Analysis

  • max time kernel
    140s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-12-2024 04:27

General

  • Target

    d53c8fd2babf9c9b56d1cfcf516a54bf_JaffaCakes118.exe

  • Size

    192KB

  • MD5

    d53c8fd2babf9c9b56d1cfcf516a54bf

  • SHA1

    3b32944db57a8d26a3b6cc305e246b312430f499

  • SHA256

    b88ec903245aeb428740f767e85400915c6dbb3df5790ce31c4865f9342bc125

  • SHA512

    0e0fb2a3bafd42071a8b041d9f6fe6faf759c3450593d220dc4451a6da6e940504c44102997a7ef18b9abda4fc79e1b904bce0288aba5bff9001b4d750ea53c5

  • SSDEEP

    3072:4Gl0vj8Hva0LIZh0h7aDFX1i2qtjRqfO7jerHc/NOxCn0RmMjFzpX18GTa+:4Gl0GfIn6781yhXe44xCAFpX1

Malware Config

Signatures

  • Locky

    Ransomware strain released in 2016, with advanced features like anti-analysis.

  • Locky family
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d53c8fd2babf9c9b56d1cfcf516a54bf_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d53c8fd2babf9c9b56d1cfcf516a54bf_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    PID:5052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/5052-0-0x0000000000418000-0x000000000041A000-memory.dmp

    Filesize

    8KB

  • memory/5052-1-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/5052-2-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/5052-4-0x0000000000418000-0x000000000041A000-memory.dmp

    Filesize

    8KB

  • memory/5052-5-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/5052-7-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/5052-10-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/5052-12-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/5052-15-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/5052-17-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/5052-19-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB