Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-01-2025 04:02
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_bc6fd46aaddf5d30a0623d0d487d002c.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_bc6fd46aaddf5d30a0623d0d487d002c.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_bc6fd46aaddf5d30a0623d0d487d002c.html
-
Size
72KB
-
MD5
bc6fd46aaddf5d30a0623d0d487d002c
-
SHA1
abe3ae1e150b25a6a1825e5d64e5e639da2b5947
-
SHA256
ab6536553254cc5e311b753b830cf49c830ecbb9861bbbf9da563ee54776c203
-
SHA512
83127ae46f25be1a99fa1cf13497e35173675605357c94db9cc0354164ac1c3fc14608d2acb599e9ab0bc86e1b93213ccdef2f64f73973c60279067fe7b3b6fa
-
SSDEEP
1536:SWVOZOMif43jprQzD9BJ26qDTgxz/jIeILOrEo+Y+ujNT5+PN34:qOM2439r49BJ26u0xz/jIeILOrEoZ+uV
Malware Config
Signatures
-
SocGholish
SocGholish is a JavaScript payload that downloads other malware.
-
Socgholish family
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 81 sites.google.com 87 sites.google.com 88 sites.google.com -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "442557195" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7B4A7491-CE3E-11EF-94CC-EE9D5ADBD8E3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2088 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1628 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1628 iexplore.exe 1628 iexplore.exe 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1628 wrote to memory of 2088 1628 iexplore.exe 30 PID 1628 wrote to memory of 2088 1628 iexplore.exe 30 PID 1628 wrote to memory of 2088 1628 iexplore.exe 30 PID 1628 wrote to memory of 2088 1628 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bc6fd46aaddf5d30a0623d0d487d002c.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1628 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2088
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5f4c7b8c26a06850342fd6102b6da0d3f
SHA16cf492b9d47850e13f01ce5250cc7a7bd86298fe
SHA256e78d02ec7443a350cc05a4591d0c6ecb5e4b139a862b1af8af4d7eaa8370b27b
SHA5127ac2a2bd1d92d74b7a97f9fe791daf4920cc5632d18dc7000835945c13c78d3d930d8fdfb3a9ecb06627231bd44caac223367c5faf3ebd29c7da347132407d6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ada42304a11cee11cec0c35d910a5f3
SHA19562d201781e3f86b76fc93fad9e24f7de2a3f3d
SHA25624f506b40576bd7920fba3885ceb01b705d3991b2fb88c1dff20facd57ae4bff
SHA512b28e2f492d4cd199d1f46f75cdc84a9f891f3c00fef62ad763e4df0a6043b5a49b9f22c4ffedb3f9abb277d27a19bcc6d0cde18bc34aa86e90b6b48f34cab8c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518c75e26cb3096ba44aac120f9859fb9
SHA1cd781167457732060c66f205e8f3eac7a189e8d1
SHA256caadabadcb92f7456d844d48acbbcae93c5f97514e8263c761575552ce809f21
SHA512d743fdfcc7dc4ab391e0e5fedc9cb02f181c1320a9b3be4940595d7b4e24d45a5df183c0d75324f555e69d79bbaabfbd72aa67e99761e27b49f66ea555e265de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba15724c817b0b1a42e48390db83a3a6
SHA17c9fffc399c7766802ff286de0edcd3d59625842
SHA25665d4b15682f20b82aa38fdd2497c97114048d5126f14ab7939f9094025df9ba4
SHA512de1f03dc50f6c8fee3a96d567d518447f404daa306a42fd3915083d1eb48470ae09da09660c271a91b45c388b8ad5f56e657c7572dd47067aef8a3dddd386182
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2ac086a013bd00e7f49a7357ff276ea
SHA16448611f46f1bf0e563d2d4da8f800ca3fe30313
SHA25638ed582b999d65cd69aa3fb08e09aec0ad9cbf1c803fcdede8de299cf1124afb
SHA512eaf7e5d48d072eeed500655e42346e464bba07a72733aea564779a2036e742323f4d6ad1724bfa071a92f6b7d52f3fcd9cbe4ed45d941b0f7b464f11eb8c254c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5497cbbf16a599c3083b95696739412
SHA1d57b5977c91c02f8ab1d5d7fe614a1233f8a3366
SHA25689cf5808cf76645b4a8a411b0ba2c877335e4919380d8bf6ebeacb2694c3c102
SHA512483ec8a35eda37cc8ca2e215142c3199b9b08362a2febdf8de90566f2f661c686a8633461234caf5d4dfb0c19d12f3996b2a3ded413ea286023110f47a785603
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57087d816b96a12fbb2a60204f89aec4f
SHA1b5dee35ee9f44ac1b26d19f5d8a642884c97a789
SHA256f49d3468c6f1204725f0f7ad8bf2313ec874e5cc62ea1ef11acc4125eb15e77d
SHA5129a71a4ddf6d08892897777a0ef7890b9d3a2cb935612d89273e237ea4b7b1205723cd1fef6dc336ddc2f65e36913db55818ebe590f5b5867da98a293bd94237c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf39bf86b8d952f6b9a19557ad8a274b
SHA1ce46c9706ceff0b9350856e78458778b393b744c
SHA256f8f6060dbdcd5f03c63597391caac7af44419b2038a0ae86adc6a274f6d08595
SHA512f16827409590d44a0a144a77c4c4cf8be6525519d22c798a7f9efd968e083cef7d5fadfb599911d053559be29f54e385b7f288f20d5a99c5621313a7426894ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e655bed8e3ca6a1710226add9c190c6
SHA1ec6b2a043fc1f1181574299a9eadb001c65b3b8a
SHA2562d0f171e4d1bbcc9598da918465d772f8c9bc32bd0cc6e0a0924dce25f7f995f
SHA5127e3525d38be1b99b72601d7e34921a741872e8f22ab70341b1621d424fb070f2a9f9ec558188e19e0a2d7951730838e2b87471430562d44dc9cb9ecc594dd46f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5baa9ad97bf0555e15343588267b215f6
SHA105e2d341dd3bfddd115d0a6ff18ad09abaf21ae8
SHA256701dcb1b396d05506168051118b0c561c7b9954c82235dfdd4be1706cc4e11aa
SHA5127ec4d10dd179e1071e284b30de291cb485be08d4af583331712c4d8dd360879a2380be4c6927bccddec3094cfeaafd85fa25b18222d6290d9efc91031d0e8066
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5197cff81fcb4aa495e72f98a0331e366
SHA175faf995e77a809e509d76dfb51af6b4185494f0
SHA2564db8161154d147e0e8d3291420ada22aa3ff6aed9234399d6a2660d7a46460a6
SHA512f13178bd5ec305478b060adfc4164e7756b05920dfa5ea9de788a46e10edb6f04e9f477ed58d1c1f24f8e0c07a40f3799f5e33da235dac3ba61812cb5143682e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5b53243ff980587289b07591b481b9b4c
SHA18f571c84883987e5318d134e1d555c60b84398f4
SHA256b3488303ea7c6cdb2959366f5ef8ba16b864f0ac6a3e793e984adde44df4684e
SHA512047f84c734174b0f152300bff86d4effe63c1c5eeea6866ca850fc7a47b3140f8307328b7cc7b8d78162a79c3b4b13a51651b7adb9311089a9f12149ac54baec
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EB0KZ1Y4\plusone[1].js
Filesize62KB
MD52e4a448a27b8a58d75f607c7bdcca6f2
SHA131cf764c6c2240148eaaa2b9816e1219a273d0bc
SHA256d3696859f3485d8aa6f8a4d0054d64fc1ee614e57725221dd1c97b930f02bc3e
SHA51209ca4d8b6a0fc653490921befcb3d752e150ac9abf24d1fdd49c9453fe2baf969b76433a45121451ef642ea3f73f9c62871cdde5e07976ffdc03ee5200e4d35a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WUBCGJ0A\BidVertiser[1].htm
Filesize87B
MD56c60754af27389e2778b3584bf10f3a1
SHA1196be0cdc74708ee01c01f86a648c16573e18fc6
SHA256ff2485a3dc35082ae7e3799388665929ffd72227191bf24b7c01033bfe19ddd9
SHA51236724f44d31c798e9c641567f282807f4cb357dc7ed4a9ef8ba633d8c2f14477dac67f4afb3f1f131dd16489d615114486eddc2cc34eff9e0d3b3cc443fa464f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WUBCGJ0A\NV0ENP3F.htm
Filesize74KB
MD5147cbbd47ea3ddbaf0f7abefb9c16c91
SHA128f8badb7a412a7abdf5059cbc61693de6c08d64
SHA25644b4517b94655f9857adb85980e5bc0dae81dde3847315a50ef3f0d00a6ed01b
SHA5126e14079cd150d1783c7dd4d93c613aafdaa27b4618dbcc25ff4c95cacd1feea600d818b8f24d371496fbbf6889f41de81190e4da21865db400c65e4aa547f2fe
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b