Analysis
-
max time kernel
0s -
max time network
1s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
28/03/2025, 20:00
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8af4acbd725e34fc289d81674ae0e844.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_8af4acbd725e34fc289d81674ae0e844.exe
Resource
win10v2004-20250313-en
General
-
Target
JaffaCakes118_8af4acbd725e34fc289d81674ae0e844.exe
-
Size
76KB
-
MD5
8af4acbd725e34fc289d81674ae0e844
-
SHA1
280156c357b97055ca30f0a01ed359ed0db0f3e4
-
SHA256
3dc18a14696e3abaaadee89c32ff60a963be38e7491b4fef3e7ecd59b2cd05d7
-
SHA512
033f19e9aecf23f15e8594c3ffa1595000cc5c43116f700c04c774ea4f9d1db880701514a3d8a89b2cca2824f1a177aa0202439bd6a2290a0fef265232f305d9
-
SSDEEP
1536:TrleJBx2zq+5hRpfvK7DKYM7zuM9GEKjgMqBit7HAko8Uck86LSUOLbJE/C6Qt:PlyDKB7qMcEKNqcn7ySUO3+6T
Malware Config
Extracted
pony
http://salstatic.info:2346/pony/mac.php
http://nextstats.info:2346/pony/mac.php
Signatures
-
Pony family
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\etc\test jaffacakes118_8af4acbd725e34fc289d81674ae0e844.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Hide Artifacts: Hidden Files and Directories 1 TTPs 2 IoCs
pid Process 2728 cmd.exe 2148 reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2712 set thread context of 756 2712 JaffaCakes118_8af4acbd725e34fc289d81674ae0e844.exe 31 -
resource yara_rule behavioral1/memory/756-6-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral1/memory/756-8-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral1/memory/756-3-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral1/memory/756-2-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral1/memory/756-9-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral1/memory/756-10-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral1/memory/756-11-0x0000000000400000-0x000000000041B000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8af4acbd725e34fc289d81674ae0e844.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jaffacakes118_8af4acbd725e34fc289d81674ae0e844.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeImpersonatePrivilege 756 jaffacakes118_8af4acbd725e34fc289d81674ae0e844.exe Token: SeTcbPrivilege 756 jaffacakes118_8af4acbd725e34fc289d81674ae0e844.exe Token: SeChangeNotifyPrivilege 756 jaffacakes118_8af4acbd725e34fc289d81674ae0e844.exe Token: SeCreateTokenPrivilege 756 jaffacakes118_8af4acbd725e34fc289d81674ae0e844.exe Token: SeBackupPrivilege 756 jaffacakes118_8af4acbd725e34fc289d81674ae0e844.exe Token: SeRestorePrivilege 756 jaffacakes118_8af4acbd725e34fc289d81674ae0e844.exe Token: SeIncreaseQuotaPrivilege 756 jaffacakes118_8af4acbd725e34fc289d81674ae0e844.exe Token: SeAssignPrimaryTokenPrivilege 756 jaffacakes118_8af4acbd725e34fc289d81674ae0e844.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2712 wrote to memory of 756 2712 JaffaCakes118_8af4acbd725e34fc289d81674ae0e844.exe 31 PID 2712 wrote to memory of 756 2712 JaffaCakes118_8af4acbd725e34fc289d81674ae0e844.exe 31 PID 2712 wrote to memory of 756 2712 JaffaCakes118_8af4acbd725e34fc289d81674ae0e844.exe 31 PID 2712 wrote to memory of 756 2712 JaffaCakes118_8af4acbd725e34fc289d81674ae0e844.exe 31 PID 2712 wrote to memory of 756 2712 JaffaCakes118_8af4acbd725e34fc289d81674ae0e844.exe 31 PID 2712 wrote to memory of 756 2712 JaffaCakes118_8af4acbd725e34fc289d81674ae0e844.exe 31 PID 2712 wrote to memory of 756 2712 JaffaCakes118_8af4acbd725e34fc289d81674ae0e844.exe 31 PID 2712 wrote to memory of 756 2712 JaffaCakes118_8af4acbd725e34fc289d81674ae0e844.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8af4acbd725e34fc289d81674ae0e844.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8af4acbd725e34fc289d81674ae0e844.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2712 -
\??\c:\users\admin\appdata\local\temp\jaffacakes118_8af4acbd725e34fc289d81674ae0e844.exe"c:\users\admin\appdata\local\temp\jaffacakes118_8af4acbd725e34fc289d81674ae0e844.exe"2⤵
- Drops file in Drivers directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:756 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy %WINDIR%\system32\drivers\etc\hosts %WINDIR%\system32\drivers\etc\hosts.sam /Y && at 20:03:00 cmd.exe /c copy %TEMP%\259450863FdOh %WINDIR%\system32\drivers\etc\hosts /Y3⤵PID:2780
-
C:\Windows\SysWOW64\at.exeat 20:03:00 cmd.exe /c copy C:\Users\Admin\AppData\Local\Temp\259450863FdOh C:\Windows\system32\drivers\etc\hosts /Y4⤵PID:2932
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\windows\CurrentVersion\Run /v 259450972 /t REG_SZ /d "cmd.exe /c copy %TEMP%\259450863FdOh %WINDIR%\system32\drivers\etc\hosts /Y && attrib +H %WINDIR%\system32\drivers\etc\hosts /f3⤵
- Hide Artifacts: Hidden Files and Directories
PID:2728 -
C:\Windows\SysWOW64\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\windows\CurrentVersion\Run /v 259450972 /t REG_SZ /d "cmd.exe /c copy C:\Users\Admin\AppData\Local\Temp\259450863FdOh C:\Windows\system32\drivers\etc\hosts /Y && attrib +H C:\Windows\system32\drivers\etc\hosts /f4⤵
- Hide Artifacts: Hidden Files and Directories
PID:2148
-
-
-