Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
10-02-2025 07:15
Behavioral task
behavioral1
Sample
JaffaCakes118_d8b1c8e51eff4d612b6235565ebcfc71.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_d8b1c8e51eff4d612b6235565ebcfc71.html
Resource
win10v2004-20250207-en
General
-
Target
JaffaCakes118_d8b1c8e51eff4d612b6235565ebcfc71.html
-
Size
130KB
-
MD5
d8b1c8e51eff4d612b6235565ebcfc71
-
SHA1
84d3df97f0ca89223d7716ecc09e82cba6b9f412
-
SHA256
a82f7008be0e15cb292da5c46dfb20f6e46ae27a6f40514bc6ee71e43b0a532f
-
SHA512
778e17b0a4c36811ac3b20d37c743133618ea733f4632e8c997dbef9e06a19eb42dea154992bb7b50ae0187ecd2f68c2cfdbb8038ebe15476ca0eb20a5e22b8f
-
SSDEEP
768:25k1ATx+Bw24Tp7VHis2NLidNCiZW0HI8JjoE5Jcsm09XWhCFAfDv1p4ODMtFA68:23HHi9TiZdIXE5F4ZDMtFbcDOatQjtg
Malware Config
Signatures
-
SocGholish
SocGholish is a JavaScript payload that downloads other malware.
-
Socgholish family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009e62f1c6d9b75a49b3c16b3a8dead62d000000000200000000001066000000010000200000009befdd8d477ee4ba1c362f7e2b41d5c946e36d8b9810ece122fa4630ec56f13c000000000e8000000002000020000000355a04dc6a3b1eb0cf5e38686393d512eb1c228ffbd730a6c8ec6f7f6d4f996c20000000f2e64cc390194a69b9988ecfe43668cff57235dc52c1fe9219c7d44f8ca93b01400000003a87c9d130f640d39be1b440079d5f3d80b654a2d34e197a552fcc272b5185baadd3d8fdce82302237d298eed5a57b717be19565ccc5d0359c62a14e0cb7c0eb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F0B760E1-E77E-11EF-B985-56CF32F83AF3} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "445333688" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0bdc9ce8b7bdb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1740 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1740 iexplore.exe 1740 iexplore.exe 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1740 wrote to memory of 2192 1740 iexplore.exe 30 PID 1740 wrote to memory of 2192 1740 iexplore.exe 30 PID 1740 wrote to memory of 2192 1740 iexplore.exe 30 PID 1740 wrote to memory of 2192 1740 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d8b1c8e51eff4d612b6235565ebcfc71.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1740 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2192
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5292e674a8af6113766305c49b1a81489
SHA1cb297076886ab92436e97082aec5bb569879cbd0
SHA256fe299ceb755a9e4bbf80ed1f3e8ed21db7a0b488c31285637e571421c97bc742
SHA512c641ecee044009fc077670499029fb9f9b3178e6a4ce76aa5ed1ffbc968970213fce0eb4a10c3626b8e7ca009b66489f20edfe663acd6007cd16bab44a50a3f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537b4178af468fedcc823e6e32a9495bc
SHA1cf717936c651f1cf04268d1415ceae6c07bb502e
SHA25689ad99978ff87d01f900af0054d39b290bfb957fce328502d050414951054e06
SHA512abff31e8d5aa5e0645eecbae3d8326dafa8f934a2c5f78eeb1100957db0478f4a51e69bc44feb13f8189f986cb99428460de58eebb4b7e0b4abf1d41c153eceb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfdb2347b55a390d6fbd27e9b90f404b
SHA10ab5d6ffc5e8cee19c7738188b2f02862ed76c79
SHA256d879ca419b970fae22c2bf8b90f419e41638893ca7ad9b3560f871ea98fbbce3
SHA512219733be636fe27a1c664443f4080f79bf197f92cf0091fbcef4204aaba50346d2967e5574f04172187a168b6a91685172b073308dba0a4b0b76c77ec941c394
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5e07915f3201dde7c5184cdf720592a
SHA10e7f4aad75165041cc7d5964d84e87dd74b8ec31
SHA2560edd906970675d0cfffd5f76fec8a47004543d36e07f63e6bdaebac67399d054
SHA512e16443d5d0bb0beeb3fd8eb98e23fde0261f506cac855ac46137666c4f75980949954d15347d13bb414b2bd827d90b88f833525c0941339ff53267fdbc458cdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce6a7fcc89f8574879774e0bda0c526a
SHA1ce98d8990d79ea6b7d8b786eab609d20274a9c82
SHA2563f54cc2e623d0acbf54a08365003d40f9f94debe1898102c98ed7c55d5a77558
SHA5125b9f4bf31cd1e68192881eedbaf6c8adbfb936744a63ecef9cb6cb9838c2338efa2f7aa7f5825d45713e67cb89b3c1c9ffb97077da4900ca684fc1d62479d6dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d0465b85e33ec547be45520e12051ee
SHA112d113933979d47f0e3b098487c287c52ae79012
SHA2564d7de218e4eaa9e88178efd0c0b8bc3199eeb747a76558b297864f75897f1deb
SHA512f0eb95502dcec66ad7a96f6e8be14840f7bf581b5d73995f35efc6fb918772bdb8482a048fa26840f4b5d321f9b740ce0cc3dd69080b2d4345d5513a8561968f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5325af69f1c447cf77198181c6e655425
SHA17a62bd0f0835965000623f6e0d69827d932e3734
SHA256736a89b18a7a2c63e1935aa3850cf05007f2b15b5db9b96202fb2ad464871a03
SHA512ad7c6538002481ef3448b148ac1de88e834730b84331f112810f50bcb796260392f305761e9cc56fdf7172fc78efe07abbd6cff506f883daf0dd8c45f56a28ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e37e655c5787952a5360714cb6def291
SHA1d63687f99acca54242ca1f0c1129e732de22acc1
SHA25616171304dc496677a2207c33105a9835b593e4858c8c51258d5257276ac2f609
SHA5121c8a56d81886873bff1aa14ba18697a995b93f1d05900487b4d3d0146789aee5284b83fc2b34f43d7bd317e42e8573a4bd0fad9750a11d937745dd5ba4c20aa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5063511c497cae3122bf75591fc5f3b8c
SHA16e269b0dd85a4ea95e37963efce93dca8df6ff9c
SHA256a2f9be287686c33029a8d70bf740d018d81f85981ef6fb0a0639c3778c29862c
SHA51210dd06ff5f6a108a1dd8602dae933b8d581cabbfcb3bb0bdaa57e6ebaf6632fad2aff67ebe38c17d9cdc5d36f56d0e5b0846662935e9e818d1556cffac1b0de6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e63e150abcdc7ad4de21c47bd873281e
SHA1b4d4b8ac0b4a58b26494981e2331125f8334e3a0
SHA256d000d4cdcc295ceb9dc030218004d56d9c77a3482dce530634c92c5acf0a0cdf
SHA5125e29ea9747d440913cdeb9b3bc2ee175dc5d93a57a572d69da31638c8e85150dd02d2d4bac6204ef70c6ff53a9740fba8ad2477e1c1f494b7fbbd37200ce71c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ee9042227d9418da8e8de9543ae58bb
SHA19ebd1e5bcb84668f9f3958e382525682b7a7e0d3
SHA256a5983cac77738abd4babf8f17b88b9c0a03fca96ba275216d5ca5573215f785d
SHA5121c34a31728496a0f7db409bdea90bfbca0439e1790ef208833c61360ae60d131c6d1749ec6a56457659c4fae5082ac2dfc75a75fb49612284e9248a93e92ecbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdd8d9eb4de5ec20460a3525f30417b1
SHA1e1d951ca931a88164b27f6accd78fa4427e5c008
SHA256a59a88fb681df644b52cd2ab6d95e239e102f75d9d004ddef89c762a26ee81c5
SHA512363e13b7febae834b334c18d43a0ab42d4efb0fd07d8fa544832383d16a4a2d6241b0830ee34cbc9d905de936213783d9b23270813a7f6ec8c2e68f9958657db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e87550afe9fc3fdad8d084cdb14e8bd
SHA1ffb29277d3af9c3e6c1e71dc327b3274df44e84f
SHA25609fa2542e23940ff3673c06f87a56481ee9c73643abe2ece25f5acb4b7bfb2f9
SHA51264d428026e50ce18dbc88e7856b4f8258605e03b0a455470d11eda1a498a4f4fc04f6ae51e2df2515c8fea87b72835a0e1af63acc9c911ad3b5277a04d9797b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9ea7066a38a149855c8cbf728b39e36
SHA1404bb0233d6b9604062c1d41d6b0bcf73684e548
SHA256dae327e8fb44678add1972d1e097f1275b090d0971ba6adde0c63edc1646e0c9
SHA5120cc8015862d99c0979d3fff7d291ccee4493ea9d085c73d649f7d041993dc75d9ac7ae6ebbafdebdbf7734c62a894a652cfc67fd4d9a96a7e4090a353f4a71e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5ea25c76b57292b6957178f971a0d30bd
SHA13ac41d4e5820a7b02c281ef8b1da65a21eda2631
SHA256dbf7f94407621d93337fd784a5686464503ab7b21543bb308238de820805dc97
SHA512242a66216ff289828bcf278f92fa599fe254ef334824a73e83bc5e7a1d5d70c707f75379cf3e477c5b954e9d1606609897c8539dc7599c8195223bf962be2473
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5e59a42d435d85e3bf2552d5560b27df2
SHA10fc4f2a3ebfaf3a510d38b1d33389558efd6b73a
SHA2567112821aa2934802781102c6ebf54a64556522f8e6a6512cd828a54168d04065
SHA51238491fd26456547d4c3c3190fa8968bdab3772ee1a987aea50e2b1695a25c3c2a66c9b75047d4ee2e9bc54d6675f365357a81f22e36bc92902b382dc38451db7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b