Analysis

  • max time kernel
    140s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-10-2024 12:33

General

  • Target

    5ca4a80f1687c5fe0519da974567b374_JaffaCakes118.exe

  • Size

    161KB

  • MD5

    5ca4a80f1687c5fe0519da974567b374

  • SHA1

    ade5793052ae0b983eeb00564459618a67747fcc

  • SHA256

    8842974b86c6101a5bbb18dc16dea293e4eb7a9656dbee241ecce7a677d2cdfc

  • SHA512

    ff457c8e7a2f4dcbecf7f6dac50c18ddca99b3116ebcc80f0bf60335219bce597c7679fde1ec6141d664a5cef1a5e1494c9d3e76d7ae4002e765ec2210412d5b

  • SSDEEP

    3072:6kG5EochEls8Mn4YOZS6CuJlt8RBlHAMPyO5GNkzQWjF3zeBzd3An1YgCQSPH96U:CvchcsDny46CNBOEyO0aQ43zeBzJAn3x

Malware Config

Signatures

  • Locky

    Ransomware strain released in 2016, with advanced features like anti-analysis.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5ca4a80f1687c5fe0519da974567b374_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5ca4a80f1687c5fe0519da974567b374_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1256

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1256-0-0x0000000000412000-0x0000000000414000-memory.dmp

    Filesize

    8KB

  • memory/1256-1-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/1256-2-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/1256-4-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/1256-7-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/1256-9-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/1256-12-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/1256-14-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/1256-16-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/1256-19-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB