Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
09-01-2025 16:28
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_ccd702f52d9d10930a96901df042a82d.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_ccd702f52d9d10930a96901df042a82d.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_ccd702f52d9d10930a96901df042a82d.html
-
Size
157KB
-
MD5
ccd702f52d9d10930a96901df042a82d
-
SHA1
834b9db1bba38be32d2f4bed5cae5f34eb56e130
-
SHA256
6d8376aafb60f67a3c16965ab190d54e09d444284420c0f8cdb41ddcf076c1f9
-
SHA512
3682b07d16c82ac292807fbd7db18cb9f5a9a268e0519052a752220f0149830bace38535f4a9e38e9f90df8d3b3b407e6444a4ce8eb243709482e9b666ab2582
-
SSDEEP
3072:nOMj439rt89dLnPKBJJ26C0xz/jIeILOrEoZ+ud5+hNJT:gmdLnPKtE
Malware Config
Signatures
-
SocGholish
SocGholish is a JavaScript payload that downloads other malware.
-
Socgholish family
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 110 sites.google.com 71 sites.google.com 109 sites.google.com -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "442601971" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BED5BBD1-CEA6-11EF-9333-DEF96DC0BBD1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1940 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1812 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1812 iexplore.exe 1812 iexplore.exe 1940 IEXPLORE.EXE 1940 IEXPLORE.EXE 1940 IEXPLORE.EXE 1940 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1812 wrote to memory of 1940 1812 iexplore.exe 30 PID 1812 wrote to memory of 1940 1812 iexplore.exe 30 PID 1812 wrote to memory of 1940 1812 iexplore.exe 30 PID 1812 wrote to memory of 1940 1812 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ccd702f52d9d10930a96901df042a82d.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1812 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5bf05988caff92e1ed36f3caf6bac29ca
SHA1db57c211901a026386612fb7f6153f198f3f36a4
SHA25618abd277a5b256f0a8e406c9160851230ee21c56ed042d73a9358d69fa6f19fd
SHA512da3eab9a8af8182c7ec1f403c965fdfdb43bec3c71275587f85a420e16983bb9bc8824245e42b405ae5d32a3e942aa8c134e72eda9b900f86429fa3feaddb407
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e49e7e8ef460098e64856d508f7fb428
SHA1283dbb371f3847e60dfdb7dfe18812806dbaf5ed
SHA2564c8e936305fba827e692a0b9f9dbf3701e6c5e7312e982bbfb7e2b828a34e16b
SHA512b735fe721e8462c4188ec2592de61159a54ce8410ed6f8d2b1c34c79e85d14a738eec79e17fd9e47536f6ebef1b3c96c0f8a9dc86bbfc0df2d7ad01caf0ce523
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aea8a2c535236d053026dbb811e01601
SHA15034045dc050ed6cc6eae520d39dbd6550842862
SHA256c7b0a515b7a20bedcde3657899561b4b4046abc1aa0d14e1a2e7484502389335
SHA512ced50a8d44df1c1f06f68155d5499f819132a06a8b925589935993f0d02dc605817aca34dc1e37efb0ef56475fc80715d2ea47569d3ec875ab11d017e09cda17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eff9f66f5e7ada24b71b7e1b2f77a220
SHA134330860438df02cccf4084aa0b99d05556708cd
SHA256a2171e5c8fa36f49838a6e7cfb0b31dbb83e192dbdb046ffae194d949fbd3f64
SHA512ee92a48e0862f7323a6d9fd27adc14caca7f255c6a9bbf1f36595be9f6ac1310c741a3a66acfed442f8524a5fd0e7ddb02fe80651fb37f5ec0588b2256b6153e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551fb0f0bbb3cb2f3cc49a83f2e100ab6
SHA186ef8faaf83ce6a37493596eae9eeb75cc9b2184
SHA256200ae2712fc646990456d3dde663dca67f8d5d1a8c5700bb13e42abcd42ee504
SHA51265d508799f4fa60a834cdd942d305c1654984acbf10f0a02b53486c7f094472d656eeed8b5af664a694155deb079c7b1f70714ecdf1e8cdb505b3cfd55b66f5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f40fe3eebbc73fe692bccde0ea7805b4
SHA1d68dea92ca5a213d336e2aa2e7d3d4d50cfc5686
SHA256a25bd8bd3548a1110f0e65e06db8a7a1e2b0267baac235362ede801ced808b10
SHA5127d4a5c24b12a7608beb565316c83167f823ca95fae40579e789ece9d002ccd437d02f23813a7bdae38d3260dd174e863699d489b909b9ae7a380fb0915be67a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ba21088a404a86c371a15449e1ef83b
SHA19df23d260f6fde800585a3a3a11d4f2123425283
SHA25647516a78abd70a14a4a7bfb1d8729786a0a9154e7ce2f77f6d93b93e2358fda0
SHA51295694dbbfa7fbb939aeda270f02e32e1b550f5d262b9528978682141d75129d676f7b2d22fc0b2c6eacb81ef758b4194fd179192e6a3dfa40cf83f3344edf523
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8b2ec2960fd2771f938b2cbe4ccc08a
SHA174799a0faeef87fb9ceb7f09b11dfd9e836680c2
SHA256ce014921e9eabac57abde861de04e51bdd5994952758f6c7e61e24aedc5622d7
SHA5129a388121a8aea129077722e7a1ff1030dbd0456e57b4e46726063c85f1d8eabfbb9861a4ebafd081c0645a027e52f81f7bcdea6a53a0a18f167a396eb31771ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d94181aa5a4cf15d6d36a395a34a931e
SHA19096b99f6cc8d188ed78f11a269f10089115bf2b
SHA256674117d962259b68946222ceebb59f97710312c9bd0bfd21f720a793bfd6a85f
SHA512f1b4cdd9c5ba55a0580bbabe8a7446c0190ad3b57dc761b744da77eb67bb14540cd1ba9563a2569c39bde8c748614f89266e95b2523f09a31f6f4390e4e1425f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54591ff6405c40877226c3e1da398eee4
SHA1e1dfb86559f3fd0d323bd967f9d99b88f5dffea7
SHA256f4632f4055d86c104498cc8fd38f7208fe1cf8831d9ce1f52b1e93f4f26c3e33
SHA51262da824b44c90d6c7b4cca07c386d46d4c5860b096b13cb3c82658323dd66100792ca2cce2c0823d63477cf0f4dfb851bfb3b43cfe243d6bfacc6745cb890c65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592feae9fd0030eb2192506eb5c6d2275
SHA1a8900825ee38c2ee8c6ed8754bc9aa9f0919e826
SHA2562d8283cc6f24800ed55e80b65b14370e3b4652b72c213b815db8767af0905416
SHA5124444530569d702c92c992d6058575ff508380d65515d07b7ab2589f9a6342ec4a5b30e07799780614fcefe05eb4fdd7acb4054c79cedef389e30dd192b819b57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51825d5bdf111f21e596650f79aaf7b2d
SHA16752cdf9b765a9c9e57227e268466dbc1e078512
SHA256c2300cd1890dd171cc26957ac50318be557d77742c79adafb68a19ca3b14fefd
SHA5126df9aa1546a5aec376b19ff7f8723123a7bd073e6ee68b577efd6df2ce64fadf78db66a9d27e77d08d8edd07751b2c60da5ab409b6c0c5ef4845244aa182ef2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD58e7ce61da34e69d505801a90d2ce340a
SHA12672403a0b39298358033ed97cd396c02a9c3556
SHA256f042a1f794d78e130f2bbc0813db6df00ed869a3c3f5764062e808b1314c06eb
SHA5123275923c74ae7a3b38fae1332f1663dbf6e87fb496bcf8301a8bf0680491992beb79f2ff9f00630a0e455d28d3c9c1a54d2a6e57d96430bebac0e900c7af3931
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5GWW47WY\E9WCNZGA.htm
Filesize75KB
MD5c3bd0bf75c7b04aee6cc9e33346de44c
SHA1208041663211fe25033b497f90004a3cee385c7e
SHA256e9c8b67c51c942fa0ba142c4ba59b02efaa8f6274798f81a6e15a6184c33abe9
SHA5127374d97b868759023c59f408b188d6c1ea820399eb9df2425d2e0809b4d9b5d8966be7b915ca94e052fa6e68b68390e76d2ab28acfcdc76f4263227e0f379462
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5GWW47WY\plusone[1].js
Filesize62KB
MD52e4a448a27b8a58d75f607c7bdcca6f2
SHA131cf764c6c2240148eaaa2b9816e1219a273d0bc
SHA256d3696859f3485d8aa6f8a4d0054d64fc1ee614e57725221dd1c97b930f02bc3e
SHA51209ca4d8b6a0fc653490921befcb3d752e150ac9abf24d1fdd49c9453fe2baf969b76433a45121451ef642ea3f73f9c62871cdde5e07976ffdc03ee5200e4d35a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RLHRIIGD\BidVertiser[1].htm
Filesize87B
MD56c60754af27389e2778b3584bf10f3a1
SHA1196be0cdc74708ee01c01f86a648c16573e18fc6
SHA256ff2485a3dc35082ae7e3799388665929ffd72227191bf24b7c01033bfe19ddd9
SHA51236724f44d31c798e9c641567f282807f4cb357dc7ed4a9ef8ba633d8c2f14477dac67f4afb3f1f131dd16489d615114486eddc2cc34eff9e0d3b3cc443fa464f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b