Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 13:09
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e8460fe4764a73f1969db241c5729006.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e8460fe4764a73f1969db241c5729006.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e8460fe4764a73f1969db241c5729006.html
-
Size
127KB
-
MD5
e8460fe4764a73f1969db241c5729006
-
SHA1
8fc034e4d7de4c4f152704e5b461506b860a1c8d
-
SHA256
4c5fcc3c399de5190afd02c317c6ae87ad53bacdb2ead04e54424f2ae91664e9
-
SHA512
2017443ee4cc5fabac5aac39c661eed9bd69ad76514ca465c0d051815d05193be302df94b466fa3fd99dc877e8f60ab0edc0076b7ef7be23c1f1742892ff1070
-
SSDEEP
1536:CXJEEJXFM4KCjanDD9BVZfkjnJKlf5wrw+it:CbJXq4KCjanfVZfc8
Malware Config
Signatures
-
SocGholish
SocGholish is a JavaScript payload that downloads other malware.
-
Socgholish family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443540467" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D96E54C1-D72F-11EF-AA9E-527E38F5B48B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2172 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2172 iexplore.exe 2172 iexplore.exe 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2804 2172 iexplore.exe 30 PID 2172 wrote to memory of 2804 2172 iexplore.exe 30 PID 2172 wrote to memory of 2804 2172 iexplore.exe 30 PID 2172 wrote to memory of 2804 2172 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e8460fe4764a73f1969db241c5729006.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2172 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5c9be626e9715952e9b70f92f912b9787
SHA1aa2e946d9ad9027172d0d321917942b7562d6abe
SHA256c13e8d22800c200915f87f71c31185053e4e60ca25de2e41e160e09cd2d815d4
SHA5127581b7c593785380e9db3ae760af85c1a889f607a3cd2aa5a2695a0e5a0fe8ee751578e88f7d8c997faeda804e2fc2655d859bee2832eace526ed4379edaa3f5
-
Filesize
436B
MD5971c514f84bba0785f80aa1c23edfd79
SHA1732acea710a87530c6b08ecdf32a110d254a54c8
SHA256f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895
SHA51243dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD53bd37ca745e09f816d93bfeba02a8203
SHA15ac61f6aa7ad77a81577d3cb12c029878e7fccce
SHA2565268e5efd778c1c55bf426dd23cf2a01dd7e456ea132efb4cc1410871b790da6
SHA512b6daac4c8f56d87605ab79293c0cac55cc61f135704c49c7d3336ac1f62348976ad51547fffa54a7471180ed20a238a73c064ff10edf9522e62281e98eaa674c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12
Filesize174B
MD5c231e6687dadb57ac4d461be1187bda9
SHA1d59ff3392c31fad3bb97402ee87753fc8f0ca4a1
SHA256b199d72495e87fcb0e57497dcd0f61aa4b0b0d245ef668f19a1a8ce3a7e6a8d7
SHA512ef801ddb90f5d3af710bc2e799b6e5af1b7348488d901f706f833994fa5da22c3f85d0db002ddf308b37e0e1102d02ece819c4fc106e78a1f334dd47514d0d97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580d88286518b1377d6b4de7ad242118e
SHA1296b8d6e90cff0a694a326f419e3c3ee9a15c786
SHA2563b519079612845e8547e5a9f9b1011f0d07dbb00a2c17160f065058fae62f091
SHA51288b7e47e70a84f8da35000b19c098ddb54fe23c5ac65e0cbcc54a7ce0754225fc70539eb5550504792aa0e3e4eb4365244c14d66653114a60a416b20d4e8906b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5547280db26c1bff27ba189bdd906b5c9
SHA128695a255ab1cc5a79a157030ad3cbf32218e700
SHA256dcdc2c28ff6293e053bc8268120251d9f34518d0263d569504b11f0442afe954
SHA5128ff0b9c218280830a7d27a4f086b5f11e9a6eee68b8a7cc31f763c8aa2c3ed0e569303db2d9d3548cfdc597979dfabb1c37ba355a49407c953472b6f6c2a5eb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fcca29d1e8f58dc8be58fae8d895b23
SHA15528fe1e13332fa836c18a7a6039c805a53c84a8
SHA25614c96af15f1a82d368a7bc25e80367d4cf65dde3b258ea2897ca223e98540c11
SHA51292e7b94eb6b080f0333faca7f70039d9d92538596b58d52c4bf866306010f9508ab54231ef4faa0161dfa10da8a619601b917e8c4f99d24818f93a4b29cfe29f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ec8b49980b1a08d7fe68c4532980d5b
SHA1eb2fb76626531c95e204952335bfa6685772a13a
SHA256f1ce00c37e14b8f4521baad20e175a01c349d844cfa63549cd12359b3dc4bbb1
SHA51290c4c5d5257d4cfc3ec58739e8d59431c484e15d190d12a58aa2833fe5b111213e9035e4cfaa8ee068ca9304a119e56547aeb841c25ad036c3883dc5711c5b18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0b26067367673cc6e38ad6f7a004fce
SHA12c8a1dc638ac0dba944550662bccd555dc4be39f
SHA256d9c6b23275fe74d29f12e2327c83c6a52732a3bab2ca95f9bdb764db687cb3dd
SHA5126106d1f1ebccfc1b1802db2265c33df38d85e62e1d550a8a0bc1aff05aaef6443385eed8346b006d28606cc4831a64e71a98d13ea754a714f3ae3eb0871e2b58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b0794f1e17768b3a57fc809b4e1ed3d
SHA1048684f3c44817584847fb1e641a6e627c15fd23
SHA2564f79d515dcbc0bf0b849f6a3733672939e26f83ea03588eb100f9e9564c2ecae
SHA5121bf9376f924b75fff271300a674dd3d20af14ba69e98edfe2becb95df18fb30b2717e40d65f0d59d2a33f76ca2d8a4d590f64b6e5d9047a2193f7b4d9c79fdee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ee6b70332ca287c7c2f1308ed5bb997
SHA1157965103e17e9639e8b771e68ba8b85373702fe
SHA256f2c79e5fe1de409df359216f5e721e560bc01235aafa53f7ce95b5c833ea2911
SHA51204e2ff751379ec81a284dbe1e81066aea1c8f600b8261f05499d343e7e0159251bd57d13a9375b8f87c52502616c6a635cba615986e4c762295c10e29f7b3f05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57346ec9b685b65f5f42a142e2b9cc872
SHA117d0e883bcf2228035e38f824463a736d71abd7e
SHA2567f6ab5d2dc82933c845305b20a5cbbcb1906be4554418da12ae3fa63ca5218c9
SHA512da04d16e03653f6e9a85e3aefe2d3c65c99bb7e4777489e9c3da9a8ecd5b16546faab1910bd011fa6f2617123906df017c7b49ed10d9e51f45e828d140c58482
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9c2b5d57ab3d0c2cbb8d78a2ffb16e8
SHA1968790a653646cf06095484ccaf89fd0b8db2332
SHA25672838988330105985a20a3d2d46cbffde14acb32699b00d88e56e06478262c60
SHA5120179e52e61ca8ff998ade80d31ecc50d425f33a9e97c438766164abe9a7621f8d4b343ee236af2faaf6e9b438d85e7ee2a3c9cf24fb0a3ab7ecfc014afcea74a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf3be8dd50327ea36c51d6f1f935050b
SHA1d93d49a16d8327242675546a76a0ddc6fe845115
SHA2565e57a651a240348f8df131573fec1aaa5c585b87e465d2c55a03a46923a44278
SHA512a633dcc5dad3dc439454d8361b7d8033ab835f11c7073850035d72d26ed914208e63d117daf255e5ca28b2390e3cc05d8211eb088058fb43b6cb791719283ab2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c2bd8751785a67e779705463b4d6dc3
SHA19953b5e90caf02c2687093d2b3fb3f3dfad5eb53
SHA2562a64968c0577d60c13e3b3fb8d8b618f9e76c86fd45a3b1883b614ae260d17e1
SHA512fab2968bc55302c79c21d1395912275b5625ddda299877c106659540b298a1861d38abc6a7a7aa80182b856e72ebde2c9acb53f569a009e7f17ab3e14c3d3d2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506631ae2b9cb40d73fd62339c92f3090
SHA1879297341a520daf0839eeaffc18b53b51a3624b
SHA25626d1f9e93aa426a54628965af39efe5785cd4729c36ab72446ccda9f86fee392
SHA512c7bf7bab380990f203e79af0fa80e0f2e6de1761d8baac8bc59d14bf9a07ff1af671f7bcc24683fbbcb8fa4bdd13c100f81ba8433251afcf1b3f1016ccd3a2a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb7b880403a68df3f38dcbfd25e9b25a
SHA1245bd753309cf4afc5c396f570ef2a8392e8ecc6
SHA2568e724fbbe14b8b62ef05796d053c93b498ca882abeb5bd1b4c3156f202f0de8b
SHA512e29dade9080dfadef995f7e2d36eb0053941ea4e0e2995bc0579691d04c0c36d67d15970585164ab5b0fd8d372fb52483f6e9d13adc20aeb6c1bc99c93d42965
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559883de007301fca9711dd9c2669db5b
SHA110db8b24e42fa3669718e3fea110d37dc8ef1b2c
SHA25621658c937497ce5d8e42bae4f0cb5d739c131a0fffde1ff45e85f9f077aef44c
SHA512e8db70ff35876eafc53813054bf432bfbb5718cb6f0caf1c884d281bec4cffe370a7554edd2316f03b3e07c5facfb4fdb3a94a1a9a5634fe54c5de71afc8c06b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537cc4bed1073442ce6f674384d94d52b
SHA1640888539485d543687656c36d52454a9f346377
SHA256f7f47e09da61c9f8f95ba5713f4fee226c03e46e2183583235099c485087b408
SHA512a3ca86121401237c42d24c6f709ffcc03cd3ec69daf54988d8ba1f9c92fab09c32815e84e3f4dcffb33a8c48b3ab252290a642e5f910c473f986ed282e69363e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d90d487f09f897eed2dafde3f355a404
SHA1da24846348c54893869a1697f451dc1fbc916e78
SHA256bd9cb153501b45eeb53d05d251b9897a71b8c043e491c86e4dc7207e9d7eed37
SHA512d0253241cd9b6c0c24a4afde64c514d5975701e8d5a0a87f4f64d363c5b4d0929699fde80e5159dff1cc691544106013c6abe09a7eed3322aaab066ef142e4fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8
Filesize170B
MD5408cff4e8910fd954d4b206d9bef9489
SHA18cf6e9de30aee8d8db626108afe572760f21b87d
SHA256c65af1ee0823d4eeeec6861f2ca3f71c520be2f7580e42e31c34db7695141f0e
SHA5126596c3ff007bf6b66988b469730cbb231d067310c1b4107d5eab6949ddf24120dcd1174c0845f718d2c1a3e06ab280c5dd39dc26f0e9b0ebd27da0fcf8f277c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD58323254a3b543996e66936fa786aee94
SHA14d3eaac01681691185050e0d8a95ef237d5c38cc
SHA256051980ad7811890c3637bf87ecc3ce46e1c17c01d9dca30994b70d5baf1cdfbe
SHA512a183b5e1dc24ef58a2cc699d767a2b5ecd628e347cc170c492f2b6a93bced17e21c1130f9fe2da9ad5a41ea337d6e56287166e7faebed48e3335e65074f0ae30
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Q0WBLVJY\f[1].txt
Filesize44KB
MD53f07620af5d3007b8ff4520a89a81398
SHA169c2d5b843f4d4a2e8568d477cf20f991add7dd5
SHA2567024d7c78658320903ad9a8367748cb842e98d57751dcf828d30a312dbb032af
SHA5121b2e9c4a90bd7e7b2e84759f0b5f4f471c1b431572c774be8ef243ece9083e29f2b211f0fbea3f8b27e9a3fa0459d45e1332b26bdd479527cea53ee6929039b8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b