Analysis
-
max time kernel
141s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-10-2024 01:33
Static task
static1
Behavioral task
behavioral1
Sample
1ac0c92cddbe16b5586beb35e79db9d2_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1ac0c92cddbe16b5586beb35e79db9d2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
1ac0c92cddbe16b5586beb35e79db9d2_JaffaCakes118.exe
-
Size
394KB
-
MD5
1ac0c92cddbe16b5586beb35e79db9d2
-
SHA1
ce399f594ba50337234f26d9b66f9cca37dfe12d
-
SHA256
647389f47e2ed7bea0de9589ab01779a6272ded4793968bee3133bdc2f9c19b0
-
SHA512
e39428214087ad4ff915e81583b512a1ef8cf3eba21b49df1e37cf52b58856bba3702d87951e88c613b3d3e55ef5f09882447955e8f4852b62efb13c80a0edf2
-
SSDEEP
12288:ck0kdVbjk0kmokqkWsqk0kQkM0k0k40k0k0kikckyk0klVa:31gh
Malware Config
Signatures
-
Locky
Ransomware strain released in 2016, with advanced features like anti-analysis.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1ac0c92cddbe16b5586beb35e79db9d2_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1ac0c92cddbe16b5586beb35e79db9d2_JaffaCakes118.exe