Analysis

  • max time kernel
    143s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    24-01-2025 05:53

General

  • Target

    JaffaCakes118_1e871b2a3d14efa28f926106fff173fd.html

  • Size

    94KB

  • MD5

    1e871b2a3d14efa28f926106fff173fd

  • SHA1

    0125709ed4a13bb55cd0bb2be7682e3539ad7f7c

  • SHA256

    0b30c32378a01f3f2563508652024af88873716cbc9341210501c066a864bcd4

  • SHA512

    573f7e8ed70c5eb89994924c3bdeb392f62a70d6d830b54c003ccd7954121a0d6751dd2afa0c0c2edae2b68ef6fea42183d54a32172670d9d1f69231de7b5e1b

  • SSDEEP

    1536:D9hAiwtLpRodRhMFP+F3J9+VO6nzXPn7hM4odRh69hldfdCR:D9m1tlRodRhMFP+F3J9+VO6DodRh69h2

Malware Config

Signatures

  • SocGholish

    SocGholish is a JavaScript payload that downloads other malware.

  • Socgholish family
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1e871b2a3d14efa28f926106fff173fd.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2392
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2392 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:276

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    b5e1812ee2c48c384b3c4a99ab443783

    SHA1

    c96c0cd4dbc8849461208a7159484a9c2e829175

    SHA256

    211a429a81fba63270da862b0af48748d433684e34f48b1183333dbc25aa6596

    SHA512

    f87857608668f31f274447dea6182c61b285fee15740c1f18fde96c40442d1700d569131b3ab572fa9c9eaee141b6ca05cbec23f04c999f56773ab84355577c1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    20c1f90e69d95e09acf2f6951a44ccbb

    SHA1

    74cb2418fdf2686f11bc0ecda5f3a0787d43b697

    SHA256

    847a9e467e25c6a67f3518c3fba76429757a74e0e2c4c84c764c543aec3c51da

    SHA512

    b05efbddec843ba9369935e3f40d3120a9041e972cf49e2fa8600b0c890a8b61f6e3709034c84007f42d06d8ffe6e22700c017d173e00c127b38a8e9b06ac4fb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ef44912d087ff127839880c1b7051940

    SHA1

    1f5e74bed58a58a70dcadce3da305ada00cfc638

    SHA256

    6a62306ac02f6cd313aef75cae2974c4a25a81b9ab0a6caf6403bfb57d85da04

    SHA512

    679319a5e834c4fb2cf4cbd499f2041bbc8212c8c310e4dcb1366aed1cb5d717e9558d60e9ac1b427b350451b9d3cb6f9394917bec693f1250d42f8f4bd3b380

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    892c6587e02f1690c263f94d2e2bbab9

    SHA1

    1317b3d59d6d7659f24b870b5105b9440c5332f9

    SHA256

    4cbc37930b55d3c9d23924d7a41c7bab99f7db4d9f48483383324a2f6101ef14

    SHA512

    e7ac851b57ae9ba2277efed60bfcf065141f7f99f0034aee6aa510a04ad94406fb8d5978e7256c330ba7fb61c115fedda26bc42d2851a132c036cbb84a558f2a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cbdf3af68e991679e10e0fb800279084

    SHA1

    73e26942fc641c45a344410edca4c1c05d04db71

    SHA256

    aa132dea11e11c7eec937839d28e238bc650ddc953506d7830c2673f3093d951

    SHA512

    dad0272709684d877b994f62dc2ba15b449b0273f75d00a5369095f6933216bf76fdda6f1b49372485113b57c56c6a6a96e27ae6b79a4cda50497126f716941a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1060f91e14aeef80d0fe48ad0c4ffbee

    SHA1

    be062eb9339b07a08d94adbe23dd81f89973ded3

    SHA256

    3068e26eb24bd0d74ab17ae8ac74dbd960672ceab807cc50b93f654707bb893e

    SHA512

    cc40521cf8a18386bf7ca4cbc6a9316df82952025982a12a5d5f57015730788e3feffb09e70ea8f1ea2f072762f236a20dad25a94515f7aac29819f1629a9305

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3a0d5a64f9c5b26b00cfea7b4c50cee1

    SHA1

    b2eaecf07df3dec725b1a6ab2fbb04a3416290af

    SHA256

    8de1585111e25226971bb79503903ae499c4ad5765895fdda928edfe35da0217

    SHA512

    445a54fc69301867f373580db9a0b8c97b7ecf6f7d277d6130de6d293c50caddc56d779abc8aa5b7e1cfb465ec886e1b9805ecc2541c7fbb76e6fa5a45b1d86d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2d5b44ec45b7d0803af6c0ad0938ff0f

    SHA1

    b066ac0a551262aeceaab610e822b0ca5d756d77

    SHA256

    81a2867ec002b322e9abd8ecc9e13e802889cbdaa11171e5322e59f7cb6ce829

    SHA512

    2d4ec8b3cf21886a8c22458894d2ead1e6c2ca36c67e593cfbfe60a3b6ec993f4c4c619673ea95face42d60c9a44af7f71fbc9cc2a8b72e46fa865662580d06f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a4e1eca91a31569a3c155d373e79abb8

    SHA1

    161fcbce23049c7f887e84716cd5a6a25a60de0d

    SHA256

    3eeb998d18c228767fe3d6e42a641b36778ce7bfe06f1080ecb568cefe1d7d0f

    SHA512

    a53aab1295a92b1be04b523400757afc75167430d60e4f2e019a05d97119531f0263a227c24f2b74a7b29c901a07ecb42dcef0085f5dbc9790348c034b65a20d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a5cc8548aee6e9ff36434f80f9a4fe83

    SHA1

    600565bad9ad7f58eb1267d0c9d37fb67ccf3507

    SHA256

    f9b34b484f1620b2cf7dd58161ad67649b6e00416fc6c79887a222c3aa2c9494

    SHA512

    9d5af1faebc9a5445e0e671cf460f8c6c30211f393afae9de16fc9320df450cc97fea927ac904a2973c4bb353ed852dde6d936e2d9b05667f1cd756e8098ae06

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    957350e0d9f7d411b3d92dd90bb8ef71

    SHA1

    ebbf29e4b0a775f64783ce761fb4ba7756c97eef

    SHA256

    6e2eeae02d705ba98f3483906662329cf5b8850444960207b3790ca79a919d0d

    SHA512

    7e655de785206b58d5d7f9ef9d0726edf70be08bf63fde1a41782917abe64b1c47dbbb4e3247030878dd9413eb8526d231ad40a8523ad127e1df717bff270f94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    53f966152ce1d5a010b8dfe413543948

    SHA1

    465c6fed060d0a20cc424522a4df3615e2e72a4a

    SHA256

    534e5b82d25e070aa658ab2627c9607145c84577b808b36a61f173603aa84f07

    SHA512

    4668a2bbb0fe41965af8ee3090d4a6c13da2271db7b5127b8b508dbd1753c44d928006be396f35799e08b23f5432f59a0006b13c6aa4bd48d6388e52125b7f0e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f2786cc2f678a8a1991f383732837579

    SHA1

    7e020f15aed8cd3472e1b21b477f499252f44d8d

    SHA256

    29c02d8b563fd03bfd8a8d452101c91d0c2be243fbbb6bad8b17ffc9243d97d9

    SHA512

    cb4dcdab7d6b53f53b3521ea0381775ea34f44b00d3a8fdd1c90017082c5c3185017752291cf3d2ddbcae8f1d30addc993feb7846a1630241262f736271143aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    000dcdc3b3081e48ce66dcf883e34f7f

    SHA1

    52f72ff450be870fae933b46ad9db1dfbe38d535

    SHA256

    80ee7db9e11560ab60233324e1b864a877638af63f70400ada56020c22f0e5ca

    SHA512

    eae92ff7d4167fe5aa295377b8895ddecc7abab6a36893ce8189b31b8ba0d936a6283d9816fc5e78c40ca8a432e783955bf526492b61cacb5a7f6d2872c146bb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1921046f5cc3dde498a7ab06f51a7837

    SHA1

    312e485ca8960a80e75e6cdf79db07143d4b7b74

    SHA256

    5e3f5b01fe673f127584617041f51535a17ecbf06a55f95d9b0db2b632cff592

    SHA512

    38ad7e3ffca5f16815cdb30fcfc1b7c6c25ebb83aa00e8164ee558b1522cd269d6bae67f9601a0f044d969661f058a00ffce8e3c6b4e29aff5693c2cec67e3cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8e7e3952454ed95ef9f63de20ead3baa

    SHA1

    55d5246c050b945e9f6a281a68e95b8553bea41d

    SHA256

    a68880729369177d9d2babd04e8d5aea171a1e33ba95084f479fc9d0f4b18987

    SHA512

    b6f4f7822c4f02cb094d41301327cceea19aa10f5fb4179c34f4e8b9f175d81680c4e1de3b5ef1877b02a183838491b8a89e541ffaba7b5ed8215309f0abd367

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    097873a7a7f1c2ebb6c656df54fa1c24

    SHA1

    3e950b4e03ad45ecb6d7b521fb95febf5c5dcc56

    SHA256

    dcdff8fb1a3614f50e2dcfd266f88e796d15f790b7e3f20b0c814ae6341278e7

    SHA512

    962a480091871dae536b7acb28fa50d82a3e6ccc5676b27d329af91ac3b5fd4a0dfdac612ab7099d1930fbb1df50f737440e5bb03ed05783e9624fff67e0c51e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    f8b3a085000fa1230fc2b32c6eba5f77

    SHA1

    d96855180b40664d772c0660e8582b9738039510

    SHA256

    8e88cfc263edd8683d36393c491dce59f3ff9991d77c4c39a340474759134db6

    SHA512

    1dbc05ffb1a26757e147952653935da49fe63a0d5856ce69f30e109f7e84a191005abc404875e61a20b5f771e764486c4d8eb2f1bda3892fe0e0baaaf8de058f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PLSLTMYI\map[1].js

    Filesize

    6KB

    MD5

    e59126a96e1ba595af2e42e303d93654

    SHA1

    cca80f6a1b02d47fae6a48fa1eda738bb555f1df

    SHA256

    cb7da864f896286c1c8ee294feeadfda93d79cb165f8ffb6168fe4b07826894c

    SHA512

    8247428b185f5055d17bd8d4fc7936e9478a274cf34cb35412076e819387b6a64ef7f8c1d92ef39e391ede397eca539467104eb3f33f49bbcb2b140d93660724

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\QS2MOPHD\3359293645-comment_from_post_iframe[1].js

    Filesize

    14KB

    MD5

    603cabb7125b0c9aa2d460bd02d5ae81

    SHA1

    cac11060496de4fa3bb9195fd1b42796577c6a26

    SHA256

    b295d6bf98127b6291fb91ae247b9a32622b3b3aa8cb8fa21aa480b846af9846

    SHA512

    2490bdc50cdb0eddd1e55574d18765ff9c643153e38c5b4299d36f305e4121930db86420d665aeab3d469fab6158684c5979bbff9d04baf95af7480b1bda74eb

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\QS2MOPHD\ads[1].htm

    Filesize

    114B

    MD5

    e89f75f918dbdcee28604d4e09dd71d7

    SHA1

    f9d9055e9878723a12063b47d4a1a5f58c3eb1e9

    SHA256

    6dc9c7fc93bb488bb0520a6c780a8d3c0fb5486a4711aca49b4c53fac7393023

    SHA512

    8df0ab2e3679b64a6174deff4259ae5680f88e3ae307e0ea2dfff88ec4ba14f3477c9fe3a5aa5da3a8e857601170a5108ed75f6d6975958ac7a314e4a336aed0

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\QS2MOPHD\maia[1].css

    Filesize

    42KB

    MD5

    9e914fd11c5238c50eba741a873f0896

    SHA1

    950316ffef900ceecca4cf847c9a8c14231271da

    SHA256

    8684a32d1a10d050a26fc33192edf427a5f0c6874c590a68d77ae6e0d186bd8a

    SHA512

    362b96b27d3286396f53ece74b1685fa915fc9a73e83f28e782b3f6a2b9f851ba9e37d79d93bd97ab7b3dc3c2d9b66b5e8f81151c8b65a17f4483e1484428e5f

  • C:\Users\Admin\AppData\Local\Temp\CabBB74.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarBB86.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b