Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
07-12-2024 14:25
Static task
static1
Behavioral task
behavioral1
Sample
d2ea1565ae004368655edb5169b56a0f_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
d2ea1565ae004368655edb5169b56a0f_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
d2ea1565ae004368655edb5169b56a0f_JaffaCakes118.exe
-
Size
164KB
-
MD5
d2ea1565ae004368655edb5169b56a0f
-
SHA1
81bc3b9503ef24041463b35fb9661184324ea3f1
-
SHA256
9b4b37cbb9845b093867675fb898330a8bd7ed087d587cba8cd21064c9a6e526
-
SHA512
78fb07aa606fce5744b084b876b3611dd349958e77d67dc31624da17ac0e68f3a142255459be3635e136da0acd40a30493e7dfd3c6a51f5b610591a744df79d7
-
SSDEEP
3072:zBo5njYrO43q3ipYxfrFuPf7am+d7JuN4AD7:1qkrO3yyuPTe7QN
Malware Config
Signatures
-
Locky
Ransomware strain released in 2016, with advanced features like anti-analysis.
-
Locky family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d2ea1565ae004368655edb5169b56a0f_JaffaCakes118.exe