Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 04:25
Static task
static1
Behavioral task
behavioral1
Sample
grand.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
grand.exe
Resource
win10v2004-20230915-en
General
-
Target
grand.exe
-
Size
5.5MB
-
MD5
47f7101191190d132a438444ee64a798
-
SHA1
1b17f49c98c7a0dcf7d40752dacf6b9e99ebe2d3
-
SHA256
c5195273e6bed87762880598a2a08bdeadab8d84fab3e78b6726c7eadd08ed54
-
SHA512
6fdd4755a6c6fa157fef65e88dd5d702df7a053fa36f5646a258edb9900c2f34fd4af440ff6d06d8a8ac11fd55273244f346b064a120d172846f09ac3dbd77c3
-
SSDEEP
98304:vyghDiIufzZIKj5Ahc3x8x/3a1UVG+5T8wNyxZnkkYOW:vJhZuf+W1xGSUVG+x8wQZXY
Malware Config
Signatures
-
Detects Grandoreiro payload 12 IoCs
resource yara_rule behavioral2/files/0x0008000000023238-15.dat family_grandoreiro_v1 behavioral2/files/0x0008000000023238-19.dat family_grandoreiro_v1 behavioral2/files/0x0008000000023238-18.dat family_grandoreiro_v1 behavioral2/files/0x0008000000023238-24.dat family_grandoreiro_v1 behavioral2/files/0x0008000000023238-23.dat family_grandoreiro_v1 behavioral2/memory/3388-25-0x0000000011770000-0x0000000012770000-memory.dmp family_grandoreiro_v1 behavioral2/memory/3388-33-0x0000000011770000-0x0000000012770000-memory.dmp family_grandoreiro_v1 behavioral2/memory/3388-39-0x0000000011770000-0x0000000012770000-memory.dmp family_grandoreiro_v1 behavioral2/memory/3388-45-0x0000000011770000-0x0000000012770000-memory.dmp family_grandoreiro_v1 behavioral2/memory/3388-54-0x0000000011770000-0x0000000012770000-memory.dmp family_grandoreiro_v1 behavioral2/memory/3388-72-0x0000000011770000-0x0000000012770000-memory.dmp family_grandoreiro_v1 behavioral2/memory/3388-75-0x0000000011770000-0x0000000012770000-memory.dmp family_grandoreiro_v1 -
Grandoreiro
Part of a group of banking trojans, targeting Spanish and Portuguese speaking countries.
-
Executes dropped EXE 1 IoCs
pid Process 3388 randpp.exe -
Loads dropped DLL 8 IoCs
pid Process 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" grand.exe Set value (str) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\azzxrgr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\randpp.exe" randpp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3388 randpp.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3388 randpp.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3388 randpp.exe 3388 randpp.exe 3388 randpp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4680 wrote to memory of 3388 4680 grand.exe 84 PID 4680 wrote to memory of 3388 4680 grand.exe 84 PID 4680 wrote to memory of 3388 4680 grand.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\grand.exe"C:\Users\Admin\AppData\Local\Temp\grand.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\randpp.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\randpp.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3388
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244.8MB
MD5a2d44cb6fd44e0ac67146d48e9663892
SHA1f900008c813653e6ad52440e14fd4721d0011b9c
SHA25653977d8cb7c095ca7fadfb41b4cd18659cd0122de01907a57076fd35d13bccd0
SHA512f28cfbc20eb0b9f8af82baae6f195c5019e3e4b6b268c1cc5a992db36932bae2bb1c480a119fc3b9c1d86bd9dba8eae84784a9dec570eb5ce4e9a572690e7cb7
-
Filesize
233.9MB
MD5ea783cdef19357749c05ea8dcb82dbbc
SHA1bc4b2ce3ef265dfd73f55e65dd26ca4058b06f3e
SHA256d6bda0f76515d8772f295f8085ace007d0c2108544a54d096274dadbf996513c
SHA512cf1f5e29c70f50d74b32f58b061bc8a837b7471d2cd4a785646b6b90eb79804f71edd77b1a3c4039820ccd80371ddc3488c51a31a469eca95e9c69b15f5a54eb
-
Filesize
223.3MB
MD57e410e61c60e557703ff118d8604e7b4
SHA19ecc48e344da979c54f4690678e457e756bad360
SHA256b3a2c745c012a8c0ae43bbc879040fa6cddc7b4fdbe11fb02419b7b5f9ef2319
SHA512c1fb73c2168b08cc9df53cf39c575cc976933b1d1d25a485dd6cc07ab7cfdc442ee727cc1537c5e36d55b4a9f7b065425fcb03e646eb65cadefb867fc002caf4
-
Filesize
225.2MB
MD531bbd7eebd16e68c4f032c984ed5d20f
SHA16c17e5c7194bfbba1aceb255d2df01f55ab3e535
SHA25614cb6d49a83d9365a90bb3659dd5192ff62add89d2b1d9ff166d5d79fd01ff58
SHA512c5a8e11b6deb4ead16ec587e7ed6aefaffe339f96fd34bb7624537fe8d2b5d6cf720b6eb36e497254eec47d63f59ba46e4c6f636ea55cf7337d69c7633d1ff79
-
Filesize
224.1MB
MD545887315960ec8df68978c4bf336d38f
SHA1e175880854b8c890f3dd401eda0933173f9d9298
SHA25619362b972537fb634170acedb87ef681947f682caa45efc932a4dfe2ed86bde0
SHA512ba0517883c8089f1ab57da95a3439092d2745f893327db13721cee08be7ae5affd2ca00745e4a2ee82da1bcaaec4386dedd3baa65fdf65682ec6ae001752ece0
-
Filesize
692KB
MD56cd81e6343ab21a1d118243af54833a8
SHA1bbe1a06bd85af7099fb111ac13d19df5f7f22cc0
SHA256306970a9d265a45abbd2efaf61002980695b2de7961504cf71e2833f415e82a9
SHA512295446e3732281b3afb6b06684e2642a79e6b284608305291cc01967c45d2ba5892ef687de084dbc9a22180233f1602a8c2236ec969ddda34c25d4f4e6691328
-
Filesize
692KB
MD56cd81e6343ab21a1d118243af54833a8
SHA1bbe1a06bd85af7099fb111ac13d19df5f7f22cc0
SHA256306970a9d265a45abbd2efaf61002980695b2de7961504cf71e2833f415e82a9
SHA512295446e3732281b3afb6b06684e2642a79e6b284608305291cc01967c45d2ba5892ef687de084dbc9a22180233f1602a8c2236ec969ddda34c25d4f4e6691328
-
Filesize
692KB
MD56cd81e6343ab21a1d118243af54833a8
SHA1bbe1a06bd85af7099fb111ac13d19df5f7f22cc0
SHA256306970a9d265a45abbd2efaf61002980695b2de7961504cf71e2833f415e82a9
SHA512295446e3732281b3afb6b06684e2642a79e6b284608305291cc01967c45d2ba5892ef687de084dbc9a22180233f1602a8c2236ec969ddda34c25d4f4e6691328
-
Filesize
692KB
MD56cd81e6343ab21a1d118243af54833a8
SHA1bbe1a06bd85af7099fb111ac13d19df5f7f22cc0
SHA256306970a9d265a45abbd2efaf61002980695b2de7961504cf71e2833f415e82a9
SHA512295446e3732281b3afb6b06684e2642a79e6b284608305291cc01967c45d2ba5892ef687de084dbc9a22180233f1602a8c2236ec969ddda34c25d4f4e6691328
-
Filesize
1.4MB
MD5b16ad0dd6c69c0c117c9d3647517786c
SHA1825a54040c8e8dfe9ffb243796df806ee5b05708
SHA256e8eace4e643ba86e5c4d1b966037a47e53836b5d328f2295713184613a72020f
SHA51223512007a593d62c446923c446b07d64476cecf9f7ea22dbdbe48965daa482517c7f3f50a55b7b6ed3989be3df2f96004cafe3bb2204bcde401aae00ffd44632
-
Filesize
1.4MB
MD5b16ad0dd6c69c0c117c9d3647517786c
SHA1825a54040c8e8dfe9ffb243796df806ee5b05708
SHA256e8eace4e643ba86e5c4d1b966037a47e53836b5d328f2295713184613a72020f
SHA51223512007a593d62c446923c446b07d64476cecf9f7ea22dbdbe48965daa482517c7f3f50a55b7b6ed3989be3df2f96004cafe3bb2204bcde401aae00ffd44632
-
Filesize
2.0MB
MD5db67e9196605d61d8278e5278777c71f
SHA16fe39b3ace96505269745ed2b81975abb5aea647
SHA2569b5f85fb164d177a24a521df6a9515f1dfb502d1b83581d37dae8ac3f1ad9010
SHA512d2a77d6c1c7771e714f5a19db82823a8a4dd0f0402aca0751d17e7b4d66219049aa33eab3f3841de251f7393f0d01e3c7664ef0aa17f5593ba0f569d2bfe7022
-
Filesize
2.0MB
MD5db67e9196605d61d8278e5278777c71f
SHA16fe39b3ace96505269745ed2b81975abb5aea647
SHA2569b5f85fb164d177a24a521df6a9515f1dfb502d1b83581d37dae8ac3f1ad9010
SHA512d2a77d6c1c7771e714f5a19db82823a8a4dd0f0402aca0751d17e7b4d66219049aa33eab3f3841de251f7393f0d01e3c7664ef0aa17f5593ba0f569d2bfe7022
-
Filesize
4KB
MD53e7d1bf85c27b185a920dc26b776758e
SHA13623ff4e4d244d951426647b5f765dec5bbdd99a
SHA256d5be03e38f60722dca24be527e5e97b60e383dbb6c88452964c9ce4683dcd6f5
SHA512e744594e22afbdc8482cdcad8540ebfe8444e9e4fc093fbfe785421cb77d8543f7525327e3b5ba299194944bf45afb896f7d5688ea44f840c57e2c2460b77869