Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25-08-2024 08:22
Static task
static1
Behavioral task
behavioral1
Sample
c053d0a315bea8021f623000b65fb4e7_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
c053d0a315bea8021f623000b65fb4e7_JaffaCakes118.exe
-
Size
147KB
-
MD5
c053d0a315bea8021f623000b65fb4e7
-
SHA1
807e1a62171edade5e4d82a169291706bb3ba2f8
-
SHA256
f9075bac0d917afb162c3295de460d85bae6d73fdb23ba073bad050ab2dae665
-
SHA512
0ad19146d416f6d058ab70909b538f29901b1b2a5c16c23cac8e94d22e621bf25ea48b8be3c5b4268fbaa0c55593164cbbffc80ede14aa0a6d6d25b4d459de3d
-
SSDEEP
3072:z5Rfr1ZZpFhVpnEXGCWSVqCVoVsRE6mo4mgjuJNDl:z5tr5BVFEBjVqCxOtjiND
Malware Config
Extracted
pony
http://217.20.117.145:8080/pony/gate.php
http://217.20.118.117:8080/pony/gate.php
-
payload_url
http://00e13f8.netsolhost.com/Rnx.exe
http://pcshopper.com.au/xPTy0T.exe
http://procurement.citarum.org/yqWP.exe
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c053d0a315bea8021f623000b65fb4e7_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1948 wrote to memory of 1664 1948 c053d0a315bea8021f623000b65fb4e7_JaffaCakes118.exe 30 PID 1948 wrote to memory of 1664 1948 c053d0a315bea8021f623000b65fb4e7_JaffaCakes118.exe 30 PID 1948 wrote to memory of 1664 1948 c053d0a315bea8021f623000b65fb4e7_JaffaCakes118.exe 30 PID 1948 wrote to memory of 1664 1948 c053d0a315bea8021f623000b65fb4e7_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\c053d0a315bea8021f623000b65fb4e7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c053d0a315bea8021f623000b65fb4e7_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\c053d0a315bea8021f623000b65fb4e7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c053d0a315bea8021f623000b65fb4e7_JaffaCakes118.exe"2⤵PID:1664
-