Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
23-01-2025 16:05
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_18dc3d873432dd2c7abaea4f61d96504.html
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_18dc3d873432dd2c7abaea4f61d96504.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_18dc3d873432dd2c7abaea4f61d96504.html
-
Size
129KB
-
MD5
18dc3d873432dd2c7abaea4f61d96504
-
SHA1
a77f67346d942c9a19ca8ff5ebe2c94b6dd1fb00
-
SHA256
0f08445823bc1ea0d67a702920c8785bd25d1063ab259183307465db67ededc4
-
SHA512
c8573ecbfd144a6d947a7ba58103d952a7a63baed1e450f73d4a826d7c4cb42d9daf72d11334fe4112d8e87dcd4bab177345025e68b0575013711a393b3350fb
-
SSDEEP
1536:bnJEEJXFioFCDrnDD9BVZfkj/f5w4w+iM:bLJXIoFCDrnfVZfM
Malware Config
Signatures
-
SocGholish
SocGholish is a JavaScript payload that downloads other malware.
-
Socgholish family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D8E0BB31-D9A3-11EF-8F09-6AE97CBD91D4} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443810191" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2160 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2160 iexplore.exe 2160 iexplore.exe 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2116 2160 iexplore.exe 30 PID 2160 wrote to memory of 2116 2160 iexplore.exe 30 PID 2160 wrote to memory of 2116 2160 iexplore.exe 30 PID 2160 wrote to memory of 2116 2160 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_18dc3d873432dd2c7abaea4f61d96504.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2160 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5c9be626e9715952e9b70f92f912b9787
SHA1aa2e946d9ad9027172d0d321917942b7562d6abe
SHA256c13e8d22800c200915f87f71c31185053e4e60ca25de2e41e160e09cd2d815d4
SHA5127581b7c593785380e9db3ae760af85c1a889f607a3cd2aa5a2695a0e5a0fe8ee751578e88f7d8c997faeda804e2fc2655d859bee2832eace526ed4379edaa3f5
-
Filesize
436B
MD5971c514f84bba0785f80aa1c23edfd79
SHA1732acea710a87530c6b08ecdf32a110d254a54c8
SHA256f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895
SHA51243dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5d0e52cfd76a691007f93b7ff3de45a50
SHA164fb0ba55f67508299067a8e286072192858da9f
SHA256dec13bd93ccc98db4aacc5b4fdd2aafec3166032df6270c8dde80d396478bba1
SHA5121a7785bf0e3eac2893ebe388eada183102e3f8bd1851256d0c6213ba337ef7e4da3cee8d5ff80c3a9444ca53e54f417266ca50be842d46306292d1a86091367d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12
Filesize174B
MD5959a0946d10f36decf1e31dc33188d41
SHA1a785a3a143bd6e084f06f45550a49c5a08e40187
SHA256c382f2a30907319e0eb6ae7c54e5f5ca6534e8ebc2495fd6dfd62b6b8f88377d
SHA512420617bd7e44f847b4fe4b44ae4560677e73a6319124329edc4d9c85054eaa5d40f3d8bd46b5953cb06828ceee5f171b19429071864c647365214087a9f9c007
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d23827dc07476cd8d13dbddfaba4ceef
SHA1a575e68322b1fa7b86433c0423350058e88bf03a
SHA2560c8b08e4d5446e4e6bbec8dbbf4b7db870efe4a4a831969599627c20fe4d77bf
SHA512f82e1ad686ef133466e5b9477383407d5f128543f118eb40abaef2563cfc421c3e4118a6032152a90ab23326e88399322b9840548961059177a23d49f5ef4607
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0ffb5dd20ec102a57f5b18dbf865735
SHA116d1f6fff7621396c83292892d34c00701b9335e
SHA256d297cf052f5b23cd0038d1f528e5f0fe0a6c3e6dd03a01a6cb73415c01ca2b87
SHA5129d5144f304f0006d29416ccd34e71df9f2ce21c3dab699a2e148a9e64d323144f15bbc728af8bfade50a337ba813b01fa327070d0c242af10056f08ed74eaa40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fabca54c500411192da4d0d97b288387
SHA1b7efbb89d78a0b847ebed149ea2501b7c3774c58
SHA25608307dd3deac59be77bce5ab7992696c109cfa9e600427a82f53a19a16a1fc6e
SHA5120f92618364f606d57692f03f076f0703028e2ad57ac5ce171aec9270b04b3d97985788544fb717840ccbdc2d464886b4dda1b882f6bae94c09cd99f391c9ab27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f84ea6f78ba084e289738944829a7194
SHA11e23bdb402af0b37ef8dbe5b347a9981d7c10690
SHA25696f7b080492a9dd4a5b6776528f3189197f1af9e4cb5d1013e660c1f2b6f15d9
SHA512a372968cde503440b4fff625dc971750c601cb38014cf35e96ba7ed5e9d7a0a97eff8777293c86c3a035bf79d1f3bf87b461986a4de02fb73418c5df626d194d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e43aa9c4e6183a1868b91df663849b11
SHA1f48d49a5bea4c5dc9a2ea931824fa713137aeede
SHA25639846b6de9dc53a1da8b363e2f4e8e951fbf102e89c6825b9cbd3255578ab2b7
SHA51253949fa1427556dc22018dda715da68c5f0a6220afa74ceff37150dddcca30bfcc441bf05c512a612ef9e23318489d691c7a523188220f8216d77973cfeef814
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592e94e2e6fac6150b7962f935e4ff5d4
SHA199b24a2eb30dbde8ddba0c030cc42eb06dc13564
SHA256bab90b49b4ffd52f6a22c0374de99b057584972f5d754db4836e981e7d8fef88
SHA512d3672ca22b20244239e665f430867cb1f77fb6199a6683d34ad84a448e38bed0dc8910383d3b77b296bb67aa5cdfe3332ec8848b56724873df9990fc2ee51e5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b87b1cf515b1851b5f85b16e9d1f4706
SHA1072ba8385378f15db1da5253016c43c3a6a1742f
SHA25645ef931553edc47d83d2d62987e572fc3c22f43dec6e15eee0a66b8f4170606a
SHA5127d9d01fb58b15f12cd4d088957fedcb6d9470e1fd2d57feec61bb344541cbb8cbd2c6ba9da9026ea48ec038ee878c6991a0f7056fc1ac7a677d599dae0d2d083
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55473f5b841c2b693352ea3fe28190c95
SHA12884c33f12ea105363098009d7437c692fd04ad1
SHA256d982dc6cd825ee5f8ed111574c4735bd04963c1034137a60f6e35815551078de
SHA512b9c4aba4061971dfeb9492c1c3d71cdc84fbcc9d6e56a797cd99d4ca5aeb67d7138eb940de70532bcb5146861c4a8af09f2d27234ab039d0d88173eb6a055863
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd83aa85d277a5f8332665ace14afc2f
SHA11f30edf6d1e152d4d7d3ed9ed92c01ea696a0934
SHA256933d60d20bdea1bad793b6f98ddc4cba048fab7cee05c7234ca82e165f4fee7b
SHA5126ffbe2adc5513a1dc8d74d5003de4b61094f11c6c11c2ebf6727e68ac438418b1611b1546c18b7bb330bc8620dce0510ca74eb9446e89e407de147f3019237b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a33d8706cf23270d877dde86a9d04c78
SHA1900fe2ed2acb7ab8606d33264c6e5a09150834e2
SHA256be9ba7c136280856ebd83923893955e5e5b2833bfcdc2b24c095ee03fc18995c
SHA5123a8f4da55cb9f4ecf7eeedac156087bdb5f1448171d6c09985b06733e1910530a634fa50d349d91043216cc31c35a2de8d152760b03ad87d5250b37e6f0128a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be72fb582707df4bd96e3a5d644b2624
SHA1b04898c8cff9519db63281a72275d147a9099b7a
SHA2567954fefb7f4373713dcf8060130d05886a9f5060941507d6bbcb83791dc9a3e5
SHA51219e008e2ae3d4c677c77778c2ca2393de6ff9e83a1466518538bd24d64723c1ca438edc22a0d0d0dd9e5a50a59e8a1c20bf528e15fb266593c256e7ab41eb864
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4276835626ee71d1da42797d77dd0a1
SHA11526a0257ffc0f6271a6ff95aaca425d423f76ca
SHA256b785413139eec10c0e29497529cac98fce8ef01433d929b8a12c887ced760019
SHA512838ddedaa35b1c0837c723d94c78bd91b8dc552351d0ef52ee2602d8e4e6d4d9259a07523819d221d4f8bc9d59a98d2cbdefd3351cfeb963734b6e19142af9d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a92f57585c6f10bad44e4de65409384a
SHA170d468f00db1c1f4945e47137820b9b490117d24
SHA256f9dff310e4ee1575601923219753e57922040ebb32053ea704e162b270391837
SHA5123a297ba1aa2ae79f57ce3befe809e5c720a4577c6b416d13faf92450162e6d8d07b4d931b7637a8f4591106acccff82363bb5dcbf4c0f60bbb5bef3792b49a5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567b75b6c5076a8af8a84018a592bb0f3
SHA130e9852b7b8a58113200766843c6f11d5e17504a
SHA256b8103dd27f034f0bb3f9f6f4ae36e96b8e541e4338f9f59907d392bcbd4f1ff1
SHA5128fc70a5ea0b371b25a8a676d4d827f4d91ad4d8f7d3db5d67a55bef95e065969d2c5a7d7716d4af50f34772080af3816da9dc66474d3e0329813c7fad7aab280
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8
Filesize170B
MD58aa152d84cadc6e4bd3e1c0d4503c2c4
SHA11e756ebb60e535fd6d214ed8c6eb78e9a7c34762
SHA25667ab0b80b0256f2e236a90bfc62f383d1a030caa16e16e33c25769a2b5e5617a
SHA512ab0f71de6675b739b8aadc52b565c289e20592ebe82317b09cd98a4f327b101b0d57951e5818f6447bd6a77d0f0469884e91ea8cde3b747a41534cbd0a237e41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD50f85d52f97772461b96b5f065774ffc9
SHA1bdabe8e63787a244e9d0bdecf46ffc6c9f09181c
SHA2561d948ccd9a8c0f197ffda8fb2c15d2516aa6c2c6126927c069b3c3a9b0462359
SHA512928ae62dccfc24162aa90a850b133344fed22b9fbf019dc212ad3feb3840fd4b610a19fa34d380566a6d7cd183c27d002e89dca500aacbb35a90572a657704ff
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6G4X5UFP\f[1].txt
Filesize44KB
MD5f9a0e376bd5ad7854de3d6ead245cdfb
SHA10f3f057d2361ce30a66ae5c4643ec03acda7fba5
SHA256e94032fa63f9d6c3c5bb133ecc99d2bc74aace8ec83409bdc54ecf160e3e95ac
SHA5121b21c396e53ed1990be07f24ebbae33c70538c28f9459e0473ba24c2108b56cfb2f7e3386562d722e23ea6a87ced42d4f1b90dd168af524f68d994d4e1505dcf
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b