General

  • Target

    f9bb522ae0a4aa47a6d94bc99e215bb6_JaffaCakes118

  • Size

    1.8MB

  • Sample

    240419-hhrhjacb41

  • MD5

    f9bb522ae0a4aa47a6d94bc99e215bb6

  • SHA1

    665c41342fa5b963bb29fc78b27fd6798ceb3f4f

  • SHA256

    1013ad1290523f5417ed789d11900f8ae804c0d81ed60af75684039fb06223b8

  • SHA512

    6a16c60bb872ddfca4d522bd87ebee7010a135287923081a7bf93c3bd3e0805353c241f13634c86523a8e19958a4dd63c81bbbfa63b6a7ec33f67b949415ef8d

  • SSDEEP

    49152:pJ2G79v/xSHzBJ6WC+j2bpW+6Q4GIPs7eBl3au:pJ2G7J/xSKWmbp9F4Gr

Malware Config

Extracted

Family

metasploit

Version

encoder/fnstenv_mov

Targets

    • Target

      f9bb522ae0a4aa47a6d94bc99e215bb6_JaffaCakes118

    • Size

      1.8MB

    • MD5

      f9bb522ae0a4aa47a6d94bc99e215bb6

    • SHA1

      665c41342fa5b963bb29fc78b27fd6798ceb3f4f

    • SHA256

      1013ad1290523f5417ed789d11900f8ae804c0d81ed60af75684039fb06223b8

    • SHA512

      6a16c60bb872ddfca4d522bd87ebee7010a135287923081a7bf93c3bd3e0805353c241f13634c86523a8e19958a4dd63c81bbbfa63b6a7ec33f67b949415ef8d

    • SSDEEP

      49152:pJ2G79v/xSHzBJ6WC+j2bpW+6Q4GIPs7eBl3au:pJ2G7J/xSKWmbp9F4Gr

    • Detect Lumma Stealer payload V4

    • Lumma Stealer

      An infostealer written in C++ first seen in August 2022.

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Modifies security service

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Defense Evasion

Modify Registry

1
T1112

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Virtualization/Sandbox Evasion

1
T1497

Peripheral Device Discovery

1
T1120

Tasks