Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
30s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/04/2023, 23:01
Behavioral task
behavioral1
Sample
ba0f7d3caed95ad38d801667520ea0beed0744d8aca7d3cf896a5239dc983d03.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ba0f7d3caed95ad38d801667520ea0beed0744d8aca7d3cf896a5239dc983d03.dll
Resource
win10v2004-20230220-en
General
-
Target
ba0f7d3caed95ad38d801667520ea0beed0744d8aca7d3cf896a5239dc983d03.dll
-
Size
289.8MB
-
MD5
0887e398eceda40064ee01f6cc6e9424
-
SHA1
45869d15d9624dadaa9352ef5191a870d1a413de
-
SHA256
ba0f7d3caed95ad38d801667520ea0beed0744d8aca7d3cf896a5239dc983d03
-
SHA512
0d8fcfe7ea1d480f11a25ce21969f520d15e306ea85acdbd2e01a692659d63368b2d005fa0ee19c1ae31173f4a2c61ead13718021c38580ec14c429acce0473f
-
SSDEEP
196608:TQO9U+pMkEO6Tr5NUR4ureIXH5yJ7nxkYuQPP3r7DbGF/UALgV:T/sO6Tr5NUR4ureIXYjTuQPPy/UQ
Malware Config
Signatures
-
Detects Grandoreiro payload 2 IoCs
resource yara_rule behavioral1/memory/2040-54-0x00000000023F0000-0x00000000033F0000-memory.dmp family_grandoreiro_v1 behavioral1/memory/2040-60-0x00000000023F0000-0x00000000033F0000-memory.dmp family_grandoreiro_v1 -
Grandoreiro
Part of a group of banking trojans, targeting Spanish and Portuguese speaking countries.
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2040 1728 regsvr32.exe 27 PID 1728 wrote to memory of 2040 1728 regsvr32.exe 27 PID 1728 wrote to memory of 2040 1728 regsvr32.exe 27 PID 1728 wrote to memory of 2040 1728 regsvr32.exe 27 PID 1728 wrote to memory of 2040 1728 regsvr32.exe 27 PID 1728 wrote to memory of 2040 1728 regsvr32.exe 27 PID 1728 wrote to memory of 2040 1728 regsvr32.exe 27
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\ba0f7d3caed95ad38d801667520ea0beed0744d8aca7d3cf896a5239dc983d03.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\ba0f7d3caed95ad38d801667520ea0beed0744d8aca7d3cf896a5239dc983d03.dll2⤵PID:2040
-