Analysis

  • max time kernel
    69s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/04/2025, 14:46

General

  • Target

    JaffaCakes118_9adf2ae0d2da2a377fd92612ba4f08bb.exe

  • Size

    134KB

  • MD5

    9adf2ae0d2da2a377fd92612ba4f08bb

  • SHA1

    8e4203479c9ffecfc9abc5f15d04e6b908ab789c

  • SHA256

    123a6356b5fd47aa7503fa84c19665973d66ccbdbc809a29acc6ca88b0c30333

  • SHA512

    ad00654f3040988a647569f27243e8f42992a43eefb78aabdf46b36be00e9c5ab983ceb2c22444b27c1f530297784a526404df3d95767b5363283ef227d7df91

  • SSDEEP

    3072:JAtEhw1GBcMc0ToVAD6moAiZkj2Xa7U1qQ:utCwcjc01y4yCQ

Malware Config

Extracted

Family

pony

C2

http://momus.com.tw:8080/pony/gate.php

http://66.175.216.69/pony/gate.php

Attributes
  • payload_url

    http://benihikanjogja.com/DxexAW1.exe

    http://viveroparadiso.com.ar/NSyf.exe

    http://www.jeveuxepargner.net/ab3GM.exe

Signatures

  • Pony family
  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9adf2ae0d2da2a377fd92612ba4f08bb.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9adf2ae0d2da2a377fd92612ba4f08bb.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2864
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9adf2ae0d2da2a377fd92612ba4f08bb.exe
      "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9adf2ae0d2da2a377fd92612ba4f08bb.exe"
      2⤵
        PID:4612

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2864-0-0x0000000000A60000-0x0000000000A83000-memory.dmp

      Filesize

      140KB

    • memory/2864-1-0x0000000000A60000-0x0000000000A83000-memory.dmp

      Filesize

      140KB