Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/07/2024, 17:45 UTC

General

  • Target

    42b4389eb9d1b0ad7522e2da4431e827_JaffaCakes118.exe

  • Size

    144KB

  • MD5

    42b4389eb9d1b0ad7522e2da4431e827

  • SHA1

    1cf01e9b8d67263344cdc793d0670be877acac8b

  • SHA256

    f3209ab8fd42d933bf1923997b2fdd7ba83cdc838c9c4b1f5c38b65bffde384b

  • SHA512

    2a7f9db83d874b5e68462035fd61bb7b78e69869c13bc7199330e3aeccb57963b72ce41c1e55bf003ef04ae7d50c943c56b706cff9dacee0c4c3f50cf7a5693f

  • SSDEEP

    3072:s0IYwk7xA1oC/fD55ZxaII2Y1WGbGYRcaU+5paJmvLFUQs:nIYwkdOfFvxaBVrb3GSacvLfs

Malware Config

Extracted

Family

pony

C2

http://74.53.97.66:8080/ponys/gate.php

http://74.53.97.67:8080/ponys/gate.php

Attributes
  • payload_url

    http://bde-essec.com/1ePZ.exe

    http://wilde.webprojekt.ch/uyNcp.exe

    http://www.ronale.com/rFsckgVS.exe

    http://207.57.248.58/1VyR6.exe

Signatures

  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\42b4389eb9d1b0ad7522e2da4431e827_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\42b4389eb9d1b0ad7522e2da4431e827_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2124
    • C:\Users\Admin\AppData\Local\Temp\42b4389eb9d1b0ad7522e2da4431e827_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\42b4389eb9d1b0ad7522e2da4431e827_JaffaCakes118.exe"
      2⤵
      • Accesses Microsoft Outlook accounts
      • Accesses Microsoft Outlook profiles
      • Suspicious use of AdjustPrivilegeToken
      • outlook_win_path
      PID:4768

Network

  • flag-us
    DNS
    72.32.126.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    72.32.126.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    43.58.199.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    43.58.199.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    86.23.85.13.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    86.23.85.13.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    56.126.166.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    56.126.166.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    0.205.248.87.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    0.205.248.87.in-addr.arpa
    IN PTR
    Response
    0.205.248.87.in-addr.arpa
    IN PTR
    https-87-248-205-0lgwllnwnet
  • 74.53.97.66:8080
    42b4389eb9d1b0ad7522e2da4431e827_JaffaCakes118.exe
    260 B
    5
  • 74.53.97.66:8080
    42b4389eb9d1b0ad7522e2da4431e827_JaffaCakes118.exe
    260 B
    5
  • 74.53.97.66:8080
    42b4389eb9d1b0ad7522e2da4431e827_JaffaCakes118.exe
    260 B
    5
  • 74.53.97.66:8080
    42b4389eb9d1b0ad7522e2da4431e827_JaffaCakes118.exe
    260 B
    5
  • 74.53.97.66:8080
    42b4389eb9d1b0ad7522e2da4431e827_JaffaCakes118.exe
    260 B
    5
  • 74.53.97.66:8080
    42b4389eb9d1b0ad7522e2da4431e827_JaffaCakes118.exe
    260 B
    5
  • 8.8.8.8:53
    72.32.126.40.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    72.32.126.40.in-addr.arpa

  • 8.8.8.8:53
    43.58.199.20.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    43.58.199.20.in-addr.arpa

  • 8.8.8.8:53
    86.23.85.13.in-addr.arpa
    dns
    70 B
    144 B
    1
    1

    DNS Request

    86.23.85.13.in-addr.arpa

  • 8.8.8.8:53
    56.126.166.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    56.126.166.20.in-addr.arpa

  • 8.8.8.8:53
    0.205.248.87.in-addr.arpa
    dns
    71 B
    116 B
    1
    1

    DNS Request

    0.205.248.87.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2124-0-0x0000000000220000-0x000000000024F000-memory.dmp

    Filesize

    188KB

  • memory/2124-4-0x0000000000220000-0x000000000024F000-memory.dmp

    Filesize

    188KB

  • memory/4768-1-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/4768-5-0x0000000000220000-0x000000000024F000-memory.dmp

    Filesize

    188KB

  • memory/4768-6-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/4768-7-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/4768-8-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.