Analysis
-
max time kernel
140s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-11-2024 15:06
Behavioral task
behavioral1
Sample
8c17a93ca83088f4b948cd28086aac32_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8c17a93ca83088f4b948cd28086aac32_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
8c17a93ca83088f4b948cd28086aac32_JaffaCakes118.exe
-
Size
792KB
-
MD5
8c17a93ca83088f4b948cd28086aac32
-
SHA1
98920090ee3396b7874db97c12ccea7aa0e56485
-
SHA256
2ca5477b16861722df3bb19b065b47cb5a404ea6f31361bb41a3de4713b6fa20
-
SHA512
ac5ef2e1c96d6d1c8d7ec18a9cf87b6ab2d9d2eb3a1966b44cd00e0c80888cc5f8be5ee3bc741bfea5313ff8da0dbf9789364e9acbdc4809834b5212dc9b5839
-
SSDEEP
24576:wC3CAXSU2piwKuq89LrnjjUafpVMUXfnu:wCvX3SLrn0KtX2
Malware Config
Signatures
-
Detected Xorist Ransomware 1 IoCs
Processes:
resource yara_rule behavioral2/memory/5056-1-0x0000000000400000-0x00000000004CC000-memory.dmp family_xorist -
Xorist Ransomware
Xorist is a ransomware first seen in 2020.
-
Xorist family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
8c17a93ca83088f4b948cd28086aac32_JaffaCakes118.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8c17a93ca83088f4b948cd28086aac32_JaffaCakes118.exe