Analysis

  • max time kernel
    136s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25-01-2025 07:11

General

  • Target

    JaffaCakes118_29507c9032ecc443f15fc74c5d5ea82c.exe

  • Size

    150KB

  • MD5

    29507c9032ecc443f15fc74c5d5ea82c

  • SHA1

    0051f373a8eb83954c1bf388cb3fa633c7b6b0a9

  • SHA256

    0b4433138c187a54a6664887a0d463e6ae1a8f921001f21282d8fd6525ccacce

  • SHA512

    07599e955982affd68f6787ec9263f493dee35b0eec5d5599be73a8be803f6112b004b1bc351e52d82de37c09302dd16da7c43a535c7e51d6a1148b849af1c1f

  • SSDEEP

    3072:atboRg3HszTF6Slrkk03A4W1MdLhbV2UW8wN7:at4gidKhZ2UW57

Malware Config

Extracted

Family

pony

C2

http://140.114.67.67:8080/pony/gate.php

http://tankjetstudios.com:8080/pony/gate.php

Attributes
  • payload_url

    http://zirmatech.com.br/9exoNyD3.exe

    http://cbbd.com.ar/G54qsc.exe

    http://baol.k12.tr/pfquU7tN.exe

    http://gonbag.com.ar/0za4.exe

Signatures

  • Pony family
  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_29507c9032ecc443f15fc74c5d5ea82c.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_29507c9032ecc443f15fc74c5d5ea82c.exe"
    1⤵
    • Accesses Microsoft Outlook accounts
    • Accesses Microsoft Outlook profiles
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    • outlook_win_path
    PID:2448

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2448-0-0x0000000000290000-0x00000000002A9000-memory.dmp

    Filesize

    100KB

  • memory/2448-1-0x00000000002B0000-0x00000000002D9000-memory.dmp

    Filesize

    164KB

  • memory/2448-2-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/2448-3-0x0000000000290000-0x00000000002A9000-memory.dmp

    Filesize

    100KB

  • memory/2448-4-0x00000000002B0000-0x00000000002D9000-memory.dmp

    Filesize

    164KB

  • memory/2448-5-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB