Analysis

  • max time kernel
    73s
  • max time network
    53s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-04-2024 05:44

Errors

Reason
Machine shutdown

General

  • Target

    047f37facd431e3010b629abd50f7883_JaffaCakes118.exe

  • Size

    2.2MB

  • MD5

    047f37facd431e3010b629abd50f7883

  • SHA1

    0ed04a75a2dd155b4013aa1100f526d74cf15708

  • SHA256

    a153fd22bd65af6bba8e32115945a02306e0c0d878bfba25915c5f4bc385583f

  • SHA512

    cbc533282b9021023cc52101fa25df49f96017f9aa692a843b02c198421bcfc47281459e1c8c3a533b883935d7b389995d5a9a19ee668510b6953758e7ba7a28

  • SSDEEP

    24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZm:0UzeyQMS4DqodCnoe+iitjWwwC

Malware Config

Extracted

Family

pony

C2

http://don.service-master.eu/gate.php

Attributes
  • payload_url

    http://don.service-master.eu/shit.exe

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Modifies Installed Components in the registry 2 TTPs 2 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 19 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 21 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 36 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\047f37facd431e3010b629abd50f7883_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\047f37facd431e3010b629abd50f7883_JaffaCakes118.exe"
    1⤵
    • Drops startup file
    • Suspicious use of SetThreadContext
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4624
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:5048
      • C:\Users\Admin\AppData\Local\Temp\047f37facd431e3010b629abd50f7883_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\047f37facd431e3010b629abd50f7883_JaffaCakes118.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2224
        • \??\c:\windows\system\explorer.exe
          c:\windows\system\explorer.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Drops file in Windows directory
          • Suspicious use of WriteProcessMemory
          PID:4840
          • \??\c:\windows\system\explorer.exe
            "c:\windows\system\explorer.exe"
            4⤵
            • Modifies WinLogon for persistence
            • Modifies visiblity of hidden/system files in Explorer
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:3644
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Drops file in Windows directory
              PID:1376
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Drops file in Windows directory
              PID:4616
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Drops file in Windows directory
              PID:3156
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Drops file in Windows directory
              PID:960
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Drops file in Windows directory
              PID:4840
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Drops file in Windows directory
              PID:440
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Drops file in Windows directory
              PID:2100
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Drops file in Windows directory
              PID:3812
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Drops file in Windows directory
              PID:2204
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Drops file in Windows directory
              PID:3724
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Drops file in Windows directory
              PID:4140
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Drops file in Windows directory
              PID:3908
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Drops file in Windows directory
              PID:1624
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Drops file in Windows directory
              PID:2652
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Drops file in Windows directory
              PID:1660
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Drops file in Windows directory
              PID:3104
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              PID:5100
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc
      1⤵
        PID:1192

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Persistence

      Boot or Logon Autostart Execution

      3
      T1547

      Registry Run Keys / Startup Folder

      2
      T1547.001

      Winlogon Helper DLL

      1
      T1547.004

      Privilege Escalation

      Boot or Logon Autostart Execution

      3
      T1547

      Registry Run Keys / Startup Folder

      2
      T1547.001

      Winlogon Helper DLL

      1
      T1547.004

      Defense Evasion

      Modify Registry

      4
      T1112

      Hide Artifacts

      1
      T1564

      Hidden Files and Directories

      1
      T1564.001

      Discovery

      System Information Discovery

      1
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\Parameters.ini
        Filesize

        74B

        MD5

        6687785d6a31cdf9a5f80acb3abc459b

        SHA1

        1ddda26cc18189770eaaa4a9e78cc4abe4fe39c9

        SHA256

        3b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b

        SHA512

        5fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962

      • C:\Windows\System\explorer.exe
        Filesize

        2.2MB

        MD5

        c95df27badca693f1c61aa8074d16b5b

        SHA1

        1bb013d2d6c85cf59dc4b0bce99e8fd78d4e7075

        SHA256

        055ccd36fecb08c8c56e9b977e7c4b21779f2b80444c8c94fd653cd4ed014a8f

        SHA512

        6910484773786ff2a7fe5d38b160479a2e41ed27f5c84a145a4e8c2ffd1c0684b1cd43958fa9d3215326b9fcc4570d3ca1407e2005f7c21800100d50784edce0

      • C:\Windows\System\spoolsv.exe
        Filesize

        2.2MB

        MD5

        8d475f4da95e5d43924d89fb8d1c6c95

        SHA1

        2966fc835e63c9e8e5dc4a38d231751355d980ac

        SHA256

        ddea36d71faffe9cd38825cea64b84c5ba55bb48b06a5cb1c2c8e5fcd90ebabd

        SHA512

        c75fb0c1bd630474ae3ad0330a9007ea316ccd1045467031b50d07eff25351e2ce97b02a4f30475234f94ee1ae813f164d640470190b160b4bf3fe1a5f501eff

      • memory/960-966-0x0000000000400000-0x00000000005D3000-memory.dmp
        Filesize

        1.8MB

      • memory/1376-798-0x0000000000400000-0x00000000005D3000-memory.dmp
        Filesize

        1.8MB

      • memory/2224-65-0x0000000000400000-0x000000000043E000-memory.dmp
        Filesize

        248KB

      • memory/2224-26-0x0000000000400000-0x000000000043E000-memory.dmp
        Filesize

        248KB

      • memory/2224-27-0x0000000000400000-0x000000000043E000-memory.dmp
        Filesize

        248KB

      • memory/2224-63-0x0000000000440000-0x0000000000509000-memory.dmp
        Filesize

        804KB

      • memory/3156-965-0x0000000000400000-0x00000000005D3000-memory.dmp
        Filesize

        1.8MB

      • memory/3644-797-0x0000000000400000-0x000000000043E000-memory.dmp
        Filesize

        248KB

      • memory/3644-76-0x0000000000400000-0x000000000043E000-memory.dmp
        Filesize

        248KB

      • memory/4616-964-0x0000000000400000-0x00000000005D3000-memory.dmp
        Filesize

        1.8MB

      • memory/4624-23-0x0000000002450000-0x0000000002451000-memory.dmp
        Filesize

        4KB

      • memory/4624-28-0x0000000000400000-0x00000000005D3000-memory.dmp
        Filesize

        1.8MB

      • memory/4624-21-0x0000000000400000-0x00000000005D3000-memory.dmp
        Filesize

        1.8MB

      • memory/4624-0-0x0000000002450000-0x0000000002451000-memory.dmp
        Filesize

        4KB

      • memory/4840-77-0x0000000000400000-0x00000000005D3000-memory.dmp
        Filesize

        1.8MB

      • memory/4840-71-0x0000000000400000-0x00000000005D3000-memory.dmp
        Filesize

        1.8MB