Analysis
-
max time kernel
93s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2025 06:17
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6abb9f54ac7fe34c178d3db652ca48db.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_6abb9f54ac7fe34c178d3db652ca48db.exe
-
Size
114KB
-
MD5
6abb9f54ac7fe34c178d3db652ca48db
-
SHA1
81e18a311112fd20935c163d80db661187c0b4b6
-
SHA256
2fe039ade455c1d2f1263b4ba5004b2b9c356d9850e14ce0c60b75adab5b0b8a
-
SHA512
6c5edb81a6102782aa7813beed5e71f6b0a54ae49fa675da21d03aea8c49ba799ec320a7164f9cdfdfd09023b95714f2c9ebf6462df3ee7bad0736ad3cda9c38
-
SSDEEP
3072:/XAtWYKBlVwaGCNDpILTKAO6moNOyDN3UYz9:fAoYKXVwAJpIk4h
Malware Config
Extracted
pony
http://etsiunjour.fr:81/pony/gate.php
http://209.59.217.36/pony/gate.php
-
payload_url
http://ftp.ex-fin.sk/0rk5TF.exe
http://archstone.ro/yuzFyjAw.exe
Signatures
-
Pony family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6abb9f54ac7fe34c178d3db652ca48db.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1268 wrote to memory of 3036 1268 JaffaCakes118_6abb9f54ac7fe34c178d3db652ca48db.exe 84 PID 1268 wrote to memory of 3036 1268 JaffaCakes118_6abb9f54ac7fe34c178d3db652ca48db.exe 84 PID 1268 wrote to memory of 3036 1268 JaffaCakes118_6abb9f54ac7fe34c178d3db652ca48db.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6abb9f54ac7fe34c178d3db652ca48db.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6abb9f54ac7fe34c178d3db652ca48db.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6abb9f54ac7fe34c178d3db652ca48db.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6abb9f54ac7fe34c178d3db652ca48db.exe"2⤵PID:3036
-