Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
18-01-2025 03:25
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_9e4f72a2fd9eb6e1e34f4baf7b32187d.html
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_9e4f72a2fd9eb6e1e34f4baf7b32187d.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_9e4f72a2fd9eb6e1e34f4baf7b32187d.html
-
Size
146KB
-
MD5
9e4f72a2fd9eb6e1e34f4baf7b32187d
-
SHA1
4a89fe8a712e12c2deef06c5424abef13ccccc4a
-
SHA256
adbc941c346bc80ccd3f5f524e4409670b46c672fda17c1323e7914e4f2aa126
-
SHA512
8bb9700c881011da589347fabd2cd3bf018a9bd1b9c073269ca43d2ad0e95c8b7d2eff7bf644ba78ab454e2f364d25f00a47712afea60acbe1c7554d2b6fc635
-
SSDEEP
1536:upUJEEJXFfGi8r8CDrnDD9BVZfkj/f5w4w+iL:up2JXRq8CDrnfVZfL
Malware Config
Signatures
-
SocGholish
SocGholish is a JavaScript payload that downloads other malware.
-
Socgholish family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D7E4B441-D54B-11EF-AE37-6A7FEBC734DB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443332588" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1860 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1860 iexplore.exe 1860 iexplore.exe 1952 IEXPLORE.EXE 1952 IEXPLORE.EXE 1952 IEXPLORE.EXE 1952 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1860 wrote to memory of 1952 1860 iexplore.exe 30 PID 1860 wrote to memory of 1952 1860 iexplore.exe 30 PID 1860 wrote to memory of 1952 1860 iexplore.exe 30 PID 1860 wrote to memory of 1952 1860 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9e4f72a2fd9eb6e1e34f4baf7b32187d.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1860 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1952
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5c9be626e9715952e9b70f92f912b9787
SHA1aa2e946d9ad9027172d0d321917942b7562d6abe
SHA256c13e8d22800c200915f87f71c31185053e4e60ca25de2e41e160e09cd2d815d4
SHA5127581b7c593785380e9db3ae760af85c1a889f607a3cd2aa5a2695a0e5a0fe8ee751578e88f7d8c997faeda804e2fc2655d859bee2832eace526ed4379edaa3f5
-
Filesize
436B
MD5971c514f84bba0785f80aa1c23edfd79
SHA1732acea710a87530c6b08ecdf32a110d254a54c8
SHA256f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895
SHA51243dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5e75f1dc4e8a51abdcadfc2939f4e501d
SHA155790fbbb91d68d966228f31f6ffbde6fb4c29cd
SHA2560ae18ec315a0d9910972ea37e74d0fc565e17fa657aa20378b5106f0b0f8b4b1
SHA51237613d1901a688d762a602a8ebe72133d19c51fef3b7d0a44d9d3b2b1e6e5e0a603f5c0554a3d8bda590cf271e46aac27774db5100e997810209721f89adad41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e35ba51685ae8dd3350fe7f91dba34d
SHA137085a9e2628a9bda3e5fb21b397ca07f418aa6c
SHA25611ca463be2b366768cb8972ad7f74f7d3876f4ac1b2d583afd154500c27aac5e
SHA512d8e6c0c95b998cd8f91f589b590cb074dc4c3e551505fa68496762d63a396dc64f095b7af26f803bb1ae20447edda1ff40056575a3bec616c6364939642b8e70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5047b74238a0ce6d3a1fb3c54df20fbeb
SHA15cb128abb900e94e7cbf6d62fdf04629cf7ca71f
SHA2563c84ff5c139256765463cd51c6b8403edecf95381f2ab41c9f58a8c3c4b3f2ff
SHA512092c4ece4538b8a3a0d34053e05b89985013dc1c2a6ea2a4b403359deefcadddb70cc04d163646ae97437e72d7b6c0029f7979a77357e816938401d2cd948f51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b60361c33355ac29762d3e4d94f83349
SHA1b645b5da5d936f9919ce0660ee8a445a72f53d1a
SHA25627169f19a225d33282bbba443c1fbb9e2dab1331db037c90dacc81aeb9b84350
SHA5123d809c69f5a8fb92210d6d359e9ff722a2064290b3269e9b7d6f13a8a5392de467ede893d4e3721f8b9ab7a82d5ab6bf484990a6945f707706b63f69402b0e4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578e7e68412a5d2b310b454d422624e12
SHA19e4874be2c361e806f608f6297faf191e923f1f0
SHA25688be72ebf916ca6844600851799676e895892d0658481d6fa023377b2e6ddaa8
SHA512382dc2b836ac5202d967749e87755e35b2973162c06274c1ae4ccc7e3145730caf8bc883ed9f1cd424f61c76e2e166c828a5c615a39bbd870ff264132b1ecf61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f153c9b5f2f02a79a9de7454d968e6e
SHA184801dace17045996fdc9bc4faf3e91a1c29a0c0
SHA256fb94e6d2a4efb2173712e8b25f985b2a36305d737c11317444c4b7dacfa9bb56
SHA51287e1e201f2f954da7ac7b57387e86f891c5fd6d99bfe1bab11d7f19519a056ea046bc3449725ce38c47f46429ca0bda41ecc009112053fdf6b458f10e61d8aad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa93cb708a94c501b899e24cf53b3f09
SHA1708d830864255e76d0d2e4be8465b462b5e7e8fd
SHA256c83b5b5df2d15e4ee96443bf6a07ee011d19dddbabcceff81584181dba910a17
SHA512adbd0e159a1926671db861b2c6d23ae63f477b58bdbbc6800f07fff572299c25accb08c12288d932f94728cf19ab2befa0ff9dc40e192139343f4ce2189b5ff7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f425f48bb1e0bf7cdd5a3854234fb8a
SHA1a385f6af0926ffdb49021c68c8c588e5cca55ea3
SHA2569086eaa754c280dd6913ebcc39c215274b7d63f984311c3fd7baa225b8dc9493
SHA51230c8237720feb36442be1fc3834af27b930fd78d14afbeb6f781920de0454df25fbb1498200126fee9d04802cff82fadf9039ec9ad5331f1fa5d1c15bd60dd04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddfa08de674be44609e42e43f9f3ba78
SHA1203992de2042fb4f4c59a40afea466342f27a4d2
SHA2568da36df084421fda97296909d6b7afd720987a51a5d661e64af5b02366ccb97f
SHA512e1f2b41a5a682b5163b6115956aabf7047495a893640961ea30bd1d944f0248b521cf625b793d49f58a4a9472ed5571257618d98b8508dd2b986aba56496cb71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c7289c6a09269a1998503389f7e6d86
SHA14478ee0ba061afb705a79855101ee94b48c8d63c
SHA256fccf65a1a372821e2dbfe816daccc05bdf5f6b0940e44f150d419f3dab6a069a
SHA51265c6aaf505656c1de33b696445eeb432c1e0cc5ba2bbe088e294ceec41dc8bd8148ebaf5d4d71103be165c452c7f848f98eae213adbf0be3f8d2e5602dfa2676
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0332daac3a27064995d775c39d42d4d
SHA1127281feff3d215aa5fe80f99eb25dee644f79e1
SHA256e3a734d4c498995d1c8c3e5b3dca8a16ef3092cfe1c975936e2f01f0e1d7a801
SHA5120a5bd15cc31c15d3539d3b234934c06b70029b9284f134d2ec0caa0214fae46ec45f1203873c47c6153cda4ab6e6cf8c5e3dcd3dabd2a235ab420ddf4085bc65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57279e7e0e24f4300f31b305ee13629a6
SHA13af08060891656057eae62e12035a094df46296e
SHA256d52e497da35afa013308a066e4e46f853979eb3a431805542bfe38aea86062e5
SHA512937753c6f80bddd37d0cabde24363fe192b8d668ae107e8e3c813d761d6c77827cad5992990de34cd86b223349bb3798f7f2ed117e6a67c6dd430d042a5c3e1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567870b760bae5dacd9475c7bc327f1fb
SHA12e0dad26dc17782ba4e816461fafdedd80ccc189
SHA2561d9782577ee10c75ca4d3dd1677b4df0f7c226c684ba68695e2e1fb4d58d8e6c
SHA512a7cf359c87ae9c1d4f04caea0885846138ec850589deb9281f90c20e441ea753ded715130bcde190d95bf35f7092742c6851616ab50fc5346e5d8b7e783d22c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbcbce362de67828e71413768bd4972c
SHA18d95b6abc5408fdf81457306aa180dfd0df6fc7c
SHA25697bdc5c8532ececbcfa3286c3e12ea3268df0bd677d2e253ca26ab472c36a455
SHA51265ce01c3cfa53483c2e2dc8843f9175121b8d0d67b08aeec00ac9b1eeb31f11d2a5dd856e52238c8cb65c329cbb1f07427480102d057ac372fb110b8a7176b70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf076176ad2510d98a50c4d5f5112c44
SHA105d84d227764d1409b42f60db71c18fe4513981e
SHA256fbca96bc0f7016f41c6e6c46f47a5774cf9b460dadbb9454a442afe5d65c213d
SHA5125d00b5539326eaa467e4469fc2eeb55a75bc16f831874c9e024e3ef34850533819051225283dc59135e81957b70ead256dcabd339eb4891def1ae8a2262c680b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3396a57c62ebfb3e4a8026ecbd1dfb8
SHA1ea42b69b9629c1ec2e49fbb5f237e506109ae5ef
SHA256e537732f9fdcf2e53f0420ed577e8efbcdef7b41bb1d1b139c961898b26fa63f
SHA5122c3408f18152dc0262e8b2e984317c26f3be73a2f1e218a413c0073008688b8d97b6868d11138f6fd7241c8c6132caf61577feac877dd41f296e78dac8998775
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4081b3e4dc6d9007f461a26d9bfdf86
SHA107ff04a408a4905cee13e095df10d23edcd7b128
SHA2568ef72a6c78eb3a9f2252d33addc8b1efa3b775f6ab83c0b6a27ebea801c21308
SHA512c8241a03095a8a7f3925f464379bb8ad3cb641e0e534b3d5906468792d1b1da7d5b20de3e214d219bedcf008ffac2ed21822a87f2477abdcb4e7d4512168e351
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8
Filesize170B
MD53225d90fdc47f6380d64af73da6f87e7
SHA1c1ba122464e0635b20c0bdfa58b9d067ebea4484
SHA2560362e02832ceaa366b5d8c031880b07f33eabc2c55583272978ac31fd4a5718f
SHA5122a5f2b98a39f1b73a14abc6a0c5e4b8c7924500bad5c785ab0e9cc6301e509a7f7bacdc253664be2f1f138a661f9a37c45c1c93aca2c101dd05ed832719ed77e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5b9e1206da6410890c1490d7de3d98ae5
SHA1b122c06118343c36053dfab09609a76950484276
SHA256d186f8a5ab1b2225f55c6cbff39e150163b6dc68d15b208d2bcafaf1fb254217
SHA51264c16c57129fd0fa98b7a52c687dca84061ded26e579c68ccdbac18e206f85a621b6d65e1b73e1314c90fe462167b03c18b82a8b49de637649bfdef251450e38
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6G4X5UFP\f[1].txt
Filesize44KB
MD53f07620af5d3007b8ff4520a89a81398
SHA169c2d5b843f4d4a2e8568d477cf20f991add7dd5
SHA2567024d7c78658320903ad9a8367748cb842e98d57751dcf828d30a312dbb032af
SHA5121b2e9c4a90bd7e7b2e84759f0b5f4f471c1b431572c774be8ef243ece9083e29f2b211f0fbea3f8b27e9a3fa0459d45e1332b26bdd479527cea53ee6929039b8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b