General
-
Target
8ff2adace9307bbc81c9c53b8fa904a0_JaffaCakes118
-
Size
104KB
-
Sample
241123-wyvf1szle1
-
MD5
8ff2adace9307bbc81c9c53b8fa904a0
-
SHA1
9881d07edad1e0ad068f8dc5a6f20ec9f8718941
-
SHA256
d579e40145fec0d0a93c85834f0a1f1881763038a11bf6284fcb0522abc223e3
-
SHA512
86cfbbcc7b8f442b342cf45d8e6bcdbb8b7f70ca653271a4517072ef9f9f1f97f09c8e691cbea6d247cc0ed4495e26061ae2a3deba9fb52e585f508d01a05ee5
-
SSDEEP
3072:up6O7TfIDxjStV3op19tYsTseeee++Zmx:uXLIDx23o39t
Static task
static1
Behavioral task
behavioral1
Sample
8ff2adace9307bbc81c9c53b8fa904a0_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
8ff2adace9307bbc81c9c53b8fa904a0_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://keloale.info:2013/pic/staff.php
http://soerkea.info:2013/pic/staff.php
Targets
-
-
Target
8ff2adace9307bbc81c9c53b8fa904a0_JaffaCakes118
-
Size
104KB
-
MD5
8ff2adace9307bbc81c9c53b8fa904a0
-
SHA1
9881d07edad1e0ad068f8dc5a6f20ec9f8718941
-
SHA256
d579e40145fec0d0a93c85834f0a1f1881763038a11bf6284fcb0522abc223e3
-
SHA512
86cfbbcc7b8f442b342cf45d8e6bcdbb8b7f70ca653271a4517072ef9f9f1f97f09c8e691cbea6d247cc0ed4495e26061ae2a3deba9fb52e585f508d01a05ee5
-
SSDEEP
3072:up6O7TfIDxjStV3op19tYsTseeee++Zmx:uXLIDx23o39t
-
Pony family
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3