Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-01-2025 17:38
Behavioral task
behavioral1
Sample
JaffaCakes118_14694b0775f16c025d89a6a1c8715e3d.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_14694b0775f16c025d89a6a1c8715e3d.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_14694b0775f16c025d89a6a1c8715e3d.html
-
Size
153KB
-
MD5
14694b0775f16c025d89a6a1c8715e3d
-
SHA1
8356f929e305f420b6c4c2b2df614687e3096c1b
-
SHA256
ae85f7448be451047463c10f34c6f8bb111c70b1644482411c4f03c83de7c728
-
SHA512
8bdd6a34f769ef173ae8cfa2468370c6bc0ee3e944ec064c7785c4efe148f2199109a889e3349eb774149f6f45dc2c320060bc0b772d3b3bbac2adb9e3e7018f
-
SSDEEP
3072:0fUkSw1QRYrRB7a2DFU2PA/K9odahlPzodahjodahppXg6CndiNq6a:0fUrw1vlUCwR
Malware Config
Signatures
-
SocGholish
SocGholish is a JavaScript payload that downloads other malware.
-
Socgholish family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "442865369" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0315D571-D10C-11EF-BF50-D686196AC2C0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2068 iexplore.exe 2068 iexplore.exe 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2360 2068 iexplore.exe 30 PID 2068 wrote to memory of 2360 2068 iexplore.exe 30 PID 2068 wrote to memory of 2360 2068 iexplore.exe 30 PID 2068 wrote to memory of 2360 2068 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_14694b0775f16c025d89a6a1c8715e3d.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2068 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2360
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD5eeab796560aa034471c8b2ced6d3c8b5
SHA1703e8506a06bfcc49066ada36bb4c0df89f0d9f2
SHA256a5f6bb0a4a47ccc28d459fab31b885c27110d48181d1d8267f9fc94386303f62
SHA512a6d8d58db7884ade83ed548bf5decc67cb33f6643fb76f2a24ca32dd4fae8bef7d1b91b125d2faa7d9cab7ce08c5f6cb8092f34f2b88b0e7e63eec244c7cd2cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5981766005091283ac96db732330066b4
SHA10dabffec35cc03c299929b63deffb2e8e2806bb3
SHA25636ef66f21d5d3aa5c37767e4675705ab242636ab322efacb7e1b44f6da1b09dd
SHA5123fa3a3bc991f133cf131e9dee147bb034745de46c1e0b8abf8b48a10813d2e5f06eb4f49fea090587594bbc7926deaa9c286240db20ef8f4ef74f39d1638ab35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dadca9aa597106a1ef546eea861d243e
SHA1ae4a688477cf2c00a2114420d4f5333f819a3795
SHA256914b3462cd4106cfa5a5e72e85e567162eee9d9e72e906528ec6543f7e7fd5d1
SHA512aec4380ec3b2898513e3367ff4bbacff8db397e041758c6fa16a9c3729d385c8d84f79a2ee0aebc8b8beca85a94da7cc704800c0a08c10f7be58a88d7ba339de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59037e567a7df119dd9414c130b8fd24a
SHA135ca56a260b004d265e565554287867ccd78cb58
SHA256d3c416691d16484f107f4b74c1541c0c245ed580e829dd0f9999758ed44f0628
SHA512047e84bdaa95da50292fe9891f5a916c560b1a5f5732d1319aaf06e0e6099f3a6dec6f5a1716c4be33d0ec73351d11270889321784cf26ac4501dc2ea03055c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e5acb564532aef1513a85378e49a9e7
SHA17e809e9729429790a60659b084b5fcba0105d38c
SHA25608de003e082077fbcf4656a0d1376f476e95a9387158db578668b1cacc581cc9
SHA512bf479012de1c1eda7e20787a9eb5aecb2a264c8eab6be1e51700a085ac58bc9b22f9692755bf601f17632b1c32832e908f45b06042d3ee38e213c968128e895f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd8c9146dabe98d33eaffec5a713138b
SHA17da401c1b35cc043f4c05d8d3177db5cfe55ccd7
SHA2568cf92dbb4e43c0a0be63c8aad0a776554fd83ae17364b3f2c2cfb4597d6bfc1c
SHA5128e3b680afd21d695df374c02a6c9e15377ee6417dded8f03c6885bdad2ad47d77c68d20c8b2bb5074988634a8b4a15fad01ca9924066af5dc7e051bb03be6d8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b154a7d5614fb4d4b4951ff5c382b11b
SHA180fe1c3b5484efffc856baa5869f1b0b0866d709
SHA256b16564d04bc0bde5b4a42e781e9e9c8698c2412a1cf5801f27bfe118b7a2cd96
SHA512e52b0de07fc44e8de2ed6430898b6bb17ecb48bcb6aecd65c68dcb1f5ffc150b2b6a0d95055f2c71d6c76a79cd5f5f88e2b146ef6fbae0d586b83aae7cad4c20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5540a5ea709ada17e7ea7f13d06fbf219
SHA1324f0746a0d97158947cfa1cc8f802d3634da1a3
SHA25689dc52c6abc19b8aabbd9bd04c81456194a34b36be01eca62953c6bf1a9ce945
SHA5124556c3500067b54e1f04a8e302980bae80f26078cc6f4f3db726a6251f6b2433f573202772653f79e40602c155911cee45da6b18cd9d1b1af6ea98ccd9b84d2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51648b9752a3c31a652418c8045e34bf5
SHA15fee7a15b8547cde4a2f5dbc17376eff914c99a9
SHA2561210eb6c249ddd981f68190d819a4d0890d2df5b0476a10b34f58cecf26e6758
SHA5125bd9366af6fe7cc418cfc549a218e1d4391d0fab141c5c68eb06d5f657bfa8c33feeee3d65b74fc1392e15ac3cf5ddfdff6f13a6f6bfa3a5bd74325a7b371384
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ee84c005bac286d96dd27e9a27caee6
SHA1363775e30465efdfb16409dc470112d2e52ce2e0
SHA256e224dca88f997e6433acc38e5df64000b6b0e5c1ddb2e7d8a030ff627eb23c64
SHA512a667341cb3e8521d21d9379df744e1a73b6e04bf031bc30212a6cfb07a78ea31751242dfd4981d902b6294b138258ca9b29848fc51241101bd8e81c9a8fc032c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d659eeaf9e05cecc2ea065d46f2cf614
SHA188a601758f17d4d4accc14147019fb7a690f259c
SHA256e34d901c47c29f561d9b9b9f96717aa0919060f07c9e94a7016cba6d3c64b81d
SHA51283e12a6a78fbb8f2564c26b616d20cdb9950d1344186c5765c36f1d474c6ed8b3d9e137cb03c696822ae2755a91cac76ab257d59da4ff6f53fde9a4ed1162a3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bf8b5d2f49d1793216a31a8e832c31b
SHA15d265248746dcb841f6cc98ef31798231b41c033
SHA25624250d435194f0f7630dff7b6b320b479e5de375a357e71eb3099fad006991bf
SHA5122dd4b7f21015e93d461ef3cf6a7a55caf543eae51b1e4573e3885e3129e1b409a398de24a26d9e2433f2a6001f135510a6b942aa616e30d1ef2a17c7fa900fd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ac46afcf0644ba5e7b1f408965f7e80
SHA13d8dd2f42e6c9153e1c9c8688aa83592479f9563
SHA256b555d7d09a05c7d77ba8d33f60abe11a0d5230fdc657e89b1ee61d5761ba9719
SHA5123cb6f50b051dd72f0592a0d66c86a163653090865e22b22e5c732bd60eac59f21f1f6aad0bb8f17f4cabdd6f17b0f2c9f9dafed72ed2ed20e2b86adea0223d06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587c784f4fc8e0bf37a002c4a7fbf4ca3
SHA1c16927154df8f5f498cd3f7cd04e5beaf67687c9
SHA256f47077409057a8d810dde9fdc6ae0a7bfca12e1894de1f0739883f12d327041c
SHA51211e96b7eb87b23d89b33bccd5c747bd7cdf8e5a0988962bbd304daf5f15cd9140401735162c2ceb2072f3bb206baecdc9db3d641619d4b353e0d37cd2a9c6bde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540fb8412c478b3134c107ebab099b5a3
SHA1fef06f2f9b47e2381d372ca7846dc2e692289362
SHA2563636d6095a12e28ff27fe17095d606aafc2e16e079c180a14c71f1eedcd79f61
SHA51280a29a0294ed2ece1a00aa5d069cd62d9bf22a58fe0c6a36364038dfe1fc4d5611280d7e174c384dc310c3de909ab49f35845e2c3fbe3669a0e62b23d0d5a02c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea6fd305af14f4ee0862f5111421f408
SHA1ebc01cc19a56c0feb7d675331782b726f4716c6e
SHA25654e772baa00e8c401771e1c1579e4855c7909f8ed6c966196bd1f0a7c4bddcb4
SHA51265a887c9fa7c2053ee1a787a3940d4bb2bfefc6d63e04670f28bea191f3beaabeeddb09899b708a5d8938421702d7fc7fb3db02d32d43b37e6b2200ab84a695e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514b17e1348c4f9cf1fc6614bbd5cbc93
SHA17961fe1b0e86adcf12fca1359379c80fbc6484d7
SHA25642b7c6f6824f1775588db949882da8421bd631f319bd9c0078a92e3db5e3a2ef
SHA512083a3c6d40a813dba4ceb87376c8635b25410bf3515d8c92329961d57b05e91a10e6c28d6000ed62131edbd3ac3fa5c388886334b7e70f894fcfdf6da44fa572
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cb69901219761c516c0ad333fc4bb04
SHA19d183480e936d19a3f8bc51f355dd8a0f62aefcf
SHA256d007c74091f5e44255cb14fd9105f7267a2c6eca48cab9bb5ef2f11d2ae4c967
SHA512731f493ad7ba26b1e5f6013e10caf43ed58a757b80f247b1e1bbd0d7f936a79568edc4483ca28111751697c6952f9038f22f7500d75f32db922674c20f667f11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD533fb8ddbcd3a72239a9e2ab204465e03
SHA171f8535001c56797d71f34f20ce32ea87caf8ac3
SHA25658fee4f7f5014bdb0f09f1f712d1816f8b97886157a3e39525053b0cf8bd9a00
SHA51227a3a049efe5f3511480b88955d273475ed6b2ba9334b6505da738a8e59f3d338e447f508a0913f022fb8423f4119d4ae5dfbdea68e94614f499ec9d5ef4d9cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD575ad917525bc27afd3dce0a5b9bd4c01
SHA1d7d118675d08ed1f2d9d095dad2d5a7c362bf89d
SHA25607a61a4e35ca6b584e7dbac569e8df2a69351a664d168b85edcba6df86bb22a4
SHA51266f06b4c6559951ca7c5767fa8fbcaff2109eb43e5a9b880d47d7354774139b9701895bf76f14bc1044395442cec8d6056153754bb0f835d9e0a70412e8a870a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\F91VN88R\f[1].txt
Filesize44KB
MD5bb212d40f76fccc3b13b840fec63d0a4
SHA1c5a7ccc38de8d20f6356d8e623a9de60dfa319fa
SHA256c0ef22a3a73f452b97b51c5d172155d6345ef50dc3a89fce7c79228d0c1acedf
SHA512b806daebbe3fb2efb2fca2d1a39c071cc2b924cf079ec73142990fba85d32c39cda186a9b656fcd5df7a11390cb6b84c6f14f11ad53ccc5448c1b95fd35a4e77
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b