Analysis
-
max time kernel
143s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-01-2025 21:00
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_61d68b283908c9f175c57f2181e1cb6c.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_61d68b283908c9f175c57f2181e1cb6c.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_61d68b283908c9f175c57f2181e1cb6c.html
-
Size
39KB
-
MD5
61d68b283908c9f175c57f2181e1cb6c
-
SHA1
687f0ee5b1bceeaf0927c1d8c1ee4b0298092e27
-
SHA256
aed0f5a82047dff1a7baad1d8d7166de4a431ce331bbd8a2863e0e3004cee383
-
SHA512
fd3707bc4f29a24e0bcaffbd003fef2f2930ebc5d8f38b866be63871b2844f5fa3e8728eebd83d0bb48d22e1aa596d6ac774b679f6f7aac38046b71d1780a61d
-
SSDEEP
768:SE1ikkM61pves/gES6PG/CBzR70Uc9dkc:SSkM61pv3/gES6PkCBV70Uckc
Malware Config
Signatures
-
SocGholish
SocGholish is a JavaScript payload that downloads other malware.
-
Socgholish family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B89BBF31-D383-11EF-AE95-527E38F5B48B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443136685" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2068 iexplore.exe 2068 iexplore.exe 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2832 2068 iexplore.exe 30 PID 2068 wrote to memory of 2832 2068 iexplore.exe 30 PID 2068 wrote to memory of 2832 2068 iexplore.exe 30 PID 2068 wrote to memory of 2832 2068 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_61d68b283908c9f175c57f2181e1cb6c.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2068 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD5ea58026d4db81c21cef654b07ca52b49
SHA122802b4ff8301af3a96cf13458aee02b28ecac9d
SHA2560135e99c9aac3726a289eeaf79418e47ae5442760b5a80e1827bae5e24916bd6
SHA512c10a8df1b3766db6a22673c3db8bfa37abc28eaacbf91f3da24c5169814087c9efec41b938cb35b8fb5401cb069b4588a015bdc12cb1ccb0d334b883c80b33c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD55c9a995a3b73e80f1481cdbbbdfba1ff
SHA1f43a916ca6d549abc0df0ab1a1940ef0fbbb22b9
SHA25671852cb98eabae00063b1f41edecba3924057d8b7c366ce7509b2f6c8883d426
SHA5125a742e5582a9bb30ba4b6e7a19275759d0e8f23f181b308564c6724607647d31534c0df04146a1f72e38c04ebd8a44753842614751a86bf01e35dc44b90b72ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12
Filesize174B
MD5b4e2eac7eae586968afdc646cc74ee63
SHA1aa7357cdac4fe1cb048184c312e097f53b899fc2
SHA256f20df11f3b472dac0ba454a220fb8d0464f242f8ac5267e4ba260eade5203139
SHA512f6f1d8e002b237bf7d17e0d1f09abe08a9c489647f722dcbe9a0a66c9659f06e5bd8946c60bc6ab8fb4d7ce931f3da269828c69ceb0604ecd209fdcfa0d84efd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b64b9efbe761ad8260f1d25ba5bf452d
SHA1a1d5f1d3b6ae7acd2ba6bbc8ac9651a5a8d9f282
SHA256d296c61792500e36097c5af453dac6b43d910a87776382fda5ee39c2b2a21e9d
SHA5126c9452ed8ff3ccfb5d680e0841f8af05ec38a437085b9e2c57b8280b2fbc53752c14e4398624047b614d43944aea6e050028fb45bbd63dad11d7175880ae2f8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c4067df38b0f59ca8320e4be06922fe
SHA1abf0f27f0451b48a9f090d63d84d3c34fa288c13
SHA25694844e24cc089b810d6950dfc2b2eb6ae393da749662d3224fd9dc5766429cc1
SHA5123a2ab59c8b7c490c7e4d23eba70530705f16e5c469378a757d3bbf440eb77db7b6ddfea902b74c587be897ad5d4fb98c12423dbc8b641d772f3dd7e3933dd0a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da5f40d8240a1332328777642ceb04fc
SHA1c9ac6dfcee3a08f25e6f00a1facb6271ff272fae
SHA25654c4cd95df17bec3a8d6ea33cf2d43e82060fe48021a6cbb6b432e46a9c7939f
SHA512685313ac7ff0071e06791e2e43cf1dfe2401fbbc7037eb6b1e7ebda76ff60329d651cdb8f387904bbc57b5c59a41df532bc7b44f15a453986e3217fa77af8be0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5543b3171b8e2cfe90381e5a585019162
SHA1701a5f36eb6293dcab193bd70dc1da59444daa4c
SHA256ed6eddd9e5179e404dd30f249abe9fe9647b6d8db150dca3ff058e727c9df9e6
SHA5127f7e8b993f443d8373d8d7bb4fef0955cb645c88a42fe8efc2a89dcea8535296627708be1924bdbdafcdae7f23f141b3b62c4ce54b40d1ab94f483748e46c7e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a783c6c478f730f97a22cdbcee66e3f
SHA19de2106aa0b26584b887563e74c584052d7d4769
SHA25685e8d2de8522bdd9372b940278e0e0feab4f438ce9f97703073ec990cd043cba
SHA512a5fe55fb1942c6be56a2c0a96266a123b73dc463ebe8a57be57a0cbfcb3114c944492a752ef56431bd7430f018ceab9b74dba79721484d2c5c36c528ce28b7d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551d421b4750ecb8afaddef1f2f46bf47
SHA1a870135a5d293442bdf538cc76777b00da45e3bd
SHA256c4011d2fbf4fc0fdf7f8f17ed0930ca42a2ba992c311d37dd09164c366b6dea9
SHA512b3a935831f65f29c01b1d3e2e84c58736484d2e9a2f9926eedcbee3363d3aec19e7a95f3069be1c1f61677e57d63483ffedab276840c89cbcf112a8898dfccba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b71be784b08eec38e661dbafc5b8e2f
SHA14911be15e802036a1475db1dff76066bf077182f
SHA2565fcaadd946538222a46e439b64580756f8218a7a7f76d6f6fab160bf9624b376
SHA512962b1ef0b39366b685c43b774e94b18cefcd6e2e03642bfd584cd80a51fa4e1c249bf222b03193d1d7293fad51fd683f1022e0d985dc82a6bbd0aff1c108bcbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51141029fb779bc721d99e3b650a5f5d2
SHA1aa49c73a100f8e7e351cad0581da1d6152d96a1f
SHA256a9c8c78eab81ebee8f9939a6dd901cefe13420713d30a9aab89ead5f39cd7cf5
SHA512429ae0a4be9a7d082377db591cea8ca98a9a5bdcb6b006163755e1e8fb5072db22389f5aaf51e4c14de9b3d1ebaeb30fcab7c4b3c009a8975ff93e0081eb07f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f99339c4ae5bcdf043c893e0dc7587b7
SHA10de8650c960b0d5353a151cd54694a5d0f25eeea
SHA25613560f765fd75798583c33c7923d0b2a61ecb60c14eb77da28df6e3d07ddcf22
SHA512854a73201ba77680f1d915738a85d4486b55a9978a1168fe602667dafc31ad9104ebabad2a7ee19d8d066b50a3d814bd31ddf6521e2cda0aa7ab587e25f9a9df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bcde9568d9b3cc3111e0d622229af26
SHA19c8e77a5fae9568024a48e21dcf31e92f058aa4e
SHA2560b1b9e7ef9285789dbfdbd38d887f0c422f97959c373d66f9ff4b60259402aa5
SHA512cf2d4a39ae379f68a3561f2833c04e616d7dd4f4e57aa49e6073bd58fbd9ea5053f57f8128f2b3a1d18f71ed0b859ffe4f81f31ea68db55276ebe09dc7c20594
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2f3efd39cfcaab3d25e73c292631b3a
SHA105264b94b5eb9461c8f36f6b090d43df15fd163b
SHA25603ce99f114872a726702a24306f6eda6b361ef58aa7a12620c47159b483a226e
SHA512868c25c6f060aa83e51d16c2a0d16e3b924196e71fc1c7877cf27a740847338da5afd99e3d4e13120438f813e0a4e3716261414ec6355490ee369b1c05c0c6ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d5de0250237cb3a3394e835fc95d934
SHA1b16c203e07aac8a5aef2a79ac20ded981651c943
SHA2560c4f1a9c3bb1b38463647721a615890cbe214002dbd3236e85a61e0e7f6bce32
SHA51216be9e4fd66036131816001de372f8356d4f6ad7def234e9163aea782d88833d601fff957e9472eb1a9d56d576ec8f7e45a69f150d628f8683369660c71ed810
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afe53837e80c33affd75a9140b8508c1
SHA13bad0d807c2707cbbed9b43d07106858c632247e
SHA256f0b941b6e4374a87853714ef6e69510a95710b52762837b2c1ee992c476063d0
SHA512bbac4afaa3530b05891e00fdda369c343fedd46875e0cceebbe1c81d93720fb37a01b831b02ba07e2f5f472eef9e7c923d06b9d506460175b193f42a445333bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea91d97cfff8cae2ae9184b9180a4fd8
SHA1f6b6695a6eaec50282e39e7306d7a9df8c607b9a
SHA25603a8177fa2851e7057e88d4e5b406e3fe656ce79f4dfcf500875350e48e86cdb
SHA5126e475633aef245b3e32e6d04468b7e7ddb2ef8bdd795e7c80ebac06acdac93a16ec07d6ebd90759a5010acbd6b3fa829ae6c8149ad58927eccbfeb889da312bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD55a92acfcce7e973eed6ff6e1c2691c51
SHA1258c0f56b69b69159eb462eac17a1a51d4f1c55d
SHA256b1f4ffbbd1c1a09cf8556207c092b7b8d947835160c63f59ed16b072637ac34b
SHA512729c7e90c0f5be51b395e96aa57d75fa03463b41fcd98c29ce84784ae3d83037a77d7d6632b4cb7924cbd7ecabc7fba7cf74bd67873bea95e99a77d74584f98a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WCATT3E5\f[1].txt
Filesize44KB
MD53d98d6e4340908c9410ac52a218c419e
SHA1119d4f7f4e3e185b7ee9722d336aed9ff9d317a6
SHA256939ff7c40a1fb8a6e21e7565198b9c7d89d3181bd6fe6ae0b71495aae5e76884
SHA512ad7426d9c8278d6db807214a62e39a311cfc2a8d968a3978c17e452942694a74c9c0911d9081e84513aa4ea07cf2d3d5a3ce374c0ce7dffe2bf3d7491821ded4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b