Analysis
-
max time kernel
140s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-09-2024 17:33
Static task
static1
Behavioral task
behavioral1
Sample
f68334f51b8f632ed7d5f16715efaee0_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
f68334f51b8f632ed7d5f16715efaee0_JaffaCakes118.exe
-
Size
94KB
-
MD5
f68334f51b8f632ed7d5f16715efaee0
-
SHA1
b9436251c5c874ea058436cbcb384c79239d6c95
-
SHA256
d4add91aa6f9621e7503b030b88bf0537c73c97de7deed282698b200e606a612
-
SHA512
01f643e2fa602bfbcd7738652c73c8fd4d3f30ee909aa3793ae6ca0d70da07102cf343d0599e58a8329963f212a56bf66727816f75802c101eb8e18dd932a15d
-
SSDEEP
1536:/pA2Mo48l1ZJ/R+faqQCyTSV/xLuA86U/jhgCGsJWVr9T83utpWClqDS8:3r3l1ZJ/4SqQC6ShxzaFgCTJWVr9T83b
Malware Config
Extracted
pony
http://176.28.18.135:8080/pony/gate.php
http://85.214.243.87:8080/pony/gate.php
http://88.85.99.44:8080/pony/gate.php
-
payload_url
http://cinecolor.com.ar/GPFito.exe
http://www.bomcreto.com.br/sWt7gc5m.exe
http://hellenic-antiaging-academy.gr/2wY.exe
http://www.chapliniana.com/YCjPqL.exe
Signatures
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f68334f51b8f632ed7d5f16715efaee0_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeImpersonatePrivilege 4436 f68334f51b8f632ed7d5f16715efaee0_JaffaCakes118.exe Token: SeTcbPrivilege 4436 f68334f51b8f632ed7d5f16715efaee0_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 4436 f68334f51b8f632ed7d5f16715efaee0_JaffaCakes118.exe Token: SeCreateTokenPrivilege 4436 f68334f51b8f632ed7d5f16715efaee0_JaffaCakes118.exe Token: SeBackupPrivilege 4436 f68334f51b8f632ed7d5f16715efaee0_JaffaCakes118.exe Token: SeRestorePrivilege 4436 f68334f51b8f632ed7d5f16715efaee0_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 4436 f68334f51b8f632ed7d5f16715efaee0_JaffaCakes118.exe Token: SeAssignPrimaryTokenPrivilege 4436 f68334f51b8f632ed7d5f16715efaee0_JaffaCakes118.exe