Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-12-2024 17:29
Static task
static1
Behavioral task
behavioral1
Sample
ce31e5c123842708522c5b8330481345_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ce31e5c123842708522c5b8330481345_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
ce31e5c123842708522c5b8330481345_JaffaCakes118.exe
-
Size
208KB
-
MD5
ce31e5c123842708522c5b8330481345
-
SHA1
29191f592be098b136c85a605fb23ded318a923d
-
SHA256
f0ce08d7cf47baa342274474ef9db7714e6a79fed9cc4ad9744aeecb524e2821
-
SHA512
0b4233ba0ad11a83c1fd65e33b2f3c6c64a5fe7faeb6bd5264687ce4b70b7921c77a4c2e92b29e774022b0793c123c2a5d4b6c1144e95fdcf459b5df957333ea
-
SSDEEP
3072:IHa4VEfoavSJqHnYPgAPD79d2nD4LuLAGg7/H/AS1rauXHs8xTgLbVi:IHlavGqHYoC79d2D4bASdhH7I
Malware Config
Signatures
-
Locky
Ransomware strain released in 2016, with advanced features like anti-analysis.
-
Locky family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ce31e5c123842708522c5b8330481345_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2204 ce31e5c123842708522c5b8330481345_JaffaCakes118.exe