General
-
Target
JaffaCakes118_1fa8d1a9cd0a8f342372a3f730db7150
-
Size
405KB
-
Sample
250106-m3n1csxkbr
-
MD5
1fa8d1a9cd0a8f342372a3f730db7150
-
SHA1
5333f3f8a398f54801397f3cfc401d27cc8c5c4e
-
SHA256
f7a857653cd047a2e72c95e588f7a0766bc396ea4ec595ca437435a417f0159a
-
SHA512
d7b4bdf2c8167e9901d149b6c8f0f4d5d78f5227bbd2fb84d355d6346404a7a4e03ce59d45aab9cc0f752360ea2a737b42e459e7bbb5e8329454fa28c858048a
-
SSDEEP
6144:T4NdV8KovoS2SRobnM9xFAWB0a3/uCxZkLiMoy22EPAu252idC41i:IdOKorKnha32Cx2Li422XuIdp1i
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_1fa8d1a9cd0a8f342372a3f730db7150.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_1fa8d1a9cd0a8f342372a3f730db7150.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://iwofeh-hunterz.com/emma/gate.php
-
payload_url
http://iwofeh-hunterz.com/emma/shit.exe
Targets
-
-
Target
JaffaCakes118_1fa8d1a9cd0a8f342372a3f730db7150
-
Size
405KB
-
MD5
1fa8d1a9cd0a8f342372a3f730db7150
-
SHA1
5333f3f8a398f54801397f3cfc401d27cc8c5c4e
-
SHA256
f7a857653cd047a2e72c95e588f7a0766bc396ea4ec595ca437435a417f0159a
-
SHA512
d7b4bdf2c8167e9901d149b6c8f0f4d5d78f5227bbd2fb84d355d6346404a7a4e03ce59d45aab9cc0f752360ea2a737b42e459e7bbb5e8329454fa28c858048a
-
SSDEEP
6144:T4NdV8KovoS2SRobnM9xFAWB0a3/uCxZkLiMoy22EPAu252idC41i:IdOKorKnha32Cx2Li422XuIdp1i
-
Pony family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-