Analysis
-
max time kernel
120s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
08-02-2025 12:47
Behavioral task
behavioral1
Sample
JaffaCakes118_c33ad1f0c09c7dcfb22a98ccad41e4c7.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_c33ad1f0c09c7dcfb22a98ccad41e4c7.html
Resource
win10v2004-20250207-en
General
-
Target
JaffaCakes118_c33ad1f0c09c7dcfb22a98ccad41e4c7.html
-
Size
127KB
-
MD5
c33ad1f0c09c7dcfb22a98ccad41e4c7
-
SHA1
1702a890ad2d9c9fb1958fa7ce96b1c1b0f76e3b
-
SHA256
dfd16e13a5d3e51e4d973a5b96b2c286fbcdafb4563b08622ef27b555aa35475
-
SHA512
f3420208a4a5427bef59c0b7b4fc59a2748168ef3fa67ad6c4f06eaa69853d888efd3cdb9ab65c3d4ad39a33a8a8d9f1a9e698a151accaad0499e4b840002ac5
-
SSDEEP
768:2pk1ATx+Bw24Tp7VD6giXhWcVI0Hoy57EUJ3uCmWDrODQPydd7rxq0pa7XE6cVxP:2HHD6ScVvo1UJdcFpa7XHcDOatWCt
Malware Config
Signatures
-
SocGholish
SocGholish is a JavaScript payload that downloads other malware.
-
Socgholish family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{37441331-E768-11EF-BA44-CA806D3F5BF8} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c073cd0d757bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000667b736a4104a54884c6a3dd56d4f13400000000020000000000106600000001000020000000f1daa87fb0edc0c182d8e5b81428f38d30515323ee8ab5bd7abd6c572d41ec75000000000e800000000200002000000028e0eb60d4e5043cf42603d9c1af82f2653889f71404b423098d415e96c2a75c2000000065639f4f0de362b56ebd8272d67c7c943e0ed39f884359b690f11e81bf16857040000000d4a1df5371e37f7141b5ce028c9a7abce5a6e94885870bcca7dd83c0bf493460aafa8599fa4097bac0705bfda9c20d7203247bfb66d915be3e35d9096e75d5e7 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "445323923" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3040 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3040 iexplore.exe 3040 iexplore.exe 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2340 3040 iexplore.exe 30 PID 3040 wrote to memory of 2340 3040 iexplore.exe 30 PID 3040 wrote to memory of 2340 3040 iexplore.exe 30 PID 3040 wrote to memory of 2340 3040 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c33ad1f0c09c7dcfb22a98ccad41e4c7.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3040 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD54a42683f10f86c60ac6cf81b8f71423f
SHA1b2c3b532e757f7dc3ebce48d946dc00bb6a6de2e
SHA2565df3780ed27e90f8a8e4173c1d1cc2774987387184493d8171664cf25bb0c4d7
SHA512e5fec2d69eaf9ac72410f16ae4f3253dcec5e390987ef9e5b84587018aa9614a409bd72efb02b55557759af4a94cbd008ebafa927261192a71039d4cea6e0f4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598c842e3bb2659a76c2c881ec7d88083
SHA1a244e6b9810b48dad171847b03ef93cb34ef7617
SHA2566625848595f532eba9eee390d0e83608de7df8f39d6ab89aaa87290cfe3db5fb
SHA51291941df2116326fc2b04ffe8dec66bf5d2dd6c86bffd460caf8e747afcdc89e407ac8d3bfd84db81d28c25250b36fc2ea906d67af298c3db314a5e1018cf642e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d81c1f87f26bd9184d769c58fdc8b754
SHA1804844fbb7149bc21a6d96807ed9e4de92bc081c
SHA256ac49294dc1d80e256c14ecb2842dead315e13ef33ce6d056ffd3c015c501deec
SHA512d056f936051ac291d69c0eb3de899e40de0369dea2f23da7e2fcbeb780f97f66f27567e2096ebe8ce39f0b5893bc6dd15c5dab59f45271ba3e192c66adca76ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f63e62f874030245999cb2c414c6b09
SHA1486b0bce764b8f42a410ebb4d68cade14e3b5bd9
SHA256b4a4b56d933da2eb8628d6ef65542e50ddb5bca0642c8a5c6bb0ff81208dba9e
SHA5122b3c2b4cc49d9804ddc2e5b29bfa08460f9b7ae0682debf7b59f44ff99c7eb68c9ecc3fef962a77a32539c6519749da644971e943722c18a2eb82d201ec3b316
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56485df8c9ad512e04b9e2f076177e495
SHA1d33fe36c6fdbd25cc49b4e62eb5e3f8b02dc43da
SHA256f455bbfa0d42ebcd8ca9b60a9b5e2921c78d193d25a015f08c75a64bc648eac5
SHA512b2820990f4c29a046cb2e0eb397b313b94402fcac03b7c3d077ee8759a80942b822615febf13f22194e02c92fae3849062e0209478421a5a09170109ef560a9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e0cf69831e9118954bb48f17ff4ca6c
SHA1b1bcb40dd03151779970b55774c4efc7c18f7636
SHA256441fa9bb9de76482aa06312eb2058c60d8dc57e8abb55952a02e439230e7a73d
SHA5120dc53b55097f233ae89d4e7ada97d01606837795ea2d621ecfa0219a2c383c07932da800fae6201060c6975fa0f24e5e1d032788db862e65905e7b29374dac3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a831c4568be2db946fed257861677dd9
SHA1ad7122e43529483381f7d86ec9130bef54b1b7c4
SHA256e4c2bce7a5c109cc933ada9b5325099cdf78e83560dcb018c364de5c15cf96db
SHA5123601245b59ef2b09d4d70ab8edce9fd7cabd1c5616eec0ac20a328eaed9c1acfd6fed472074cff2eea354ce4b00383d74fb9e7f8e30cbab364785428c1e22574
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e88c8b484915ecd4bc7161bbfaa467e3
SHA1537375d99014730c0233bbe53f2ba0a5b3d4633d
SHA256fab2205209fc5bdb0187dec6c5443adaa4d1e5bedb82b9809a0f8012df8ec015
SHA512e4c32c66225d2e6fa0339f7db58c109fa0cb8daf98898820b675afaf90fc374281757ed8f6437b25a594bbc8f344709ad514efb445949192f51d6d272cbdfd11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cfb18bcf578968ea4fce624f6407bd3
SHA199c24cc3287091b808f8eba33881e1df62493479
SHA2567d35ec18b06f60fb129d4bbbae5b321c000997ea48d5ef2d655786d1ba89e408
SHA512f868bd8709d2dce7f1aba177c98e1d5b95c56bdf63c83bc6ba207fdbcfe9c456b942163a0876abc11cb4e2e7c0990120b606017d080b9b6835a9eda267f791c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5817a3b0ce8e1b0a8cbbc546385d83e3c
SHA1821382cf0293630e65b2e1d7e7a504091d38c530
SHA25673d17f8f4d867c8fe00652eba4ad59d3460427baf2878466bac73f7de2f22dc1
SHA5123a12be85fe0e059cc362649c28bb4754da15ab75753ed2bd3e12423cb3facf48a257959dd6902fc5956c07b543a900a2902e084cd88e519d45a1922ed45b544d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544b1d15643434dd89e4763b731bb9404
SHA1e92ac6a00024c4aeed0d4c630ec0ae52aa90917f
SHA2565f03a9ba9289b9a0251782e4fb2527ddce7425cb20cd422df8e9aad0dd8cfa65
SHA512886155af5efc0f117033cd1863cf72a7ad77053010f861aaa4389e0d3cb6b247053aa6dd7191ae8d86065e571b91f9730feeda7763b5e980195e4e4bd245d538
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56715c2d77a9d7a2e9f9fa522d79d0002
SHA11fc7617c7d0a5fc9a056bae6ba3cc729d1f943bb
SHA2564f02d7ef73fa58edab6c68330d3f09aab1fc4c45a8839c024b2d27d4cdeebcb3
SHA5121e74ce2a1e67d727dd5b697e3c3a893396c89c51bb875ef7ecb855d17f312486099a3c3c88f50a9a8180814941bb810fc23ecc7c7f92edd9d8ea29d0736f0d64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560119a3cb00217a1c93d5f710ee63071
SHA12adbad979276fbc8402a86ffeae7e97f983f60f0
SHA2569f9fee0f51c930e5f49f93b2a97f6315a354512e4a3d2b27665d2882e31637c3
SHA51209d9c773de85ea4dcf3bde73d86dbca7aedd081806fbbd1466434c384944f558a4f1509172bda2c5bdaba8e662fa7d147ccedd77faa4c1d9eac47fcf71666141
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5947026b531570d82bc7a3e8e76a1d0d8
SHA10a541927b015451ab23091d9cf22b282659c7e46
SHA25655ca3b0290127a1feda29eb4262e9105e07e2f7182a44e3ec487f22f9657c5cf
SHA5128075e36397a02abbb5897a351d60bb895dc10143c6bc8e0b2e2b6f2829268d99616b8c76f1a08e730922819bed875fbb0589fb0ed4c05d6404b91169060566e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5e62dbab6d2c62514db93d6076c9cbeae
SHA1bb02621a01774d53b59acfbc403552b775f98169
SHA256fdedaefc7a0e8e6ef4864d52f444c158300de542c2c54461ef04b07dc7021417
SHA512dad866a25df792edf1a0cb2979f40bec32222c355481b4b8e90200f546c071967f44df1b1b77d134dcc3e0ef32d61f7f1da75a1f684d62d235191427f285eaed
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b