Analysis
-
max time kernel
144s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
03-11-2024 05:35
Static task
static1
Behavioral task
behavioral1
Sample
89deca7b716140975b45a3ce0272e7b5_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
89deca7b716140975b45a3ce0272e7b5_JaffaCakes118.exe
-
Size
95KB
-
MD5
89deca7b716140975b45a3ce0272e7b5
-
SHA1
c5cbac0c0f36c449b1df3c2d0a7c60705adc60f4
-
SHA256
e04c0ebdf0f4d1ed3ea6847f0e7cb1b0e179c776dc7aaa72b2122d8cdbbcabf0
-
SHA512
fc865e7e92908cbcf7f51df51a276373b541e7f4a77d32043bbb7ca8cd9ed91fbfdb284974fbb893304ed9f4287f2626b7c2a1487a537cd0475b39d08daa466b
-
SSDEEP
1536:CGF7Mx43iFGqXvpm1AUPyKxnxLdj85jMxknFGMGQfDGyaA4KF9X/:CGliFGq/0yejyjks/fyMr3
Malware Config
Signatures
-
Pony family
-
Executes dropped EXE 2 IoCs
pid Process 2824 pnd.exe 2620 pnd.exe -
Loads dropped DLL 2 IoCs
pid Process 1824 89deca7b716140975b45a3ce0272e7b5_JaffaCakes118.exe 1824 89deca7b716140975b45a3ce0272e7b5_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft PnD = "C:\\Users\\Admin\\AppData\\Roaming\\pny\\pnd.exe" 89deca7b716140975b45a3ce0272e7b5_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3052 set thread context of 1824 3052 89deca7b716140975b45a3ce0272e7b5_JaffaCakes118.exe 30 PID 2824 set thread context of 2620 2824 pnd.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 89deca7b716140975b45a3ce0272e7b5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 89deca7b716140975b45a3ce0272e7b5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pnd.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 3052 wrote to memory of 1824 3052 89deca7b716140975b45a3ce0272e7b5_JaffaCakes118.exe 30 PID 3052 wrote to memory of 1824 3052 89deca7b716140975b45a3ce0272e7b5_JaffaCakes118.exe 30 PID 3052 wrote to memory of 1824 3052 89deca7b716140975b45a3ce0272e7b5_JaffaCakes118.exe 30 PID 3052 wrote to memory of 1824 3052 89deca7b716140975b45a3ce0272e7b5_JaffaCakes118.exe 30 PID 3052 wrote to memory of 1824 3052 89deca7b716140975b45a3ce0272e7b5_JaffaCakes118.exe 30 PID 3052 wrote to memory of 1824 3052 89deca7b716140975b45a3ce0272e7b5_JaffaCakes118.exe 30 PID 3052 wrote to memory of 1824 3052 89deca7b716140975b45a3ce0272e7b5_JaffaCakes118.exe 30 PID 3052 wrote to memory of 1824 3052 89deca7b716140975b45a3ce0272e7b5_JaffaCakes118.exe 30 PID 1824 wrote to memory of 2824 1824 89deca7b716140975b45a3ce0272e7b5_JaffaCakes118.exe 31 PID 1824 wrote to memory of 2824 1824 89deca7b716140975b45a3ce0272e7b5_JaffaCakes118.exe 31 PID 1824 wrote to memory of 2824 1824 89deca7b716140975b45a3ce0272e7b5_JaffaCakes118.exe 31 PID 1824 wrote to memory of 2824 1824 89deca7b716140975b45a3ce0272e7b5_JaffaCakes118.exe 31 PID 2824 wrote to memory of 2620 2824 pnd.exe 32 PID 2824 wrote to memory of 2620 2824 pnd.exe 32 PID 2824 wrote to memory of 2620 2824 pnd.exe 32 PID 2824 wrote to memory of 2620 2824 pnd.exe 32 PID 2824 wrote to memory of 2620 2824 pnd.exe 32 PID 2824 wrote to memory of 2620 2824 pnd.exe 32 PID 2824 wrote to memory of 2620 2824 pnd.exe 32 PID 2824 wrote to memory of 2620 2824 pnd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\89deca7b716140975b45a3ce0272e7b5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\89deca7b716140975b45a3ce0272e7b5_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\89deca7b716140975b45a3ce0272e7b5_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\89deca7b716140975b45a3ce0272e7b5_JaffaCakes118.exe2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Users\Admin\AppData\Roaming\pny\pnd.exe"C:\Users\Admin\AppData\Roaming\pny\pnd.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Roaming\pny\pnd.exeC:\Users\Admin\AppData\Roaming\pny\pnd.exe4⤵
- Executes dropped EXE
PID:2620
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD589deca7b716140975b45a3ce0272e7b5
SHA1c5cbac0c0f36c449b1df3c2d0a7c60705adc60f4
SHA256e04c0ebdf0f4d1ed3ea6847f0e7cb1b0e179c776dc7aaa72b2122d8cdbbcabf0
SHA512fc865e7e92908cbcf7f51df51a276373b541e7f4a77d32043bbb7ca8cd9ed91fbfdb284974fbb893304ed9f4287f2626b7c2a1487a537cd0475b39d08daa466b