General
-
Target
814125b0ce13c08ee19186e0d2953843_JaffaCakes118
-
Size
159KB
-
Sample
241031-c3rq5sxgmg
-
MD5
814125b0ce13c08ee19186e0d2953843
-
SHA1
3ca81a57c7388834a4d4bb4d2239c605ffa9820d
-
SHA256
e8cfa0b355e7edf3944a092a7fcfa24fbf5c699af32e996b692ed9d956f6dec9
-
SHA512
c815eb0974cc7de1bdbfdfc9e01f301afbfd9c8544518ff0ecc7cbcdf957e7ef7b359200a010200df5be85f41072e722eb7c711aac8b1b0842ffdf47a9f21eff
-
SSDEEP
3072:7doAAx8vuAsNJUvRmwnQr1ycBgyXIWOZuNKtVi:2dkQJUvQe41VYWguNKtQ
Static task
static1
Behavioral task
behavioral1
Sample
814125b0ce13c08ee19186e0d2953843_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
814125b0ce13c08ee19186e0d2953843_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://srv.usedcrotchrockets.com/forum/viewtopic.php
http://srv.michigancrotchrockets.com/forum/viewtopic.php
-
payload_url
http://apasaweb.com/JMwPrNzg.exe
http://rochanhouse.com/VMS.exe
http://www.as-you-likeit.co.uk/STPRvE6.exe
http://kipadanceacademy.com/crvFb.exe
http://nesamithran.com/eBB.exe
http://william.one2.it/s74ZVST.exe
http://adanadakidershaneler.com/vjsL.exe
http://www.qtsinc.net/R2o.exe
Targets
-
-
Target
814125b0ce13c08ee19186e0d2953843_JaffaCakes118
-
Size
159KB
-
MD5
814125b0ce13c08ee19186e0d2953843
-
SHA1
3ca81a57c7388834a4d4bb4d2239c605ffa9820d
-
SHA256
e8cfa0b355e7edf3944a092a7fcfa24fbf5c699af32e996b692ed9d956f6dec9
-
SHA512
c815eb0974cc7de1bdbfdfc9e01f301afbfd9c8544518ff0ecc7cbcdf957e7ef7b359200a010200df5be85f41072e722eb7c711aac8b1b0842ffdf47a9f21eff
-
SSDEEP
3072:7doAAx8vuAsNJUvRmwnQr1ycBgyXIWOZuNKtVi:2dkQJUvQe41VYWguNKtQ
-
Pony family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-