Analysis

  • max time kernel
    92s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-04-2024 19:57

General

  • Target

    f8a868619208bb0d7dde8df24c658a61_JaffaCakes118.exe

  • Size

    144KB

  • MD5

    f8a868619208bb0d7dde8df24c658a61

  • SHA1

    3a556e0ddf9af3a0b967b9946c8d6550c3611845

  • SHA256

    21e396987073dca6f3ca2f63874b0e40f6f355dcad1fe75d44e8c6533cb8fd4e

  • SHA512

    3cc29d6e1ab7d9a75c8ed592fbc7c5d789ddc5c94d46c1b6fa1c632cddfa895fd936ea00bdfc0541792184cfd170fb859eb2dfc4d57f5fd4695fcd6598ba4404

  • SSDEEP

    3072:s0IYwk7xA1rHbSnCZYoB1rLAxgutQb0HdUyY6CpaJFsZLoYHYd:nIYwkdMSn8YoLLVrbwzuaj2rH0

Score
10/10

Malware Config

Extracted

Family

pony

C2

http://74.53.97.66:8080/forum/viewtopic.php

http://74.53.97.67:8080/forum/viewtopic.php

Attributes
  • payload_url

    http://orion.obidigital.net/d09ZhGf.exe

    http://ftp.lastraautosport.com.ar/xjH.exe

Signatures

  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f8a868619208bb0d7dde8df24c658a61_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f8a868619208bb0d7dde8df24c658a61_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4024
    • C:\Users\Admin\AppData\Local\Temp\f8a868619208bb0d7dde8df24c658a61_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\f8a868619208bb0d7dde8df24c658a61_JaffaCakes118.exe"
      2⤵
        PID:4196

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4024-0-0x00000000004C0000-0x00000000004EF000-memory.dmp
      Filesize

      188KB

    • memory/4024-1-0x00000000004C0000-0x00000000004EF000-memory.dmp
      Filesize

      188KB