Analysis

  • max time kernel
    140s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-11-2024 16:20

General

  • Target

    b26f771a5e7d1a74849d7003408d33c6_JaffaCakes118.exe

  • Size

    164KB

  • MD5

    b26f771a5e7d1a74849d7003408d33c6

  • SHA1

    fda390d195ddf519ce389a5b0d846cfd848bc675

  • SHA256

    652f6b3070da5a91df67f5095abf25e5766ece96ef49d966baeea4aebdd9d313

  • SHA512

    bf41662d80203bf5a62aa7d8a97dbd80c85165459106d92bcbe5b924033302e9466d8eb7322b868ff0fa7c62f2fb1c94cdbb29c5d058ce2dee1bed2169812c65

  • SSDEEP

    3072:2ZxvubmR6ubFZb9olpIP1Zc0CSh1sKuvZzfT3Q3ELd0AlpoWlpv+N:yZRZbjeSc0CSh1s5ZzL3uEMWlp

Malware Config

Signatures

  • Locky

    Ransomware strain released in 2016, with advanced features like anti-analysis.

  • Locky family
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b26f771a5e7d1a74849d7003408d33c6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b26f771a5e7d1a74849d7003408d33c6_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2816

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2816-0-0x0000000000A00000-0x0000000000A01000-memory.dmp

    Filesize

    4KB

  • memory/2816-1-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2816-2-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2816-3-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2816-5-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2816-7-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2816-10-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2816-12-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2816-15-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2816-17-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB