Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
04-07-2024 20:08
Static task
static1
Behavioral task
behavioral1
Sample
2619d950f602fbf439a40cbdc5ae375f_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2619d950f602fbf439a40cbdc5ae375f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2619d950f602fbf439a40cbdc5ae375f_JaffaCakes118.html
-
Size
24KB
-
MD5
2619d950f602fbf439a40cbdc5ae375f
-
SHA1
9805c749bb084a837f0adcbd3bef22af3530af4d
-
SHA256
e087c8263b9daea15993b415e7d795c190c58e9a15190b951d018a9be7fd7c96
-
SHA512
316583ebf580162e220d8778934f3145148de7b1a13d53c35adaa5a4d460518624dc5001aca2eef9f2ea15cd60ca022d96b9b42cdc8770a79fa6304fa3d1ed54
-
SSDEEP
384:vgFgkqZdCu0Hl4DXLCD08WbwRW2QZh/HureS0xO89fgANu7l+t:u8dCF4Dby08WGunpY74
Malware Config
Signatures
-
SocGholish
SocGholish is a JavaScript payload that downloads other malware.
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{38601951-3A41-11EF-BEE2-725FF0DF1EEB} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426285597" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000f5bb77d5c1a787cfe2f118b657d449510e197d277663fe11d7ec873bb4c203a5000000000e8000000002000020000000635b98a611c711a6be43bbc5584f443f00cf3eaca6aa5c8c7b7fd85b30f934f520000000b81bb27c144dfb67dfd2b629183395bd7993768f86253bbd358be352c55b4b98400000008c8bb1c8c890f7355cadd61710ccd94e1508abfb53a6541f21c344504ee5adf4b8158f766e9140bebf3870ccfbd024452c88639968af8334ab0f0efb05a8dff8 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0065c134eceda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1612 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1612 iexplore.exe 1612 iexplore.exe 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1612 wrote to memory of 3044 1612 iexplore.exe IEXPLORE.EXE PID 1612 wrote to memory of 3044 1612 iexplore.exe IEXPLORE.EXE PID 1612 wrote to memory of 3044 1612 iexplore.exe IEXPLORE.EXE PID 1612 wrote to memory of 3044 1612 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2619d950f602fbf439a40cbdc5ae375f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1612 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD568569c4236b5b21b0a556a99a49e11ef
SHA1cfbf1aecd5c70f6a2c19d4485eeca5e76e38f85e
SHA256486ca6262afdfe2f90a0a6008b0b1f50e8371c5c35f344abc03a5dd100182302
SHA512017680add1bc736b57d1ffd14bae66395d91a3e8ca2bb95a349f85b68a875c3e369b52684a20f644e2656c9a9fd8b2729aed80efa4371cc6a6272158b1a314ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD584288ea4069cd7b66ad30ecfb55202a2
SHA1bc50bbfcf65af7087f65d3ac3af57436dcbca59c
SHA256a9d02f209aa982bd769ae88bdd8bb349650153aced0503e353ee484c702403db
SHA512adc31dcf09bef8eba4e6ab6b27cf24f2f2c7a99f4d731de15f5be153c7ba9892413bc030def763f41ddb0ab0b8587a7a16391fb1977f8433703b0b0a93084d9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5d26ec238b063af30acfcdc7ddd08c928
SHA1a6c0a2ec836e8b0a2ba725ff7fb20a00a0c8d38b
SHA2564ed1105b285081767e082bb09001a1ee67bb9b0ced02f35d26c7e003b8caf8b6
SHA512fe951757949b034d747bad428aa95d3249a8023f7b8c068ef363bfff049732a5c80be02c6f2d0d7e1bbb770b5ae504044d14d507406cf02d9fbca324dc97be2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD519d213718908f9db770af11de0992d0e
SHA170750dcb0472472270b2a698ff4f5005fc8e70b9
SHA2566d339a6e3769cee8460b5976f2e0a641d5dd23f4b5871abeabdd8db92fa44a2a
SHA512dde7311d8f383df9e28296ec1081f7f6b6ba23b07d043fa2e6aa9476a7f34d22f55a6a83e438d1ef971a8c0f6e393697f37775e1c920cc08dd624974a2a15723
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5986caac474a3cd876280f033284892a9
SHA1f426f5f3d95300594d99fa62c1816620db4cb866
SHA256c90caf459a2c76388b0252201af07e6cf8347bdb0d8f69945fc8673d85ede36f
SHA51242cea968f68da8f4814595c98ea741ac09e155d7064903bda8db47f60a8346a9ed1d3faf0aa3adb80423c137008c91d1d4691dce891b03d78afb90d8b18037e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD56058b97075a4178bbd30413b4e16e718
SHA17a240035296fe7b6d4dd73ead1c87318aeb1065d
SHA256baf0d7b1835641f5f7d8ea1e99b9db7c6f47f4f243b59c25839407dc81cd2446
SHA512fef009ff8f2ccf9f30b62642266d42ae94c79cf1a5bbf5a5c4d9816c6fe15441a666a5826f2f8f9be9c267c5dae8d7be8c7ea557e15496e75509405c9e275fc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5d1935f1286715912fe25ab3c6dd34359
SHA13d81b71b4b25602c3a32f146023679d69d35b8c7
SHA25602eb9e73f0671de0a3231b1487f768925a1a3e772af19158dec28a47e7675005
SHA512b808f33d0040df97d6a52b1e0a45f6bd37cc980a2e81ba4a9f5a1128f1c4af2cbb85c79058ecc02ff91fb74742d0dc5da10ae2bbe04c3e0db0b4b80cb521adcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5ab09393813cba5fc201c4023bf353eea
SHA144c5459fdbcb19e235a66c4bdb1576973e0b344e
SHA256069201ae2d7d29b05b4bc9028e15e72a6570039898216a50b8ddf1f4d6339f72
SHA51210b02b84311d086d91b021755804609d089d53432be11614fd00d31f8db11d3306b9e07931a17a050d7f095f7878a0c9dd7de486b814ba36f0cc9ff903037853
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5577e47d3a5b34be24f49af5c24f8451d
SHA197adeab752b21d3bf9fc3843432c168f7befe68d
SHA2565a440fedcf4d35380bad002e530baedcced809199c6d0f15026c422e791cb7a9
SHA5126115ef9ea8cf984248d255e73538005360f1f50f4994cbfba9235348268c19831728710d8cbc62397da901f542640f89dfc25729593efce3818caf575aebfa41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD594b2cadfee535aeeaa39915e454423b7
SHA199a0c3029301d2c415371e595dc0c63606117125
SHA2566d6e98487262d348c52f779957e3a952b9f5c397472d123f94e3836a27dcc35b
SHA512e11dfe0e02dc7ef07029f6fa0601b7cf6bfc9afba30c344daa868504aa9bc362c1fa293243d932abab4c41cf44176628311a9331123ff6d64cf14a839e73369a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5c265af221e89df0511a82ebd94eab0d8
SHA1a14c9e7192508e191d4c339bbacf1da1e170a764
SHA2565eb2419a5a4c54e43229b213c37f1434cf348695b27ffd612cae437980db93a7
SHA5120a07f9db034b58f377aafcf30734d2a7b8b35958f02df9904cdcbeddcd9e7a532cdf6eb43b3f91e0ce581b0f5912e1f3f7658249d8c133396129e7c38bcece5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5982e380b720d99696272395be7f0afbc
SHA1873b957004ecee9b8179ef737779232f0b63866a
SHA2565964bfd713bce40a0b4a32e155007966370bc49834ee3a9bf0264d1cb1d5bc22
SHA512bceac0a3a214b0be9fa4911f247b57e8255752f1671d75601d7c1a4fe3dacac9d73ede29e2fecfe83b2d2b21b0a801c6818b2844033bc2afce0dc7923e1af0f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5d5fb00149faa9a151321691367472bbc
SHA1514a2b27339945e4563aab9a7044dae3172d0d00
SHA2564dc9e26c93c19d1064301cf87d6ddeb72698e28d08b62d0c3dae4109110803de
SHA512815c2f2fd4f92996cfd0975e543dd52b421c00ba3b22a80dba602e5c281cdac112963982856a8d4757d5b14afd3f354cad51797cb0c0bb4aa8ad5430b63a5fa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5c1e3be787023c91be7b79882105d8269
SHA18fa3a190158d57eb4e47f1b3aaf4d0ec920eb433
SHA256b97df381504e07c8b23fc11a32ab5d6432d0b3da79524e11016b0993731b2e8f
SHA51218816c64ea70b56d8f4a33608b7d56f5eaa5d43f03424e65d1fae67b1906e318cfac79f3c245dd1d21f547fbff6633b7b93bd5eb67358d81d9986bf9be2f13bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5bf4d67957fcfe83100edaacb1a917849
SHA1fdb67d149b658918918d18d0f15dded1c15343cd
SHA256a3e87da2e2e3672e455eee9b67a4e819c1c51568404a70a59a92e1186d7b9315
SHA512e7f5caeaa479a82d56d2d23bbe5ee7105c725df70b1425677705ac06d9ab0e05e858f4733516843e985d5c3363660c5cf873403c39895dd6830bdf47eb872e8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD53e580b5c8e9c9768c9546189806a0d09
SHA19b42f688156ffd9da1df2c32c5916a97d2a12583
SHA2569eca308be6bf9a5a9265ce29e160b957a3a63f7ae3d756014175720e6911cb5c
SHA5127bed72bd70de132db5f1e83425458615da50120bd6bfdf92b3a146d265454448585dfd991c6316d3686933fff0c0a08b621c94850f79fd658cf2dd24776a4f6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD59ffed55c0a5f08069015101f10f448f0
SHA16c1814f198fa3c4d3bb29bb9fc43ee3082a3e9ff
SHA2564ff3cd7ee4b2b991089cd1292c2912eaa38fff935092dead8695e58aef24d4a2
SHA51266aecfd89ce9fea243daf4e29cf26060b0e3689dcd7c847883f456395d33380a2990b64f536bef2ad2b246e517d1ebf59cd9ec0b9a6580db2f5045c17a8e953e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5408dba8a0d37a36bb531cc252f5a3944
SHA15a4804c9a83bd491d8089a035c81c046abca4257
SHA256c2a8b3b85baf5d2de20641333b6f1f9f6f09e54f178a99a66f759ee99eefbd64
SHA512d06309275a4f24e9ccdef39908327850c59bf7c99d6d9f9486444dc6e8c8660426f616ab2a9c8fe66eaa09070521a9830438a3c9d632e24d4f26db1fc8b69de7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5efbd882abd820a764188bcce8a62436f
SHA1cb3bd8a1a4a486fd13a8693050487af296e7adc1
SHA2566ffe8cbe12389d620dfef1423e3035e009e3772ffb790cca179705545bbc0bb1
SHA512b24ac19f00d52b51196bfd17441c6c0495e6fc88e8aeffc0428197dbd970eff0330b0f2e6f7f5e218886744de7d85fcc5613522bbdaa5ea1ae3775228fd117c9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NFAY0EOS\f[1].txtFilesize
40KB
MD5611bc1335df96112c3560e70b9c12dc5
SHA13819f65158ed3a5a6bf78a70cb3672f24bef88f1
SHA256dc40dca444572859ee3ea2417a380ccb9bde03348e8f4449d0e610e539ef621c
SHA51269122a712090f68c2fdd14a77ba94bde9cdbce455fefee42ffe77977ff16c5dc5235c74e760bdf8a217e1510b449eb350ec6a705d0d8fd365f5fd580517a01ec
-
C:\Users\Admin\AppData\Local\Temp\CabAFF0.tmpFilesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\Local\Temp\TarAFF2.tmpFilesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b