Analysis
-
max time kernel
141s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-11-2024 16:20
Static task
static1
Behavioral task
behavioral1
Sample
b26f771a5e7d1a74849d7003408d33c6_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b26f771a5e7d1a74849d7003408d33c6_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
b26f771a5e7d1a74849d7003408d33c6_JaffaCakes118.exe
-
Size
164KB
-
MD5
b26f771a5e7d1a74849d7003408d33c6
-
SHA1
fda390d195ddf519ce389a5b0d846cfd848bc675
-
SHA256
652f6b3070da5a91df67f5095abf25e5766ece96ef49d966baeea4aebdd9d313
-
SHA512
bf41662d80203bf5a62aa7d8a97dbd80c85165459106d92bcbe5b924033302e9466d8eb7322b868ff0fa7c62f2fb1c94cdbb29c5d058ce2dee1bed2169812c65
-
SSDEEP
3072:2ZxvubmR6ubFZb9olpIP1Zc0CSh1sKuvZzfT3Q3ELd0AlpoWlpv+N:yZRZbjeSc0CSh1s5ZzL3uEMWlp
Malware Config
Signatures
-
Locky
Ransomware strain released in 2016, with advanced features like anti-analysis.
-
Locky family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b26f771a5e7d1a74849d7003408d33c6_JaffaCakes118.exe