Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    11-09-2024 18:21

General

  • Target

    daf54168bd982ea07227c1d2a8938ff4_JaffaCakes118.exe

  • Size

    78KB

  • MD5

    daf54168bd982ea07227c1d2a8938ff4

  • SHA1

    33792fcb950fae2cb197366e7afe8882f13eda5b

  • SHA256

    4c0b23abd7fac2423a980b494292d23ba7dda5c7f475a73d8e6f5a361a17bfff

  • SHA512

    252823c95987f0d764c25c55f8cababa7191d13bfb4bcf8e14647e20c637669b3b5dd0071e2574e8af697bf630022b4431ba07c41aeabc8b3097caf155bb65c5

  • SSDEEP

    1536:dbLB9JLCqi30180C+Gfacgec+CRKkZfefDwwvIq/j7Xfc:d3Bm9kO0aFCKktyDh/H

Malware Config

Extracted

Family

pony

C2

http://www.alberghi.com:8080/ponybb/gate.php

http://buyandsmile.atomclick.co:8080/ponybb/gate.php

Attributes
  • payload_url

    http://stereovale.fm/PKrmx7Wf/uRWTF.exe

    http://periodicosemilladevida.com/QLsAUAjd/kgo.exe

Signatures

  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\daf54168bd982ea07227c1d2a8938ff4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\daf54168bd982ea07227c1d2a8938ff4_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3024
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3024 -s 188
      2⤵
      • Program crash
      PID:2372

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3024-1-0x0000000000290000-0x00000000002AA000-memory.dmp

    Filesize

    104KB

  • memory/3024-0-0x0000000000270000-0x000000000028A000-memory.dmp

    Filesize

    104KB

  • memory/3024-2-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/3024-3-0x0000000000290000-0x00000000002AA000-memory.dmp

    Filesize

    104KB