Overview
overview
10Static
static
106b9d5ed62b...18.exe
windows7-x64
76b9d5ed62b...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3AutoUpdaterUI.exe
windows7-x64
3AutoUpdaterUI.exe
windows10-2004-x64
3Autoupdate...te.dll
windows7-x64
5Autoupdate...te.dll
windows10-2004-x64
5Autoupdate...er.exe
windows7-x64
3Autoupdate...er.exe
windows10-2004-x64
3Bind/AVCheck.dll
windows7-x64
3Bind/AVCheck.dll
windows10-2004-x64
3Bind/GetAV.exe
windows7-x64
6Bind/GetAV.exe
windows10-2004-x64
6Bind/HTTPD...UI.exe
windows7-x64
3Bind/HTTPD...UI.exe
windows10-2004-x64
3DevCfg.dll
windows7-x64
5DevCfg.dll
windows10-2004-x64
5DockHelp.dll
windows7-x64
3DockHelp.dll
windows10-2004-x64
3DockHelpex.dll
windows7-x64
3DockHelpex.dll
windows10-2004-x64
3DriveTheLife.exe
windows7-x64
10DriveTheLife.exe
windows10-2004-x64
10hdaudbus.sys
windows7-x64
1hdaudbus.sys
windows10-2004-x64
1Drivers/wn...UI.dll
windows7-x64
3Drivers/wn...UI.dll
windows10-2004-x64
3Drivers/wn...SP.dll
windows7-x64
3Drivers/wn...SP.dll
windows10-2004-x64
3Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-10-2024 18:33
Behavioral task
behavioral1
Sample
6b9d5ed62bf77ebcf1d9a4ce12eeef6f_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
6b9d5ed62bf77ebcf1d9a4ce12eeef6f_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
AutoUpdaterUI.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
AutoUpdaterUI.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Autoupdater/CheckUpdate.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Autoupdater/CheckUpdate.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Autoupdater/DTLUpdater.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
Autoupdater/DTLUpdater.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Bind/AVCheck.dll
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
Bind/AVCheck.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Bind/GetAV.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Bind/GetAV.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Bind/HTTPDownloadUI.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Bind/HTTPDownloadUI.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
DevCfg.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
DevCfg.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
DockHelp.dll
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
DockHelp.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
DockHelpex.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
DockHelpex.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
DriveTheLife.exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
DriveTheLife.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
hdaudbus.sys
Resource
win7-20240729-en
Behavioral task
behavioral28
Sample
hdaudbus.sys
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
Drivers/wnd7audio/SysFxUI.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Drivers/wnd7audio/SysFxUI.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
Drivers/wnd7audio/WMALFXGFXDSP.dll
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
Drivers/wnd7audio/WMALFXGFXDSP.dll
Resource
win10v2004-20241007-en
General
-
Target
DriveTheLife.exe
-
Size
1.1MB
-
MD5
2d4b22597d208d56ce337398f2574c8e
-
SHA1
c676d6e8452ce43a1a69a97f767bad8c1daf68be
-
SHA256
6125f323bd28e7092d2e8191978fddad248a0d9899e7f4159dbc218c27128a33
-
SHA512
89f72fa6d26a9a6b610ab9b12378d6f2f39b71e2f917809f491419f6754301d349e8b9429604d0238da702eb5c70b858d1f72a22d00d876265d39e19bb36e83e
-
SSDEEP
24576:OAQkUx9yzj53OsPvz4jUkO07qElhSxdGi:4kUxKfP07qFxd
Malware Config
Signatures
-
Panda Stealer payload 1 IoCs
resource yara_rule behavioral26/memory/3120-8-0x00000000026A0000-0x0000000002762000-memory.dmp family_pandastealer -
PandaStealer
Panda Stealer is a fork of CollectorProject Stealer written in C++.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation DriveTheLife.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\ DriveTheLife.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4804 3120 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DriveTheLife.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AutoUpdaterUI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 DriveTheLife.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Driver DriveTheLife.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 DriveTheLife.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Driver DriveTheLife.exe -
Modifies registry class 53 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{30579EBD-2D69-49CF-B098-258AC820E7E4}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{20D67FF2-33D8-4928-914F-553076FD8DB2}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\DtlDock64.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{20D67FF2-33D8-4928-914F-553076FD8DB2}\Implemented Categories regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{50554412-1675-4043-A864-F7A30777EA18}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{50554412-1675-4043-A864-F7A30777EA18}\1.0\ = "DtlDock 1.0 ÀàÐÍ¿â" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{20D67FF2-33D8-4928-914F-553076FD8DB2}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{50554412-1675-4043-A864-F7A30777EA18}\1.0\0\win64 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DtlDock.DtlBank\CurVer\ = "DtlDock.DtlBand.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DtlDock.DtlBank.1\CLSID\ = "{20D67FF2-33D8-4928-914F-553076FD8DB2}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DtlDock.DtlBank\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{50554412-1675-4043-A864-F7A30777EA18} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{30579EBD-2D69-49CF-B098-258AC820E7E4}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{30579EBD-2D69-49CF-B098-258AC820E7E4}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{20D67FF2-33D8-4928-914F-553076FD8DB2} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{20D67FF2-33D8-4928-914F-553076FD8DB2}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{20D67FF2-33D8-4928-914F-553076FD8DB2}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{20D67FF2-33D8-4928-914F-553076FD8DB2}\AppID = "{8E81247B-00C6-44BA-875C-737FD12149A6}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\DtlDock.DLL regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DtlDock.DtlBank.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DtlDock.DtlBank\CLSID\ = "{20D67FF2-33D8-4928-914F-553076FD8DB2}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DtlDock.DtlBank\CurVer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{20D67FF2-33D8-4928-914F-553076FD8DB2}\ = "DriveTheLife Monitor" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{20D67FF2-33D8-4928-914F-553076FD8DB2}\ProgID\ = "DtlDock.DtlBand.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{30579EBD-2D69-49CF-B098-258AC820E7E4} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{30579EBD-2D69-49CF-B098-258AC820E7E4}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{8E81247B-00C6-44BA-875C-737FD12149A6}\ = "DtlDock" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DtlDock.DtlBank\ = "DtlBand" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{20D67FF2-33D8-4928-914F-553076FD8DB2}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{20D67FF2-33D8-4928-914F-553076FD8DB2}\Implemented Categories\{00021492-0000-0000-C000-000000000046} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{8E81247B-00C6-44BA-875C-737FD12149A6} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\DtlDock.DLL\AppID = "{8E81247B-00C6-44BA-875C-737FD12149A6}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DtlDock.DtlBank.1\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DtlDock.DtlBank regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{50554412-1675-4043-A864-F7A30777EA18}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{50554412-1675-4043-A864-F7A30777EA18}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{30579EBD-2D69-49CF-B098-258AC820E7E4}\ = "IDtlBank" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{30579EBD-2D69-49CF-B098-258AC820E7E4}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{20D67FF2-33D8-4928-914F-553076FD8DB2}\VersionIndependentProgID\ = "DtlDock.DtlBand" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{20D67FF2-33D8-4928-914F-553076FD8DB2}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{50554412-1675-4043-A864-F7A30777EA18}\1.0\FLAGS\ = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{50554412-1675-4043-A864-F7A30777EA18}\1.0\0\win64\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\DtlDock64.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{30579EBD-2D69-49CF-B098-258AC820E7E4}\ = "IDtlBank" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{30579EBD-2D69-49CF-B098-258AC820E7E4}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{30579EBD-2D69-49CF-B098-258AC820E7E4}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{30579EBD-2D69-49CF-B098-258AC820E7E4}\TypeLib\ = "{50554412-1675-4043-A864-F7A30777EA18}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{30579EBD-2D69-49CF-B098-258AC820E7E4}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{30579EBD-2D69-49CF-B098-258AC820E7E4} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{30579EBD-2D69-49CF-B098-258AC820E7E4}\TypeLib\ = "{50554412-1675-4043-A864-F7A30777EA18}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DtlDock.DtlBank.1\ = "DtlBand" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{20D67FF2-33D8-4928-914F-553076FD8DB2}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{20D67FF2-33D8-4928-914F-553076FD8DB2}\TypeLib\ = "{50554412-1675-4043-A864-F7A30777EA18}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{50554412-1675-4043-A864-F7A30777EA18}\1.0\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{50554412-1675-4043-A864-F7A30777EA18}\1.0\0 regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1376 AutoUpdaterUI.exe 1376 AutoUpdaterUI.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 3120 DriveTheLife.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3120 DriveTheLife.exe 1376 AutoUpdaterUI.exe 3120 DriveTheLife.exe 3120 DriveTheLife.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3120 wrote to memory of 1376 3120 DriveTheLife.exe 86 PID 3120 wrote to memory of 1376 3120 DriveTheLife.exe 86 PID 3120 wrote to memory of 1376 3120 DriveTheLife.exe 86 PID 3120 wrote to memory of 1444 3120 DriveTheLife.exe 87 PID 3120 wrote to memory of 1444 3120 DriveTheLife.exe 87 PID 3120 wrote to memory of 1444 3120 DriveTheLife.exe 87 PID 1444 wrote to memory of 4528 1444 regsvr32.exe 88 PID 1444 wrote to memory of 4528 1444 regsvr32.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\DriveTheLife.exe"C:\Users\Admin\AppData\Local\Temp\DriveTheLife.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Users\Admin\AppData\Local\Temp\AutoUpdaterUI.exe"C:\Users\Admin\AppData\Local\Temp\AutoUpdaterUI.exe" /auto_updater /dtl_2010 "-dtlapp C:\Users\Admin\AppData\Local\Temp\DriveTheLife.exe" /silent "-dtlver 3.1.28.32"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1376
-
-
C:\Windows\SysWOW64\regsvr32.exe/s "C:\Users\Admin\AppData\Local\Temp\DtlDock64.dll"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\system32\regsvr32.exe/s "C:\Users\Admin\AppData\Local\Temp\DtlDock64.dll"3⤵
- Modifies registry class
PID:4528
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3120 -s 16242⤵
- Program crash
PID:4804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3120 -ip 31201⤵PID:408
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
158B
MD53f118854db57ff6c8e141118ff28d6e9
SHA1e4214fe3ab4113f9cdffdca2efdbfd3452fa3152
SHA2562de58dd033ab831ae479ea3ad994b428e6e1ad38c67e5f0bd9f70db6e15065b3
SHA5128f8fc765c38c71d4506a9d6d7d69a57d1c607c1451cd0a0544d89f33a2ee22982724219859a9a408d5cc604c0a4f434c43f3df4c6573905a2897795b96955d1e