Analysis

  • max time kernel
    141s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2024 02:21

General

  • Target

    32e2c73ed8da34d87c64267936e632cb_JaffaCakes118.exe

  • Size

    162KB

  • MD5

    32e2c73ed8da34d87c64267936e632cb

  • SHA1

    9f06ae399fc6280e97042c88c3a386d0db3798cb

  • SHA256

    d4dc820457bbc557b14ec0e58358646afbba70f4d5cab2276cdac8ce631a3854

  • SHA512

    ca7cceaba5a33714c9a9497bb065a60d2035660bd465c1e4026be4e18945064fba8b483f2ac0e47bbc001052b486704bcde69a76c53299096919def2e67804c5

  • SSDEEP

    3072:wYeRK21qDSdxcAiJoV2w/BlHAYYaAVAXv43zeBzd3An1YgCQSPH96PHNrD5o85PW:w5RD1mPXKBO9pA/43zeBzJAn3ClH96Pr

Malware Config

Signatures

  • Locky

    Ransomware strain released in 2016, with advanced features like anti-analysis.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\32e2c73ed8da34d87c64267936e632cb_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\32e2c73ed8da34d87c64267936e632cb_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2528

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2528-1-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/2528-0-0x0000000000412000-0x0000000000414000-memory.dmp

    Filesize

    8KB

  • memory/2528-2-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/2528-4-0x0000000000412000-0x0000000000414000-memory.dmp

    Filesize

    8KB

  • memory/2528-5-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/2528-9-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/2528-11-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/2528-12-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/2528-13-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/2528-15-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/2528-17-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/2528-18-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB