Analysis
-
max time kernel
141s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 01:23
Behavioral task
behavioral1
Sample
2861b5521a71eba523cb463b96ae9060_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2861b5521a71eba523cb463b96ae9060_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2861b5521a71eba523cb463b96ae9060_JaffaCakes118.exe
-
Size
868KB
-
MD5
2861b5521a71eba523cb463b96ae9060
-
SHA1
184a06a1d198bcd603f12403a8262d298dd33cb0
-
SHA256
bcd76e65dd04395163673ae61c20be273c2867bcfd843d22813584e05e86a46f
-
SHA512
7d9e685d32fe31a335b63f877d8ece7a53061aa064f22ed4897f074d067af11fe50c7c9995888483e812dafbe3ea320e65fcfae251fe437c039c7b108334a224
-
SSDEEP
24576:EC3CAXSU2piwKuqk9PrnjjUafpVMUXfnuq:ECvX3OPrn0KtX2q
Malware Config
Signatures
-
Detected Xorist Ransomware 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2960-1-0x0000000000400000-0x00000000004DF000-memory.dmp family_xorist -
Xorist Ransomware
Xorist is a ransomware first seen in 2020.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
2861b5521a71eba523cb463b96ae9060_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2861b5521a71eba523cb463b96ae9060_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
2861b5521a71eba523cb463b96ae9060_JaffaCakes118.exepid process 2960 2861b5521a71eba523cb463b96ae9060_JaffaCakes118.exe