Analysis
-
max time kernel
69s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
05/04/2025, 14:46
Static task
static1
General
-
Target
JaffaCakes118_9adf2ae0d2da2a377fd92612ba4f08bb.exe
-
Size
134KB
-
MD5
9adf2ae0d2da2a377fd92612ba4f08bb
-
SHA1
8e4203479c9ffecfc9abc5f15d04e6b908ab789c
-
SHA256
123a6356b5fd47aa7503fa84c19665973d66ccbdbc809a29acc6ca88b0c30333
-
SHA512
ad00654f3040988a647569f27243e8f42992a43eefb78aabdf46b36be00e9c5ab983ceb2c22444b27c1f530297784a526404df3d95767b5363283ef227d7df91
-
SSDEEP
3072:JAtEhw1GBcMc0ToVAD6moAiZkj2Xa7U1qQ:utCwcjc01y4yCQ
Malware Config
Extracted
pony
http://momus.com.tw:8080/pony/gate.php
http://66.175.216.69/pony/gate.php
-
payload_url
http://benihikanjogja.com/DxexAW1.exe
http://viveroparadiso.com.ar/NSyf.exe
http://www.jeveuxepargner.net/ab3GM.exe
Signatures
-
Pony family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_9adf2ae0d2da2a377fd92612ba4f08bb.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2864 wrote to memory of 4612 2864 JaffaCakes118_9adf2ae0d2da2a377fd92612ba4f08bb.exe 95 PID 2864 wrote to memory of 4612 2864 JaffaCakes118_9adf2ae0d2da2a377fd92612ba4f08bb.exe 95 PID 2864 wrote to memory of 4612 2864 JaffaCakes118_9adf2ae0d2da2a377fd92612ba4f08bb.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9adf2ae0d2da2a377fd92612ba4f08bb.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9adf2ae0d2da2a377fd92612ba4f08bb.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9adf2ae0d2da2a377fd92612ba4f08bb.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9adf2ae0d2da2a377fd92612ba4f08bb.exe"2⤵PID:4612
-