Analysis

  • max time kernel
    142s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-11-2024 00:57

General

  • Target

    8e5be600c26f2459d250a8cf1f5841cc_JaffaCakes118.exe

  • Size

    232KB

  • MD5

    8e5be600c26f2459d250a8cf1f5841cc

  • SHA1

    f9f0b8ecda2f63119364fb591e14c69bc7960b96

  • SHA256

    33ab0605b83356e065459559bb81ec5e7464be563059fce607760517fedaf603

  • SHA512

    b1b6dd14247d36e8218fcd9da64e7bf7609663aab73f600ef4a6bcadc7e8e4e4c77936b3a4aa886fc1d8380aeaf0d9608040a0f44060eccaaa698e8c6d103ac8

  • SSDEEP

    3072:6VOWO38Nz42mDZ6U+dcuHf1jvlKkFyBErdwBhWxOns8UEM:cOWO385TcW1jNPyqSqo

Malware Config

Signatures

  • Locky

    Ransomware strain released in 2016, with advanced features like anti-analysis.

  • Locky family
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8e5be600c26f2459d250a8cf1f5841cc_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8e5be600c26f2459d250a8cf1f5841cc_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    PID:3936

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3936-0-0x0000000000E12000-0x0000000000E14000-memory.dmp

    Filesize

    8KB

  • memory/3936-1-0x0000000000E00000-0x0000000000E40000-memory.dmp

    Filesize

    256KB

  • memory/3936-3-0x0000000000E00000-0x0000000000E40000-memory.dmp

    Filesize

    256KB

  • memory/3936-4-0x0000000000E00000-0x0000000000E40000-memory.dmp

    Filesize

    256KB

  • memory/3936-7-0x0000000000E00000-0x0000000000E40000-memory.dmp

    Filesize

    256KB

  • memory/3936-9-0x0000000000E00000-0x0000000000E40000-memory.dmp

    Filesize

    256KB

  • memory/3936-11-0x0000000000E00000-0x0000000000E40000-memory.dmp

    Filesize

    256KB

  • memory/3936-14-0x0000000000E00000-0x0000000000E40000-memory.dmp

    Filesize

    256KB

  • memory/3936-17-0x0000000000E00000-0x0000000000E40000-memory.dmp

    Filesize

    256KB