Analysis
-
max time kernel
140s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
08-02-2025 17:48
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_c5ae0fb9513e19d630a5db92b968e34c.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_c5ae0fb9513e19d630a5db92b968e34c.html
Resource
win10v2004-20250207-en
General
-
Target
JaffaCakes118_c5ae0fb9513e19d630a5db92b968e34c.html
-
Size
43KB
-
MD5
c5ae0fb9513e19d630a5db92b968e34c
-
SHA1
192560f5884f0d46d23660d26696de4ba7f88d23
-
SHA256
112eeed01f5576855c0ca6b83ba82df2c249a8b60cdf6beaf62350c10762968f
-
SHA512
6aadc43ee6e92d508d3e8d2e914351d95613671609c4d2491e8ffe4b54b9e5c31bbe5993ddbd21af50503aee40cb1e411bd40ccbf860d8278cdb8fb13d45d392
-
SSDEEP
768:ADHUtUKuIMkUn2sjwUK8oUUU0UY2BQQpTU4QkDUqQ2UrQeDUpQkUJQPQU1QAUUQw:AzUtUKuIMkUn2iwUaUUU0UY2BPUuUuUW
Malware Config
Signatures
-
SocGholish
SocGholish is a JavaScript payload that downloads other malware.
-
Socgholish family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D3E2DC61-E765-11EF-810C-FA6F7B731809} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "445322906" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1572 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1572 iexplore.exe 1572 iexplore.exe 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1572 wrote to memory of 3056 1572 iexplore.exe 28 PID 1572 wrote to memory of 3056 1572 iexplore.exe 28 PID 1572 wrote to memory of 3056 1572 iexplore.exe 28 PID 1572 wrote to memory of 3056 1572 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c5ae0fb9513e19d630a5db92b968e34c.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1572 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546fdc59993389c5432629894beb86571
SHA18c3a26b25dc89311c95872a343c21183b9a853d5
SHA256e0b6661b393c7255fb5af1e4903ca288dca35bd57b292da36c727165566466ab
SHA5124b8c7fde4c58ad6f6f66b4d367a7e3cc58656e7566cb75f75581337d37650bdf566293f1e8f3075fbacdcb20636a0c1c37f3c05bd7f74e7521d457bfd20603b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee38e69c6ce47392a1f14f94ffa8483b
SHA1bc684b000a569944e5de67d5191c94b3991753f9
SHA256753473c70c73f513e95ecfef9acd46f819f24292345aab8e59d73ae005d9312d
SHA5122081b60a1192c364b80476727e2ba502e82c7d27bbe768323a7095541aca056dd0011b4f2ec8c9b951e75ad68d58b53f2759f201de92f018695c1402372e168d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f236d0c2890af97d211229701c996d22
SHA16c10bcd8d3c80aaf8d7e27a58c0b44d3506f268e
SHA256efaae265d565f92bafe31a57ab462ebf855084801c34a261c50beac8d99d6050
SHA5123fe41e05263baefef0b96e40876eeaf10fe624e7e2305f0e4993b1df16bca0ec9f81465c363dba905302a4114141863df448cacbdb4da5e2122449e9e30fe30a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524cce878ee67485d7765af55746aada0
SHA1ab282df0494c4b30ede781aaef594d01b5e7bf01
SHA2567e4a8ca02ee8e1dcc4c24ec4cfac0e3906b20cf1cc7f7b0905f1d6c5aeebbaea
SHA51286b521ddda88a5e6488089fe99d93dbcbbcc7929926fff14174605090d0fe5e35920b49843bccdea0778f1e99eeb61b0a5c487914df8c3f807eb38c828bfdbdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539dbec3037e1cb9c49b60c2f745e4000
SHA165bac2daec7e58b49eb2ffecb5d7f027a6638606
SHA256989561892e492fef1b2ceb0badf18842677094cd3b12b5401f8f1c56ca6c7004
SHA5121f2194aeea16ce82404c6f3c1c81bd48adcf5746bbaccd5b02159e60095eb0a6f62256cf95c02367960ddf37744949f914d0c14db50fc3bc88be26c9cfb10ab2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a487e7fca8bb33cd0c278b62d61be71e
SHA1968e2c392285124550f63231fa9ac0a77981dcc6
SHA2562bf6ed08ce823072b005fea5fefa2bebd5b9b8d08bf94090758c88bfe054809f
SHA512437cd2da01f2b730e6102d986ce75a9cb38be2f2df6d04f76e74f0c8a0fd47117d144f72698a2067206b9acafc0c4f3db80c960594671c474a43702d2272ef40
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\K0PVW9XR\f[1].txt
Filesize43KB
MD5e3f4ff7ea79e91f010343a26232fb1d2
SHA10fd1bab13b44dad931d43fe91b601584fe82d56e
SHA2566f1a58bea1c3058deaa8c4f560b0821c050baa5c014b257020656f4b8f275706
SHA512e6b81b5ecc41a20f91ccf3431264c6d1a5a14b4d85ec7ebc7c0a4f0d96d3d02687b1e136e33ca11e73cbbe76d4a7e475a48a931961790c8f194db2ca34ca13dc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b