Analysis
-
max time kernel
140s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-01-2025 06:08
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_3ca95436cab5d2f9265c3cd4c48b5757.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_3ca95436cab5d2f9265c3cd4c48b5757.exe
-
Size
161KB
-
MD5
3ca95436cab5d2f9265c3cd4c48b5757
-
SHA1
2a3d57c70317aae53071520d65ec34719ed727bd
-
SHA256
0464c6c2cdec9e1858cbdb534f23999ff6768510831aa9b060c26f6437c9f8eb
-
SHA512
a28cfba819dba75ec5ac4f2b49330173aa62a244d725e7c2c876b1696eb4ef1c4e6f04bae131eb75aec1c86709bf24f323392029dac94a29db7d25f0d36ddc5c
-
SSDEEP
1536:CJ+vlm7uaaG2cH1j6rshA5feuahMelpCkzwu1ETLZQIVItcABzuOk1g7OUwPEKKw:Cl7ubyJhAgppCuaLRVQW3PJKK/
Malware Config
Extracted
pony
http://72.37.220.10:8080/pony/gate.php
http://50.116.2.163/pony/gate.php
-
payload_url
http://autosportmoc.com.br/xLMMyW.exe
http://8054.a.hostable.me/4i1i4.exe
http://bultax.com/jVERjV.exe
Signatures
-
Pony family
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3ca95436cab5d2f9265c3cd4c48b5757.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeImpersonatePrivilege 4760 JaffaCakes118_3ca95436cab5d2f9265c3cd4c48b5757.exe Token: SeTcbPrivilege 4760 JaffaCakes118_3ca95436cab5d2f9265c3cd4c48b5757.exe Token: SeChangeNotifyPrivilege 4760 JaffaCakes118_3ca95436cab5d2f9265c3cd4c48b5757.exe Token: SeCreateTokenPrivilege 4760 JaffaCakes118_3ca95436cab5d2f9265c3cd4c48b5757.exe Token: SeBackupPrivilege 4760 JaffaCakes118_3ca95436cab5d2f9265c3cd4c48b5757.exe Token: SeRestorePrivilege 4760 JaffaCakes118_3ca95436cab5d2f9265c3cd4c48b5757.exe Token: SeIncreaseQuotaPrivilege 4760 JaffaCakes118_3ca95436cab5d2f9265c3cd4c48b5757.exe Token: SeAssignPrimaryTokenPrivilege 4760 JaffaCakes118_3ca95436cab5d2f9265c3cd4c48b5757.exe