Analysis
-
max time kernel
93s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
30-01-2025 21:06
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6696ed85fef753c0243d5ba8cbd76eb3.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_6696ed85fef753c0243d5ba8cbd76eb3.exe
-
Size
102KB
-
MD5
6696ed85fef753c0243d5ba8cbd76eb3
-
SHA1
be4b7623e2da721b8023c2b34ba0a86286960ed8
-
SHA256
7e97e007834215845d31883ce68e43ac791fa0b691ea846dcacc9cdf8abba12d
-
SHA512
23843aecf76f92fbdcc72edb49e56d520f8361ac810d1d8560d8ff71efdffb3a59f484289ecc961622e47812989367f95a94f0271b4a7e0d5d82ff0a73d8fb1e
-
SSDEEP
1536:TPwMMXFsGoGQo2cs1Tq2tPt9Me7mp8KIboMvWqaTL10uY6mZwdnN2kWz/gxtqq+H:mKGcVu0YSr3+FTGn6moN2JMwq+Ay+Q
Malware Config
Extracted
pony
http://64.111.24.125/ponyd/gate.php
http://66.175.208.56/ponyd/gate.php
-
payload_url
http://www.artevoz.com.br/9D0JP.exe
http://novinhologram.com/a5Epb0.exe
Signatures
-
Pony family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6696ed85fef753c0243d5ba8cbd76eb3.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1836 wrote to memory of 3880 1836 JaffaCakes118_6696ed85fef753c0243d5ba8cbd76eb3.exe 86 PID 1836 wrote to memory of 3880 1836 JaffaCakes118_6696ed85fef753c0243d5ba8cbd76eb3.exe 86 PID 1836 wrote to memory of 3880 1836 JaffaCakes118_6696ed85fef753c0243d5ba8cbd76eb3.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6696ed85fef753c0243d5ba8cbd76eb3.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6696ed85fef753c0243d5ba8cbd76eb3.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6696ed85fef753c0243d5ba8cbd76eb3.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6696ed85fef753c0243d5ba8cbd76eb3.exe"2⤵PID:3880
-