Analysis

  • max time kernel
    143s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-11-2024 17:06

General

  • Target

    8691717a46dfb79488434c563eb78774_JaffaCakes118.exe

  • Size

    206KB

  • MD5

    8691717a46dfb79488434c563eb78774

  • SHA1

    d37c8b58724bdb81dab73b56444741755c685f17

  • SHA256

    bd62499a007edefc188189e193c62bd869b4df0d5f2ccad3ae666ad46a38a239

  • SHA512

    870abfccf32353c190caf2be2829a48eb7a29c1d61217af8f82975d5d6bc2997517ea9c9de5184874d8a485c991bafd6ffb17b6b57d79bfb58384ec315e43206

  • SSDEEP

    3072:cHL9q3U2Cx9YxOeHuCOQr4NuLAGE7/H/Im+j+CsPaTLhpc6:cHLWUXLYxONCJr4NIm+j+CH

Malware Config

Signatures

  • Locky

    Ransomware strain released in 2016, with advanced features like anti-analysis.

  • Locky family
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8691717a46dfb79488434c563eb78774_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8691717a46dfb79488434c563eb78774_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    PID:2964

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2964-0-0x0000000000400000-0x0000000000437000-memory.dmp

    Filesize

    220KB

  • memory/2964-2-0x0000000000400000-0x0000000000437000-memory.dmp

    Filesize

    220KB

  • memory/2964-1-0x0000000000419000-0x000000000041A000-memory.dmp

    Filesize

    4KB

  • memory/2964-3-0x0000000000400000-0x0000000000437000-memory.dmp

    Filesize

    220KB

  • memory/2964-5-0x0000000000400000-0x0000000000437000-memory.dmp

    Filesize

    220KB

  • memory/2964-6-0x0000000000419000-0x000000000041A000-memory.dmp

    Filesize

    4KB

  • memory/2964-9-0x0000000000400000-0x0000000000437000-memory.dmp

    Filesize

    220KB

  • memory/2964-12-0x0000000000400000-0x0000000000437000-memory.dmp

    Filesize

    220KB

  • memory/2964-13-0x0000000000400000-0x0000000000437000-memory.dmp

    Filesize

    220KB

  • memory/2964-17-0x0000000000400000-0x0000000000437000-memory.dmp

    Filesize

    220KB

  • memory/2964-19-0x0000000000400000-0x0000000000437000-memory.dmp

    Filesize

    220KB

  • memory/2964-20-0x0000000000400000-0x0000000000437000-memory.dmp

    Filesize

    220KB

  • memory/2964-21-0x0000000000400000-0x0000000000437000-memory.dmp

    Filesize

    220KB