Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
14-01-2025 17:52
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_41f0fa5ce212623af63f43fbeda3c063.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_41f0fa5ce212623af63f43fbeda3c063.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_41f0fa5ce212623af63f43fbeda3c063.html
-
Size
153KB
-
MD5
41f0fa5ce212623af63f43fbeda3c063
-
SHA1
13f0b9da8e9b753ee2538f4fb09de5c820c19d66
-
SHA256
6f85e6bdc9d4ff01ee5acaa19a302f1436cb4d9243151540e6104ac9c77b5c58
-
SHA512
da278bc13a5309a1abfa079e9fa6c442c1068479031c62f25869134170b0d3ffc741c4ae677618f449c0014a05a692007bd142a201d3c49f7eeb20cac5f6ccd4
-
SSDEEP
3072:1t2iEw026YRGLXEi+uziL6+aT1S91pi+y1ow3godvhCX19tBN3hoc:b2iEw02lM+uzi++aT1S91Y+ozM
Malware Config
Signatures
-
SocGholish
SocGholish is a JavaScript payload that downloads other malware.
-
Socgholish family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443039015" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4FA55BA1-D2A0-11EF-B66C-7E31667997D6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2604 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2604 iexplore.exe 2604 iexplore.exe 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2604 wrote to memory of 2772 2604 iexplore.exe 29 PID 2604 wrote to memory of 2772 2604 iexplore.exe 29 PID 2604 wrote to memory of 2772 2604 iexplore.exe 29 PID 2604 wrote to memory of 2772 2604 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_41f0fa5ce212623af63f43fbeda3c063.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2604 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD56b6b4de3e1b80fb3cded020fbf9c930f
SHA1bb97f0f3e2279445f5b26348fc36a406adb17df8
SHA25637c6d99df316e0b157cb94be81fc855a2e2a308b0a6566286b67507ab5cee4d5
SHA512685797bfc4eed85c254fd492e505d499cdadf625776cc15fb79f6cfa19f0dcaa021003d06bdbe61f79b491c622a3e8e65aee885ff1b4581cbe90bd34407a3eb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5546f120ad69e36f3ee32565ed7b16779
SHA15643dbdeac940000fbf08cf2e9f3a39cafe6dd11
SHA256bf85119d237bf52c4041466485b7403d8cd6acc8fbd51e005b15eb6526773bff
SHA512c0dacd9fc03998d272d0891d4f946ac1b276d001963dd8ba2e740936a2eae4d563429e337c1861b0be4077708393a09ab5f1871218eea431987aff12177cda93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e940dd9e37c8b716ee0cec906550dc7d
SHA11250bd1bc3e57abe7187b441fb04351becac2b22
SHA256bd8f95b619ac9411053a0705cfb0cdc2f1f72c82cac40e71f029bfaf082cf9af
SHA5121f7c250fb8b729ba32f3496d85121bb10c5bb55ccbfac5d25ba687028bbc189e8eb1e4e226a74efb03ff218aee8d7e270563e1fb75e3bc1d0d5592ee7bcab50b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541660cae7ebc7343a494ed039fb9d8c2
SHA168cb67d36c2a2bf7d4bacd63fdadafb1537329af
SHA25638bc555950c209e0c9e91abfdb04ea6e98b8acc88c6048f9db39117af7092bc6
SHA512bd6f360739e3db08413119978e6e5341a96886cd5e5cfe69400e2d2a5ca15ed46a4bb3d3b7dec4c43f8a301f7d01b98cc6b4aabd9d2578b27f6ede9573784755
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578aac59f224c5b590279573be27a09fb
SHA11fc775b2051eb53980068ec6ca014d9038760582
SHA25609bce866d491706a4465f1471e8ac6e79b91b01340411c97e5b356ec3db8889b
SHA51232051e38764c7158d65caf420ced2c58871772c1895e6de26f7f6e67ddbdaaf974ac7e90481b616a6253dede1218b9f9779c99afff9555b1b09e45f60ab9e5d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a6381f7c4f5b6a73a0058227380c85f
SHA1396b81a61ba38da50955c40d72e7ca0734c22e95
SHA25676b68306c02934b27f4949641582d0a055c005b419db4719fe16a61ed2103169
SHA512e3948ad4525125ae57f3274a48f47a26a929e9f4b9ec542f21fda42f07a5ee768843b15a51c4afe29408ff3c734103d75547a5b2a9f6480b72e1c08474cf3507
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d652165723f5adb6ed0d60d54110767
SHA1c5cc73a7854f22b24d3bae48e8e416c56c990af5
SHA2564ec2dc4b5736d476fb1c4392bbcd9ead806e1da289a78341d4fe7eaa4c18d6cf
SHA51294731c618e259f5fe416785ddc50480ab7f24a02ae4501b5b02b42e5284c747bec4c0444150176565c45bb76f2ede7f8746fd9c08cfa4e9e90ae5806fcc346a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d60425a03718272e5ca60a21745adc6
SHA1ce802ca3cc437449750b7b474a88d6819dde27e8
SHA25638c3588a2ed320f904ecc2e0e137a8d5a049c69ba9642fd7963f82d92c2cd599
SHA5129bde4d67b00a8dabb0d70a4fb1622c0f81237a6d9551be3ef9626f7b2fa998b0e694fb0ae9bd79208647c26b2cfa89984632e1de769e439077b5b3fbd3db09d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539639ad425d51093b5b796dae007f5e0
SHA1afc55cdb0b5902be167181964899fe1febf27250
SHA256c8c1ac711256f267fbab7c544486678ad41845e5aa0a8c10013f089078f9652e
SHA51292118618bb35e7dfb6fa91d6fb7c4b003be28004f2efd7df0019fbae371e5c809af8127ccb48cb20c908156531be58e717bfe7c9d74f2ca89a312298152a3424
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570118bb95262a4cfd90ba9dbc09a2532
SHA19908aee7f65fac8ef1a242558e6258bf0e18403e
SHA256c4924a140da75379aaa50e8d061d78dc66ed5f0865ee87ac7d5a634595961809
SHA512a80eca68d14d421d75b52e8842f5d980e9d3bc669530dd6ba78c1c6643c091f9024fa3bf5e047b6b82dc1b057b9b5747c23cff7de04725aec2cc5026baf8a265
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c9b41b1475f020044a25352524c1522
SHA1c6425a5287a0d490f55aa4ae248500ed8b87d0d1
SHA256f6b4a9fcfea210dfdc197067e2933dda8f0ffd1451f3149a11cd2bce79500c4a
SHA5122288e26bc563895b82e4293ab26f00964fa8dd07df6e2a3ea92be2f6adc3f329e91a6c1465304e0f2c5d3c311ec9bc8f18f07acef222781dd69700481ad48cc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d0cf4913db74ce9ccf89dcc1414185b
SHA12ac9b07efed8815d95cbd073a1c4f806d5fd598b
SHA2562bc7a01bd923994c2f6da5ffb3cebeec28804e3d2f16b6bee9f839f9f95901bf
SHA512955a8440665946151b80cc9c03548fa87e2f9d86561199cf82e27ce0c37083a1a64320e867e831b2941ddea6557bdc4ec6fe3433429cf5ef1f40afa2efe543d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD591126baab7dcd7ec20efa7905e3bb8aa
SHA18e593281cb02abf7a5d91284daeca73b70ac4cfe
SHA256bb39be3c3ed5e583640d5b095e85fa56fe5a8f8500515fb7c20455a14f469568
SHA512150f9f10249aae14b481a297569bb002a6239d8bd6981ddf49d701ee1974e0f99b9e0477d1c5154dcc11e9f927b5857e597a6f79d1295d001e68d87ece134e03
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b