Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20250207-en -
resource tags
arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system -
submitted
08-02-2025 16:33
Behavioral task
behavioral1
Sample
JaffaCakes118_c50af4c866dd1f4a240015607e313a3b.html
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
JaffaCakes118_c50af4c866dd1f4a240015607e313a3b.html
Resource
win10v2004-20250129-en
General
-
Target
JaffaCakes118_c50af4c866dd1f4a240015607e313a3b.html
-
Size
130KB
-
MD5
c50af4c866dd1f4a240015607e313a3b
-
SHA1
326b4326dfb5497d061fbc6fb9240cef09cd659e
-
SHA256
f3176a7423118f1ae523f65d875291739d631b74530e2d75d143388c8378239a
-
SHA512
3575f141226e576b29134cf5ec11fea5726b3e24039b5b1cefe5c4b114bb5eda6ca48872f849037c439ff581a3e4b3fe72ffbf54904ac52dafd2cf99ba23fcf6
-
SSDEEP
768:2vk1ATx+Bw24Tp7VsiKAidNCiZW0HI8JjoE5Jcsm09XWhCFAfDv1p4ODMtFA6cVj:2RHsiKIiZdIXE5F4ZDMtFbcDOatOPg
Malware Config
Signatures
-
SocGholish
SocGholish is a JavaScript payload that downloads other malware.
-
Socgholish family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{463E7591-E738-11EF-841F-4EB06247029A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80b40b27457bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000596298383b88f045b768ac3737055a04000000000200000000001066000000010000200000000794414cfa604bc00d50f1ba34fee4a790542c5ff9ca8b2bfe05108088ef3634000000000e80000000020000200000003603a3f7fa25f6b47d8a9d257ec8663e5927d16fd9c87315da33106a945f4d5d20000000ca58af0c3414c71b2a607ebbe04aa771e0a47172343af95f81682dec05767fd8400000000db1c0047e0544f60c2833a9ba24475b6de2a359db58debc090e4807a8125040982a82bf8a9a59ab14ba00ef8506541048b1711a5a3484c0d4dde1bcf11ef03e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "445303302" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2904 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2904 iexplore.exe 2904 iexplore.exe 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2832 2904 iexplore.exe 30 PID 2904 wrote to memory of 2832 2904 iexplore.exe 30 PID 2904 wrote to memory of 2832 2904 iexplore.exe 30 PID 2904 wrote to memory of 2832 2904 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c50af4c866dd1f4a240015607e313a3b.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2904 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5401ec8579175b1bfa54de8b5c2219ea8
SHA11a5f1ad52f085d4f671e7f8ef612338cf316d90b
SHA2566768e8b0ea911ea2fd674490e0e695a81969f4a9503dda85b42cc3cbe52ee676
SHA512b9093cd348813f4a213cb44fd6dc10bfd421a4abbdfd3583c88d065dfdb73f0c454a75f61df88e8e1d6a4c6035b99e5535cef8cfbdeaa14f59ad4012ce127f0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54103bfa7a284af588a69c815109d65ba
SHA1f084cc2abd875401a7707db7b6e5bf4a03fc1d7d
SHA256976eb4250f60e50d15924b52ea26fc7afd3cabe29f4adac50e36b0e1d1ba1c9c
SHA512315b2db853ff611b7d0b20376a7c5350151db54628a871b5d871c076a450b493600f90e1990998e3512c4daa6fb27245a5e9bd75206fa566e1cbc53c196f80cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595402b49e57e182c7de34a6c5982cbd4
SHA1825796a612dfd787f00b9714e4d0d8766d6b4a3d
SHA256c602ef8c560d612785903c61a5acf2fee7764b47961de88e34cfe2f51db0d18a
SHA5123133c4ff0bf28e51d39f3cc208bb75d040305d7ce1a44dfa4ce55c3cfbac062d90b02e1951a4961af9428abf042f5372603bf40ea08088a3d942806d426b5b05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5547ca91f2a95f1d7f0647c9c7c413d54
SHA18f60b5c872a129809e4d3f99ca853c3bc5fe266b
SHA256ea35752a2aff99ce064f77670004c4183c6585123a9632e5125564f122b653df
SHA512d984b14a44900143edd745d8215178cac77bf9e2740fcb56614a5c8d398fc1b47a0a86716c7b6e6f0408912063b38ff4b42a0a1c41ebaf74fde43ff5b36ae7f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51edfc8a23fc90e3127c2a7997fe23c6d
SHA183de8bc342a3b6bf89d43e4d30c58eb1789845d7
SHA256f88e4bc11cbcb605bc260a0969cd220f276e719da2047fa013b82a4e01c62daf
SHA512c88879e8fb01bf643a95a35a06db1b7af35819acc41e0b303738d8dd0853b8191ef78c39292153aefe6fc4977642eeb44bd3ac4157b364f81b96bc8aac7bee4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5268e3fc1ff0a0c9a83050851d312351f
SHA169804775ea157bc4512db6aa220c5a7005a65cff
SHA256993d6af0a6fe03aee1658102df322409b9835e692da575952e8f8faa9aa1640e
SHA512d898c1d181cb2cf35c50fd16354511697a6598fb6f937c4779721ed31bce0a3dc78be86714d1dc2f46d7e77cd048965dfa78ca3953577fb4e5c81d8f5853db42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502ef32b9e7ae5c10dc2efec25ecf7490
SHA122ef013135e18828db14b53e2a55dc696ef7af4f
SHA2561092385d243d62030ce1e91cbca93746d213d103041f310f4050323b3aaea1f1
SHA51202e6b1aef3293a2a4bb8c86a62c32a9e70b171fc69968b7d77a343b0f5e39799a3d60b66d8bbfbd2531ef37f1bbb0e487564c94fc598854f6b9a04c3eed7d02a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b