Analysis
-
max time kernel
140s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-12-2024 06:03
Static task
static1
Behavioral task
behavioral1
Sample
d0fbddea5761662f3797a72c470c68cf_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d0fbddea5761662f3797a72c470c68cf_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
d0fbddea5761662f3797a72c470c68cf_JaffaCakes118.exe
-
Size
245KB
-
MD5
d0fbddea5761662f3797a72c470c68cf
-
SHA1
f735ebcb04a9262825b8d3b7e2b09c8a52295856
-
SHA256
33d7fe688a9043fa27440f75858db865f665e8fadf309ecf61c3a28bbf9a8e91
-
SHA512
b0a3ded266353e8f91d371c933f6eac6b5c45b2a66522db3ee32456346e117c92aa4a7ecfbd494a9e81ca5e30b8324dd7e2b2d596f0db0412ebab23424791baf
-
SSDEEP
3072:i9o7klayvN1INuMI6xcjPp/63x42pEuLAGg7oH/98ootd3cTJ9wJTon2MeYkUEj:id4YINrI66PB+42l98oa3CEEVe
Malware Config
Signatures
-
Locky
Ransomware strain released in 2016, with advanced features like anti-analysis.
-
Locky family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d0fbddea5761662f3797a72c470c68cf_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1872 d0fbddea5761662f3797a72c470c68cf_JaffaCakes118.exe