Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    08-12-2024 16:31

General

  • Target

    d7fb420ab0a61d8b58b8c06490855671_JaffaCakes118.exe

  • Size

    272KB

  • MD5

    d7fb420ab0a61d8b58b8c06490855671

  • SHA1

    29a429ca06c7ac4e0df4432af6d57ddb7d5c8373

  • SHA256

    561bbaeec4345c50699dbdd373757b039a7cf4e03c54d3765ece6f5d274c0612

  • SHA512

    14c1e701f6b963915c3e87bd5088c96703df0f53917a5df47553b1e2d066231c52a9d605e200eaee449bd17ba6005abaf1c7af9c6f1ec69f566c7e2058a487b4

  • SSDEEP

    3072:20bCaBjgxdWeNdq3ZWC4iuLAVBpH/Z0GIeHUVuVXFyBErdwBthS9WCK:b3Bn58C46ZDIEUVufyqSLrd

Malware Config

Signatures

  • Locky

    Ransomware strain released in 2016, with advanced features like anti-analysis.

  • Locky family
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d7fb420ab0a61d8b58b8c06490855671_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d7fb420ab0a61d8b58b8c06490855671_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    PID:1864

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1864-1-0x0000000000B00000-0x0000000000B48000-memory.dmp

    Filesize

    288KB

  • memory/1864-0-0x0000000000B12000-0x0000000000B14000-memory.dmp

    Filesize

    8KB

  • memory/1864-2-0x0000000000B00000-0x0000000000B48000-memory.dmp

    Filesize

    288KB

  • memory/1864-4-0x0000000000B12000-0x0000000000B14000-memory.dmp

    Filesize

    8KB

  • memory/1864-5-0x0000000000B00000-0x0000000000B48000-memory.dmp

    Filesize

    288KB

  • memory/1864-7-0x0000000000B00000-0x0000000000B48000-memory.dmp

    Filesize

    288KB

  • memory/1864-10-0x0000000000B00000-0x0000000000B48000-memory.dmp

    Filesize

    288KB

  • memory/1864-13-0x0000000000B00000-0x0000000000B48000-memory.dmp

    Filesize

    288KB

  • memory/1864-15-0x0000000000B00000-0x0000000000B48000-memory.dmp

    Filesize

    288KB

  • memory/1864-17-0x0000000000B00000-0x0000000000B48000-memory.dmp

    Filesize

    288KB

  • memory/1864-19-0x0000000000B00000-0x0000000000B48000-memory.dmp

    Filesize

    288KB