e439cd25944
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b