Overview
overview
10Static
static
376468fca3a...18.exe
windows7-x64
776468fca3a...18.exe
windows10-2004-x64
7$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3GLWorker.exe
windows7-x64
10GLWorker.exe
windows10-2004-x64
10PictoWords.exe
windows7-x64
10PictoWords.exe
windows10-2004-x64
10Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Analysis
-
max time kernel
133s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 17:39
Static task
static1
Behavioral task
behavioral1
Sample
76468fca3a1a12f2a7852162bd7bc7d0_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
76468fca3a1a12f2a7852162bd7bc7d0_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/Dialer.dll
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/Dialer.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsisdl.dll
Resource
win7-20240419-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsisdl.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
GLWorker.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
GLWorker.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
PictoWords.exe
Resource
win7-20240215-en
Behavioral task
behavioral16
Sample
PictoWords.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
Uninstall.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
Uninstall.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240419-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
General
-
Target
GLWorker.exe
-
Size
1.8MB
-
MD5
eccc115184103ff4ed6b8d736bda1d48
-
SHA1
561fa93f09ddbc1f0e4f7b8d726e4fe6936989bc
-
SHA256
b58532b8445c52a332784f320fc3b693988b9702d0ffd280282a8f6b07b02afb
-
SHA512
aa823ed1d0d2ec9fdb0d909ab76d1ffca0dad61f0bcd878cf3607ace21a8c2148245af135c1f831c92b7e688b6603cde959e1a5f54e1c615ca3ab433feb79e6b
-
SSDEEP
49152:xzroXxa1qMtyV1MtlfJTNbVCyVOnfPd5wydww:xzroXxa1qX81bVDVAfPSw
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
GLWorker.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ GLWorker.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
GLWorker.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion GLWorker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate GLWorker.exe -
Modifies registry class 2 IoCs
Processes:
GLWorker.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D8FDBD81-8F37-DC65-FF42-C9897C435945} GLWorker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D8FDBD81-8F37-DC65-FF42-C9897C435945}\ = "{0000031A-0000-0000-C000-000000000046}" GLWorker.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
GLWorker.exedescription pid process Token: 33 4852 GLWorker.exe Token: SeIncBasePriorityPrivilege 4852 GLWorker.exe