Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12-01-2025 10:17
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0c27b7140d2d4785931525643d8d3630.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_0c27b7140d2d4785931525643d8d3630.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_0c27b7140d2d4785931525643d8d3630.html
-
Size
127KB
-
MD5
0c27b7140d2d4785931525643d8d3630
-
SHA1
2925b1eebb5bef4e9e9aa0bb9275635e78b84db7
-
SHA256
adb44337b2674b09b807d8e96534f8ddcf6a4fd7395b3c6b8e8d7a9ae8bb9508
-
SHA512
197d89f07c8c603884844eec988e002535f18bdc712cbaf593ea57c40669b1b6a1a2af2123ce96c41a9f3b1d16829cef5284b3bad03292a551b56e28d66b95b2
-
SSDEEP
1536:CXJEEJXFM4KCDrnDD9BVZfkj/f5w4w+i9:CbJXq4KCDrnfVZf9
Malware Config
Signatures
-
SocGholish
SocGholish is a JavaScript payload that downloads other malware.
-
Socgholish family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "442838911" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{69766571-D0CE-11EF-AF3C-DEA5300B7D45} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2700 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2700 iexplore.exe 2700 iexplore.exe 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2700 wrote to memory of 2812 2700 iexplore.exe 30 PID 2700 wrote to memory of 2812 2700 iexplore.exe 30 PID 2700 wrote to memory of 2812 2700 iexplore.exe 30 PID 2700 wrote to memory of 2812 2700 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0c27b7140d2d4785931525643d8d3630.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2700 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5c9be626e9715952e9b70f92f912b9787
SHA1aa2e946d9ad9027172d0d321917942b7562d6abe
SHA256c13e8d22800c200915f87f71c31185053e4e60ca25de2e41e160e09cd2d815d4
SHA5127581b7c593785380e9db3ae760af85c1a889f607a3cd2aa5a2695a0e5a0fe8ee751578e88f7d8c997faeda804e2fc2655d859bee2832eace526ed4379edaa3f5
-
Filesize
436B
MD5971c514f84bba0785f80aa1c23edfd79
SHA1732acea710a87530c6b08ecdf32a110d254a54c8
SHA256f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895
SHA51243dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5cfd2aafed683bf5cc4bb3363b0e86279
SHA13d25acc43d5bff84f6989f7a303d0a5c7c8ce482
SHA256cd4b3820684656377af6647c873c73f750f8d04d55b0933c4708116e83968b95
SHA51237796ce7f906a1f070563d20030416bc76575e46e7c881ea187718132058fb50cc4635520b721619e813692acd67ca8b5c43450ea4d071b6d86c04e185e6af08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5a3ad21fdd2753749f9b8fa43720f06
SHA1a917adefcec0777e5d7ef9eb1bd3c94f3c46f8fe
SHA25639635e38fc1a7ef44e53f196bf0e9fcfb9b7b484591f1e9cb01f894b0c48de63
SHA5129006b025cc9f35e5f8dab5612e3f52660ad13d7a61d690ec2e7d4debb7e1c4ad19681a5629d954b24d3595e1a4e5aa4c4fa8e1f355b2b50d09954c3e7bc0d287
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ad68e29861daef624e0daa6d5f1976f
SHA1065a1d9f72c0c6d260d458e7d6b8184ec40371e0
SHA256fdb2485d7acf47966bddc6961f93ba8ed59b952a48f2a877b44ddd7f81b6628f
SHA5125804e3ebcd693f320da22e04f46124b1082641ff4620f66f0156d13c7c993ca55cd75a32bb168bc63604f7bdb1c6447028093b527171ac399cd83b3f79eb460c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520275127d837eda2526eb7e926eb7b6e
SHA1e255b6a4a24e5af854d8f879e2124196433a7dcc
SHA2561a9fe900265d0bdcb0693895b93a337f95a2c324a49bbde3865cc2eb9e4c8774
SHA5121cff2b45c62c80d8f3a529be340249f0d233822d6e4333b45243fbdae9e74214e602c71ec815e09ebc54364f5f2c961b59e9fcbee858e772bcd308b94357aeb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542deea2182b0cb27c058174855c7fa37
SHA15dceacdfcafb2d0d4a7ca497011a45f6f50c7505
SHA2564b35c7ade1f80afbe61183cf4d368564b1e668fba3b8d5a17e9a13c30b95a895
SHA5124fa045dc75dd224c44aa73fbe7116830396d40ac81b4c1b22e39d2bc3abf084305dc8268e2556af767fccd9b6376c9cb21a65f7d7c8175944e92fef22314850d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ae3b58a2b5d3bde76394ea81a321b3c
SHA114d5a2ed7e7460d098a9e64b01e498b24e5a8374
SHA256c75fe3865f27df52ce6fbee63c2b30eb8c3ba52a96de67a08a48ce069d57054a
SHA512624fd7aa56b86e0fb8f34da5500441d3d029e5ad28bc05b5e318f421de220364d5eafc4e002e9056829c5c3068dda31c301e0bfcf8265b28d0cd1e28c5d7b060
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bda37752dea0aef271c1cb28eef2a20
SHA1be82dfa479528b0cb4311feb7b62d3e758504b78
SHA256ae843daaa19c2cc5394d1632e62e41f545c72b723755802cdeeaf63776eaf1a4
SHA512dab9182e3247c93df21d6226b7de1ca1296fbc267a7a76820a81385329cfc7720752b0345d40dfddda641536372190ad60a04aebcb9007c9208cfb01d008c1b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4adc490362c17afa6a71e62acff6c55
SHA104e3e512919eee9fe755c4cd88983c0529c1d8d3
SHA2563b6df30a3e73dbdc51be50d076d81d9ea1f1484b0a6aa301e6bbc54afa1b5ab4
SHA512d15358d71c017e86a74f7b66cbf471c261ea2fd1aeafbdb2e0d87e2d31d2ff4840ad94630a467075b14c99b34028156f5b43d089441a5df62caa93fc5a3eed5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b5fff87d2387d169ea2f936bd7a44a0
SHA17e898a587c49e78321da823d60abed181374a74d
SHA2569480c3c9c49b4ab5f71461f0d563546d8ac8246640a66b8784339ef7b513f482
SHA512c421e05fd6bb2889c7a13867a88aec9456f68da0613ffc9eade480521435e96a9c28d05ff71ace34886dcb2e678e253671454af0f511f91cb828a667e878669a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5671a83e44f0cca2524ebc358ff6ee929
SHA1dfaf25517da89084ccb60e6f28e61e074feef766
SHA256b4c88888cde778ab5ed5fdd500e7a997128038124ed378dee621a09f51f7aad3
SHA512706637197dd78cef9808aeea63071425dd9470e047f137fe05c4e8cd48692898c1926a10b4477202af640f81b0fdc31ea80cf22a8eb1508cf5566b9b1ce29bd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5024a6ceac58be259c9583ed2c69aa442
SHA13d537078f80626513c1a57fc774c9dd7bb02e113
SHA256aaf12e2e0bf8bee357e33f5eee97f6f301c9b2ed462029a2caebba858da7d852
SHA512234e3e3c0c7abeb86b30e9354cd77ceb354a571bdc4e4ffc4445709311f865d73417f61e76acdea46ea3bb539a3ed08b664f9f9c70244d835f602467ba02bf32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506933ec4d08b401913b7c10409b7f955
SHA17be5d891b885784b8c7cd3fa9861b66ae429d5e6
SHA25662c99ac0fa145dac5d6d443cfbc3f62adc9d9211ae847e519d24a781bfeb1b8d
SHA5120e956cc864a4aaa3f582f6b319e4b28f5e0644272fdbf9b79e1170a6cabace3300c6879ff0065cf4aee3a861a74c003b56059de1fa5e132f372d3bc40f26ef92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5467592bfaf59c55b3f50d920417e56bd
SHA123fe5aace9c07544a5a6197d2bc06f7841fcb195
SHA25616a5cea4d91a878dd0c43aa933d07e6d6ae8997fedb98d0b812861e064a7d0e8
SHA5128649d9887485aa2db072f33a1b9ab7e46cb8925ebba92f279645ff0d1d6dfd57d0318cb22f9453a4c6611a0a398e32b64d20d6cc35f0baa517586336ad8ab3ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57695eb1dcae16f3485178650f4bb1b89
SHA1bf76852454c1ad64cefb26b291973a55d16ced5e
SHA256088175d6c8167235ed906fcd18864759f323c4823a44bf2b450bc85ee6bbeb5f
SHA512ee1361e39dbb6bb2d581e0105960390ffd6ab9b9df97063bf28d224557144339c522ce08ad4c85af840c5cdb75108080d33325003488115e1232a08581f80ed3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e804c94c8f559f9da26dd4d9b82d3d11
SHA1d83bf246baf8454defa1229635e05955e703b265
SHA25681c71bdfa2652d7dddc08dedd3fdb8a4f4a749e509c543f2fcf0ff068ee7dfa3
SHA512bc88adb58ff2aa2e76933ac5acf3dc29ee1981ffc8c4ec38baa904d3c8114d00e34f0bcf5f508fb575142110958d8e9c838c492d47fd413dc75e2612068d159a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529e4d5322bca4b674c0f1b302b966943
SHA1163ab43ad2e472834692e848f37635b9c17e6453
SHA256028b76f599080cc3912e06f30fde00e64678682bda44e4915a4f46258ce2e595
SHA512c91ed3dd47341c6df420329addfa4223df702470e2a93bdc7e5aebb069bf876a89fb0801ad310be1f57c914cde03610ea3455e3a147d28de283466dde643c438
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504aae3a542eb5fe38c4000529be6ca9a
SHA12df04c10e1553248c7e1f03092cd9edec3259937
SHA2568241d6194b92eb895b4877c1aced6688b504c3863a3ddfe219eb451c3890572b
SHA51241404200cd9beac15abdf3e8d1f7f60ee1e57a74f11c6c0a29362f8b212b1bce6035a00cbad5608998f7b180f4d5627b2c5d2ab6301dd69879f1afcd4c88cc6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C20E0DA2D0F89FE526E1490F4A2EE5AB
Filesize396B
MD53cf5e2d7c8c67237171ae00869819c57
SHA15626feb46f9bb278acc6b56fd743e50e58619cad
SHA25656a8e0d79860394a9d4643fd1c5087b88a18621efb7f641f972c05e96aacee9b
SHA51201eefd0ec78ddcdebe57b9a07b26daaea0b196a879449133404407da145ea095ffd0cdb7871ccaf27a229b1816fdbbe5a653fe6751b223902c9848f817c50677
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5f077d5061f9723792539c44e03934ace
SHA1e700db43a31471d64c508f7c7f8550f1bdae227b
SHA2563c76d849001125e953cb024e56af5b23a08969f4253077aeaacc8766bfb45487
SHA512b0c9d615d77fe7104b11e98a9874f662f0bde96488894caae2db9be1f9427af4fe9204e65484afe47cc97f662834cfec6159448317e168f82f6536486be2ccbc
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\K0PVW9XR\f[1].txt
Filesize44KB
MD57d91634c33c08b3873ac18b6f2a61d36
SHA1146048b7631db3c5c93d601d505f4b1e4b419d62
SHA256762af03954033aac1217c5a9e5573f1636fb167ca9d94b930f864e1921b08dc8
SHA512bae7a0c4851a337803db8f945775649dc5e66c16cc39e2ba40394a3dd734ce9820ccb4718dfbef1b257cf58a2d6a3c2fd01cecce18cd61da84e3d3f0cdd1bdab
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b