Analysis
-
max time kernel
142s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-02-2025 21:03
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0e2dd507a0bd136245c5dc04f9ac918e.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_0e2dd507a0bd136245c5dc04f9ac918e.html
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_0e2dd507a0bd136245c5dc04f9ac918e.html
-
Size
150KB
-
MD5
0e2dd507a0bd136245c5dc04f9ac918e
-
SHA1
823db2354ac049de3b0b43116e47155922734621
-
SHA256
16db0d83238aae409f2202e5fbecce4404fd4e74fc48eb52fb2b127e8170be8e
-
SHA512
40544f5220d7062820b62923286cfbe050e339b2eaf4e2c830725d0f8b3efbbc80609cf091bf6c8d898f1b9db4e9afa088fd6ec3c814cb7cbda7e0b9701fd2a8
-
SSDEEP
3072:zeHEaVHs8Xd52WGpQEodehUsjhyBjBHUy:zeHEaVHs8z2zs
Malware Config
Signatures
-
SocGholish
SocGholish is a JavaScript payload that downloads other malware.
-
Socgholish family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "446247307" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{346E9311-EFCE-11EF-8AE4-465533733A50} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1996 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1996 iexplore.exe 1996 iexplore.exe 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1996 wrote to memory of 3068 1996 iexplore.exe 30 PID 1996 wrote to memory of 3068 1996 iexplore.exe 30 PID 1996 wrote to memory of 3068 1996 iexplore.exe 30 PID 1996 wrote to memory of 3068 1996 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0e2dd507a0bd136245c5dc04f9ac918e.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1996 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04
Filesize471B
MD53599a000e3df2e96841aabf2c79d4177
SHA1073d7c77d0940fb7ba3b8ee827abd0e6a7bcb59d
SHA256e6c2a35c964a189685b015979d0efb263fc6983c3c19b01de3bb84ba9b5aa804
SHA512fd96f2cf6a081fe5aeaf7068d284ea1a534f8a9a8e82e6d659f46311001111abee588028aef701f70a80571f8f9602881487f428a1ba0372d86fd684a3d284a3
-
Filesize
1KB
MD5c6150925cfea5941ddc7ff2a0a506692
SHA19e99a48a9960b14926bb7f3b02e22da2b0ab7280
SHA25628689b30e4c306aab53b027b29e36ad6dd1dcf4b953994482ca84bdc1ecac996
SHA512b3bd41385d72148e03f453e76a45fcd2111a22eff3c7f1e78e41f6744735444e058144ed68af88654ee62b0f117949f35739daad6ad765b8cde1cff92ed2d00c
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD551ad0c137c1ac839ef4b724b684aa27c
SHA1c0f07af2b208b7e273120e0a0fc00ec493353c1a
SHA256a71eff95980433cd72810eb7d3e61043527f8d29019421be2cc24d9bc14bd7b7
SHA51229e245040e799d39513222773cbbfb1ddc93cd10103708dc4c31c92382e5dd03969ae8004e7717a132739e1633012b4460ebf721c841df8c6cdb6b0cc4e5ab46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5a8de6e817a5999b919dfd5e28065f278
SHA100905d930464a49d3fe0c40e4c10e456e7c8e17f
SHA256df1ebd1189d3ec613efbf3c95fde6d77d33aef28fde357f22e321af4ee213360
SHA512363e3f8aa13e66f796e452b98d9973358404a10df162ad469d94f47446a2e233254a6763bf077de32d724218e4702dbe463f72fb9381f854c265e150702c5d04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513a96e8f7226e82268d80a331557b23f
SHA102fd58239629650ad2fbffc3fdbac4403c25a887
SHA25636a6404d39b11a832239b84338fa39cb66358f6a4355f3d7795ab4ee557c1067
SHA5124bfa1673e6ae146ef0efa7227eecd9db12cd639937ca691a1d1c8e9f4fc27c83305f6ba5ac0baf650f4e3156726cd91b12a69ded3c68f5fc7a48f09adf21b5b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ee2ab4a1d73b4f050e4fbc621d961f2
SHA14679737f5f501f66f6fcfa1a88f4816caf884a9a
SHA25688a9d576d6572e4b265d0d15743c8e915a359868d643960a11bb00f162a66f01
SHA512ce352cf2c18d8257231d51dc53087a11584f9ce8694d4646a214de11bd40fc19eff184b6c8b32263ab27050b904eb86559b6c0af86475f79e5b604921d3aa47f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500c4dd9bd8f9caa1a5ac2f75a14f6cef
SHA17d5fc25b1e4b7fdaff0b437dcb3e22eef489572c
SHA256e64cf179f4f2cec1eebbdfd93c1543a492dcaaf3d7de51cff468c88b7d547355
SHA51295ce09f6b758b82cfeeb7a0110775f873d65db6d12c1f07a936c73ee2160fdf59842d1c617fa584bde8182771f8fa78fedf81c177f22b81f6dc2e893669b5b9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a437fc5038246c2de7b6d0629be5b909
SHA100ea75d039024781c0a2bc1a1da2d56c977344a7
SHA256808d51cf28e9fdee1ddac707754dfd44392738b5353ce30390aa294132ad4e6f
SHA51281ef4182c93827831c09a30934d75443cb50b9012304764548ee7343cfd0a826103f41b3a1ee7ffc6aed8facfa26c33fa571be9e286e4fc5cfc7a57c576abe0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b246adf4a87979cb7d21eb2d817a12c3
SHA1529edcd16af72fab92dccc9ebfa70db616552fb8
SHA2566a89713f99adb6b0131ce9c3c88760f791ffed21b65419d4c26b9874d4ca5539
SHA5121e9d015249fdb309659547ceaaceebdc1916be7a86ff3eb555198f2efec0dcb37174f9aeea42f74ac3725eeb43ad38e84c79e18e3ff70dd6705a8ba083d1bcab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54378d69d6d22e0cc291b43661ac22356
SHA196e4c482f813475ca7a8c6f112e372f9d9517c48
SHA256063b0f1b28c73b7a224f97073c661616716c137155c6280abbc17ed8b1c53e9d
SHA512f6222d6f1c02b9e344078c4b33dc68e8524b4dce06e589de82c2c9112e9ba05d275fba31d8bbe4ce054a5e29c49d4625fd002aec0aae4b68a7fc94a9278959e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a00a67574888c1bccbf68e3e5418eb6
SHA150a809a2287aceac8db477f322b4540337d372a0
SHA25676c67e16f6b76bb80d0b4e6ecd148eda66c573eb3ee5b53b704297e8ea15c3f9
SHA5125b633334c63de0225095cba9ff1fe79d83bb7cdae0cb37e7411695f93ed491c3b46ec3a9f6f857824ac53b9ca46eea43ab96535c8312647fdf4609aaa21fe41f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513f60d394c565a5fb580c2cc80403dd3
SHA17b5337a6455cd7443905469b92b6a02eec89e994
SHA256a4e94ba71efde0b555b0252b02f47b292b83a00ff0f0642e8d0580ac308b1384
SHA512d0e2afa3e6d1622a1b6e0b30eeed59b4576ccc06014eacc54f9a7d3197f74635ef7e9c120e3c75f62cf35c7c8e11ceccbe6e1987297931511df7d20c11d2676f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5979f2701ac4f51d536407195c21b508a
SHA1fbe25bc4d362d61b2525d62f69dcd6e13c2b13dc
SHA25688523a4ab0d0cc555dbc469735555ffee8fc9bbc802ca1172a179535ad8606df
SHA5127a9a8bf4165900369d595f60651199b9a91c02adc8c7b4d4ef136b8f53a8dd68eba911103f65a24edc61cbcd4529be92cc1df700cfb99697b0495964446bc357
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbb926cae7f098c9ef4b9c3f029ad6e4
SHA16ca9baab55da8f058bd9561600d7a240421de6c1
SHA2565384ad40735c417f3c4633ac0a5b659820bae0687a8b207acf406de115d9d300
SHA512f79249e45b4919a4cce835b434e64331c6007f28ba04b253c10e8022cefe7b05ea57fe6f79474a1b5c648b3f0d32551c462d5aaa467caad38d351bff17e9b00f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579d598cdf3fd7db76085e210fd37e3fc
SHA1fbc7911b86fad7c80c4448bd3331429c3490cd1a
SHA2561b7be2c27431bfa1d263059e4794af936f27f30bc8c60f09decfa0780c8af9b9
SHA512f403204cf8c90fdb1822b904a7a92498c33db843a425f6adcb882151e50066816331a7f8ab213d995e3f748745c70de807152b950eda23bfb3828fe99258dceb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b78d060b7628036e45edef3a8c9b3fb
SHA1082363d1fc36b269230c6a4769550cf6b9faf3d3
SHA256c8c49461ef07a19cdb28b7019b5cde2cce7a58a69fc116c9bfff1baf448f25df
SHA5120579a368ab16b338c3092950b2e149036c4c94e8762259435722619e49d63fe0557e13ce4fb43ab99922a9bdb961d332be968a03f9299096e63021da3950c5a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cfb05a3cec25affc084584848e5e4d1
SHA11f5123250077b0bf9ff4342c2fa4dddc97346f23
SHA256fddd03a0991898874437e6c901fd241d88e763dc6bcd98f97192166c2f729a2c
SHA5125ca29ee1a53d38b31aef53557f04981f2c93f2aa9c6e7f360ec71429c7e3be39182a2c81e86cb7650fe935c52db581912fd5fb8f005ecd5b942c558199dde7d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555d9c2459dbf6b9998cf2156e742b0cb
SHA1b20c933206e38bb4ce01961d5bbd8300abfe2510
SHA256ccc566dc86058eaa7cd0815f7faed4bc89573b84cc8f9f66bf11e1c648dba5e6
SHA5127d088b29cdb343491dab8bd92e80f7348d29632ca83ce71fdd307afb27135c42ab11246c775648e6342dd27036070a38d4b9bf887dae1e89447e459fc0bb08ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DABA17F5E36CBE65640DD2FE24F104E7
Filesize276B
MD5758cb145913296b2f9643938d38b67c7
SHA14f4e4ea7974f6855b5432d64b969b28f9d3a99ff
SHA256c1714a4b06082d3d09781cfa29c5cf7f6756a029f8abbd7f084f6ef1ad674212
SHA512385ae8ddf971bdf7db58fef5c89507ec7766c3e8c9382536c5bc39be808568f4d6eb670e8ddfb96970fbb9bf1ebc92ecaf24b20e2a90faf36fcc5015636e056c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD55f6ec3e52047a69c1103d8c91178071b
SHA135e1bb4783cd6934c06c686f4679fcb245cc6492
SHA25666ffb04cb6bd46cc926b245525cf49d20f7192bd85b2fac69e77bc0b88dbde59
SHA5124191e459b4f9d82ca691c69b52ec2c31a1655bc22158032e2682e6ac2938322a628af753dce4d9821822991165be60ffdf9f00449995b903e98a4bab7158526c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\F91VN88R\f[1].txt
Filesize43KB
MD5e60a74980dde1f93f574139a4830aece
SHA18b81a4c7d51abf34a0766e1fc2b2ae4a1e7a11cd
SHA2564aec4e2fab7415528ec916290fa55924ad96155964398f0b0d99d24517d5a691
SHA512227f7d284493ba855deced44bb79b711cd472b9c39811eb7aa24ecfa5e861d2fd14ca7491cbc36dd000095b93852061a82dd7295ae8d333868d5ddc7efe213e0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b