Analysis

  • max time kernel
    130s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    27-11-2024 11:13

General

  • Target

    a7918e736e5583bd8952d34fe3d8cd7f_JaffaCakes118.exe

  • Size

    287KB

  • MD5

    a7918e736e5583bd8952d34fe3d8cd7f

  • SHA1

    686cdfef4458b28b5fe37ea421886fbaf2fc9da6

  • SHA256

    4da4801c5ae6e801b978c430fb733e28443e98510af818246f34101f5686556c

  • SHA512

    9db7265e510d6a23fdddb7a74a482145e91df835815287d6dc33509ae77b0ebf9005b8e0c37bd94fd119c7147541856d4d837bbadcdf60b30c73410eef5b7156

  • SSDEEP

    3072:u9QDp3692dmvQDWiQcfTcGwDwzAKKWkVZ/e/M3rkVV3Yw1RwnKPGxWpQxr5d2dhq:iqqNvQDseAKjN84VV33DpI2dHc

Malware Config

Signatures

  • Locky

    Ransomware strain released in 2016, with advanced features like anti-analysis.

  • Locky family
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a7918e736e5583bd8952d34fe3d8cd7f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a7918e736e5583bd8952d34fe3d8cd7f_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2612

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2612-0-0x00000000024F0000-0x000000000250B000-memory.dmp

    Filesize

    108KB