Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05-10-2024 03:26

General

  • Target

    15fad4414cbf900010e102976c55a7a0_JaffaCakes118.exe

  • Size

    227KB

  • MD5

    15fad4414cbf900010e102976c55a7a0

  • SHA1

    bfcbbd8b68b74f98bb79745ff01412789d7cd6df

  • SHA256

    80492abb6924a3baa8c0f8a58d211816c6917055b87ce6b8932c2020c673c60f

  • SHA512

    85f7acfe9927d46d91df64390936443cf7da1645526a5e597dd82faf2ad120ac7b4769679b28899f70d2b174433a9a3cf8bfd62ba9117fa7c0a2e4edfc24b51b

  • SSDEEP

    6144:91lE8umqehhwnNt+h5+stSQQHV3jz7pqWFkuK:91l1uJowG5vtSQWTJq+k

Malware Config

Extracted

Family

pony

C2

http://prestigecarstorage.com.au/wp-includes/Text/Text.php

http://mcmamina.cz/media/plg_quickicon_joomlaupdate/plg_quickicon_joomlaupdate.php

http://buyseoplan.com/wp-admin/includes/includes.php

http://letssaidiana.com/wp-admin/user/user.php

http://kenyadivas.com/media/editors/editors.php

http://keithgerchak.com/wp-admin/css/css.php

http://binarycashbackdaily.com/wp-admin/maint/maint.php

http://apexsitesolutions.com/main/wp-admin/mod_html.php

http://employerservice.net/wp-includes/theme-compat/theme-compat.php

http://hmb.com.au/wp-admin/images/images.php

http://denver-computer-repairs.com/wordpress2/wp-includes/fckeditor.php

http://hatmandoo.co.uk/cache/mod_menu/mod_menu.php

http://wizjafotografii.pl/wp-content/languages/languages.php

http://steve1der.com/wp-includes/css/css.php

http://elicense.studio98test.com/wp-content/themes/Action.php

http://resiteing.com/wp-content/ID3.php

http://mimembership.com/plugins/authentication/authentication.php

http://stephenvrichardson.com/wp-includes/css/css.php

http://mycasablancaflowers.com/wp-includes/js/js.php

http://staciriordan.com/wp-includes/images/images.php

Signatures

  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\15fad4414cbf900010e102976c55a7a0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\15fad4414cbf900010e102976c55a7a0_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2684
    • C:\Users\Admin\AppData\Local\Temp\15fad4414cbf900010e102976c55a7a0_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\15fad4414cbf900010e102976c55a7a0_JaffaCakes118.exe"
      2⤵
      • Accesses Microsoft Outlook accounts
      • Accesses Microsoft Outlook profiles
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • outlook_win_path
      PID:2844

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2684-12-0x00000000747F0000-0x0000000074D9B000-memory.dmp

    Filesize

    5.7MB

  • memory/2684-1-0x00000000747F0000-0x0000000074D9B000-memory.dmp

    Filesize

    5.7MB

  • memory/2684-2-0x00000000747F0000-0x0000000074D9B000-memory.dmp

    Filesize

    5.7MB

  • memory/2684-0-0x00000000747F1000-0x00000000747F2000-memory.dmp

    Filesize

    4KB

  • memory/2684-13-0x00000000747F0000-0x0000000074D9B000-memory.dmp

    Filesize

    5.7MB

  • memory/2844-9-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2844-5-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2844-3-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2844-7-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2844-8-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2844-14-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2844-15-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2844-16-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB