Analysis
-
max time kernel
94s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-01-2025 14:02
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_36255c00f82c49aac977fdc55fc1976c.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_36255c00f82c49aac977fdc55fc1976c.exe
-
Size
132KB
-
MD5
36255c00f82c49aac977fdc55fc1976c
-
SHA1
088438bc46e053987e1ac2a3bd87833b6bf6d29b
-
SHA256
4a201703f2344baed15926e45960c44175c4a844e1f4d3ed355b147e00543105
-
SHA512
a1eb950c8272f75ecb140f0b387ec00ee5aa5b02858136241f83128e452b1ae63fc62e657ef6197c488f304e2979f0d554de5c88a2d31412d7c154f9bc3a3d5c
-
SSDEEP
1536:DfbmUgeUtHmOC6ScpLh4hFLhad70mtAbLnXQ1l7s1Vgjv1r3J/HjYU5Uzv6gcYt2:DfbmUkNmOJSo6FQ1kXQ3Q2/DJ5Ujj3P
Malware Config
Extracted
pony
http://67.215.225.205:8080/forum/viewtopic.php
http://66.175.215.72/forum/viewtopic.php
-
payload_url
http://realitycoaching.es/pm3Wi2bw.exe
http://fuszerboltom.hu/Nzg.exe
Signatures
-
Pony family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_36255c00f82c49aac977fdc55fc1976c.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4296 wrote to memory of 4704 4296 JaffaCakes118_36255c00f82c49aac977fdc55fc1976c.exe 83 PID 4296 wrote to memory of 4704 4296 JaffaCakes118_36255c00f82c49aac977fdc55fc1976c.exe 83 PID 4296 wrote to memory of 4704 4296 JaffaCakes118_36255c00f82c49aac977fdc55fc1976c.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_36255c00f82c49aac977fdc55fc1976c.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_36255c00f82c49aac977fdc55fc1976c.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_36255c00f82c49aac977fdc55fc1976c.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_36255c00f82c49aac977fdc55fc1976c.exe"2⤵PID:4704
-