Analysis
-
max time kernel
142s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 00:57
Static task
static1
Behavioral task
behavioral1
Sample
8e5be600c26f2459d250a8cf1f5841cc_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8e5be600c26f2459d250a8cf1f5841cc_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
8e5be600c26f2459d250a8cf1f5841cc_JaffaCakes118.exe
-
Size
232KB
-
MD5
8e5be600c26f2459d250a8cf1f5841cc
-
SHA1
f9f0b8ecda2f63119364fb591e14c69bc7960b96
-
SHA256
33ab0605b83356e065459559bb81ec5e7464be563059fce607760517fedaf603
-
SHA512
b1b6dd14247d36e8218fcd9da64e7bf7609663aab73f600ef4a6bcadc7e8e4e4c77936b3a4aa886fc1d8380aeaf0d9608040a0f44060eccaaa698e8c6d103ac8
-
SSDEEP
3072:6VOWO38Nz42mDZ6U+dcuHf1jvlKkFyBErdwBhWxOns8UEM:cOWO385TcW1jNPyqSqo
Malware Config
Signatures
-
Locky
Ransomware strain released in 2016, with advanced features like anti-analysis.
-
Locky family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8e5be600c26f2459d250a8cf1f5841cc_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3936 8e5be600c26f2459d250a8cf1f5841cc_JaffaCakes118.exe