Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 09:12
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e2a131a04d3245f614179a7985b82950.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e2a131a04d3245f614179a7985b82950.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e2a131a04d3245f614179a7985b82950.html
-
Size
141KB
-
MD5
e2a131a04d3245f614179a7985b82950
-
SHA1
535a3e32ad95bd50eefa8145a511a0f804f36cff
-
SHA256
4d125cf1fe381f0972fa7ce390c1c37cd6a0a3a5ddb87a68a2ccfeba1d4bf249
-
SHA512
292e40724c4252dea7a884ddf3280a4db934a58b0a18d9b3644c0e440544e78a14c95761bd96668e21c85852d95445caff5cfa8625d0381746097b5f43d5c6ed
-
SSDEEP
768:QSbJEXyCZEfc93Z1jCv6kdAqufZnVVZfC6muQPaEDLfDfF7ws9+w+iyy:QGJECCZEf4CpqnVVZfC6M9f5w9w+iD
Malware Config
Signatures
-
SocGholish
SocGholish is a JavaScript payload that downloads other malware.
-
Socgholish family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443526227" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B1B611A1-D70E-11EF-ABAB-F245C6AC432F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3016 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3016 iexplore.exe 3016 iexplore.exe 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2704 3016 iexplore.exe 31 PID 3016 wrote to memory of 2704 3016 iexplore.exe 31 PID 3016 wrote to memory of 2704 3016 iexplore.exe 31 PID 3016 wrote to memory of 2704 3016 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2a131a04d3245f614179a7985b82950.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3016 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5c9be626e9715952e9b70f92f912b9787
SHA1aa2e946d9ad9027172d0d321917942b7562d6abe
SHA256c13e8d22800c200915f87f71c31185053e4e60ca25de2e41e160e09cd2d815d4
SHA5127581b7c593785380e9db3ae760af85c1a889f607a3cd2aa5a2695a0e5a0fe8ee751578e88f7d8c997faeda804e2fc2655d859bee2832eace526ed4379edaa3f5
-
Filesize
436B
MD5971c514f84bba0785f80aa1c23edfd79
SHA1732acea710a87530c6b08ecdf32a110d254a54c8
SHA256f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895
SHA51243dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD507970c8fae03a97e969a6d27ba6f6e94
SHA18f10b393db01a6f8659b8f262d7c76f466275ae6
SHA2567ed04188491014cf797d28863053e1f087d9a48d180bbdbe95bee5b34baa4adc
SHA512e5aa310c9432b7b0d99fb59f4b140395e732d7d2dc57f38c00c6c8ef08f4d8ae02940cba15f7c69bbfa7077555fbeb202b0ad9693a4d610608154b3134f2afb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12
Filesize174B
MD50210d5ad70e3a985903b3f0d4b8af114
SHA125ed1cd830539fcd657c8af3115d80af198d2ce5
SHA25643a0b6f4bdf9ce1db34c9b2ec777b71ff3278a06d223ff40eeb929ffda19d611
SHA512f368e22d8a3b020dfd0d0786d4a1e937118bd9b38745d64874a8899d17ec66fb246b26d01fcdea29ca35b00b7e2861a00bd91241d0614ff930e7d15921aa0c1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514d961a253c65a582976b8c8f5cd814a
SHA118513b881506702dcaa11c7fe1abd5762559848d
SHA25694e0022ae7418fc298df8aea0cf2a8524ea386b8dfdd6466d649c488fc58e0f6
SHA512054b1e4789f16f4d53c0855bf1782b1b02d6bbd348030e3f152817dfa7e61331dcbe8a463deefa5abde49c23ff9ec8d195d5b758c5e323f6e402197f3f5a8bdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582460f71b5156145442d075d33248dea
SHA13dbef44fc74d097a8a67a9fa9bec1c15c2a02da0
SHA256ed3616a299e9bf996a856550fe0e8a9ad33068e9ced2eeb51d53bb027cc023f5
SHA512d5c135666aa878f701c6d1930f338fbd9c48d5a9cf4358178a195a1dfa3516e010dc12cfd2e884b1c772799019958b9e1b821000d8acde33f94c0fa948f587be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53919138fd4e91d7876e9e91d535b2d27
SHA1a60cbf9afe8c117b2d0b6e064016f7022866f640
SHA256e7eaf41796cbd251e5f649af3fea9206c3e9a428bef396356971c38840bc7a05
SHA51287051e41108653ad055efa5f079546b805fdd96931842e88535111834259ce063280e88cd45cf537d7599f1f26f8d4864b94882960859a66270b9f6f0e2a538a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ad582271e33e4c94aa84994866d978a
SHA112acf48901a5db5b378d77133ddea08433a0930d
SHA2561259a1c2419b3fb704dbbd3e07ed10c877923f0f798a362b54d85eb8206013ec
SHA51263df9e89953d62923dace44e2e1caadc4dd624ea2715b42ddffd27f1dfeb6fbfc8dff92bf8739c0ede8737c0b1d24b12f68d8d6a1145172b816c87ec376a2fb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e922e3dc1f9a4cbbaa7c96c19fcf6d0e
SHA158a7ea06717c7a536d71a734426a6f057f6566d8
SHA256209e3c4c057ebd43baf42971141fdd03e3dda613f780cadebb32c77acf3c10f7
SHA512d4ae7196333a0d3e1e059a768e8d54f49faca9ba594ad16847722a0715cd4acd30c88d8a8592792e5b5b1fbc28b3872d10c1c404d2961e312a08f55d9d5888de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503d598b5dc50ed135095d1ed456092c4
SHA107cfd640cf2d1bf35971544fb891db19c457a1fc
SHA256ac62a6dc893a5f685cc852b11fd7369d620aa868c0222a7591ea6d07c6b40661
SHA512c91efa695d6cf4dd50b53d0b0c76d4d130ff1c289a4741f72ec9b5ddce44dd9f074a8795151250d91ec580922bd763a264fb086e75cf6d8aa6e2ffa9f02457a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bfff3551080be7f03728eed974b77e6
SHA1ab79e28c9ee9b0f70c74902d5d08924e5aabc5cc
SHA256af736f667097ebd7b24e11d5f647099542c70a18cebeb367ad0760819767d477
SHA512b6e20d06b3f29bc30f23930a9054f621e13920026d80d144dc2c7d53eedb056ce1f7cfe549d812f90de4bd57e3b8fe0bf32a77c87b258ec52ece5bc102469821
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db4ad434440ec8bffa7e536f26675837
SHA1a4ceaac98e6e7b4fe6d0f14e34bd3b5229846ba2
SHA256b1e90369d4acfe511014f105b80b2afe3d7fbb955c6d12d94ad5e6d2bc1e9ac8
SHA5126b84627c934e0a4dccd899124dedcd45c5a06beb431ba6d69d999bef489d4b46f2208d6bd940dab50abb99d00aaf5c82f6800d428119731ccbb85510adba558a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f909015d151984430612d4a65f438e4
SHA1a133b825be614ad8a43eee1b80a2efee71be7b00
SHA256b19e816a638304e3cc1ab768248202d563190e16349957b6fcc6ec1fdd6e49bf
SHA512bf2817164e90fa3cb2a06af834053700f52dabd8c64c8ed07e7041c7c4c41b33811b20d9e7e5eab34c0ae222c28f5bfd6b3705ffabe3b2914e7d75730d85cd46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e951c938989e0c052dd36ac77869134
SHA197b210392a3ce559b1e932ffaac0f3df4144a14e
SHA2569228cf498224000153ab5173f7c3fea2fb03b8a6bfc756edda6c5bab4b751057
SHA5120f4e0fde2dcec5da020eaaadfd4de069010a0f1457c5948cac2e91e9b161d3f38778c2d1d2f06efe02b1f9dded00891d98d5253cdfe272d8b4fa8e0ad25af9d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5502060ad7d7c38cbadd584aa2d4aabaa
SHA1cb04cd62e626b09baab9348892cc07bb990fc71f
SHA256672d98eb8717a12f345e320a82bcfd42530f7d324b66e27f9bd232d964fe3681
SHA5126537fbf25910bdf49d604c75ca3295fffa5f1eb406e22ab1564e6bd0b876e2467978fabc29994e7e9c30dd474046e3f1d99ca20948811fd99636920cd8afe574
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5255854cc3d0b46f0204eec8c2c07568d
SHA136770056c059ef9c9f0f1dd35ea5555d52de46c6
SHA2567499ad9c662496851e7475628aa1ff7484b501398591a71ed54ae79e104665b6
SHA5125902539e8c888d3def98b7b1f11a5dac48b87a7a21b306107b566e283f4d574ed7bdd638cab056925c313342c16dd6ec58b7231528651e5f3a855412942a2e98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eecf0da1ffc2c913eee8133f3b8787f1
SHA1a2a5c5228b9a94a907411f566486cfcbdcc35a8e
SHA256dd27217c784a3a883293b95e3cf6904d2411cd88125d2594f0312b917d0ecd96
SHA51236480b1c00bf853dc909ddce626a68c6ad5e6a4e9ea1bdeff843afed4898750946a7e73acc0e0d6a9ea9d7b51d96e606d813bfd6b9eff287ebbf76beacd66346
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da9d860915f1ae4dc364478fd001a53c
SHA122c60c371476d7b2e28256186ff87d0dbc46e1a7
SHA256dfb9ea8e7dc5ba15188d39498b86dfcee860adb0cc7afb17617d3a5d46fd6e0b
SHA512ca63ed5319a21cfec9cfea6d1d9f2f37a3328a8d9b7fbd8016dca6e51b1df1ee19acd21904c0f84f6080ee3458fd6034340120e179413ee904c3e1a7e9198b17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a3d1dccc9f64d0f6ee234a897435c2a
SHA166b5153c4b4a50f4acd61b1a7abc084b92d0abc4
SHA25609f503fad2a991e38d81561398591114fdbdf49aed4e438e9215e517be25b286
SHA51282cf1e6f8fe60d499705eafc8a5f7e1ac7db4befda05154d077a0523a492d5cad5ef8edf60383d7c35205a790147b4d810cdba13ffc4afa97dfcaa9365f8ffd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bcedabed091ed26252f73ffca962edc
SHA1ea34a753b2b272d83abddd405cc4c3f20f7c6aa7
SHA25696339aa54f9fb2cce8d6db69985ca4014a682e8fc6cc91d03f699c32d66cd449
SHA5125ef2da97fab687d43b10056be982ddb1aa7b30a55cf79b2ecb4591f7a05f0cb44b801fbf06e481965d96bc58324b889dc9605a0619ef11310f7e125c5fec6697
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8
Filesize170B
MD562a84bdf9b3680ee6564a8d973808432
SHA11800ee84fa6d264b9cb89cb676c68069cde7931f
SHA25685b90c507f72fce9a5b4e5335fab7c798e9fab68923557ac7596ac530ec7afb0
SHA512fc3f6c19534247248e875535b0d0503690f29ff741421ee814522045c835692e6269cc76af5b19dc9fd2eee4d54f0258b6e76dc9afe9b09f8897b4a4a5ad8292
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD59518cc9fa64d38ce8eab725745d6bfae
SHA1bae36ba3253ab836c7ce809bb1ba7586991deb5d
SHA25672c5afb68cbf628eb442caed6faebc4ec01191add60e2e4b51e4dd40a4a204c4
SHA512c3017e7e5196b8d8a3c579139f230601c7840eb8fc40d9d5ed49adf402f930094a8cef607dbfbdfd61164fe1be5c495bb082f862f593b26681e2f8827f49be5f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DJB1KT77\f[1].txt
Filesize44KB
MD51a9515c42300ca514386a579caa95f8e
SHA1e16a305cf433aaa2a97cdbb9a30d62a87728c9a2
SHA25629898f6d1fd46d94e5ad2bb5e2c25668f67689737b39730173fdde969a7a30e8
SHA512dce732180d9bd2877c7a82961bb4e8315a0dd722f8934be830c77dff7b7359949f7b3e3c21f47218deab5ee21c6444a2e000532309a3ebee126854f551690bb2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b