Overview
overview
10Static
static
10i4D5zW6J\C...VC.dll
windows7-x64
10i4D5zW6J\C...VC.dll
windows10-2004-x64
10i4D5zW6J\C...fo.dll
windows7-x64
3i4D5zW6J\C...fo.dll
windows10-2004-x64
3i4D5zW6J\DAQExp.dll
windows7-x64
3i4D5zW6J\DAQExp.dll
windows10-2004-x64
3i4D5zW6J\a...cs.exe
windows7-x64
10i4D5zW6J\a...cs.exe
windows10-2004-x64
10Resubmissions
24/10/2023, 21:15
231024-z3wresaa34 10Analysis
-
max time kernel
151s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
24/10/2023, 21:15
Behavioral task
behavioral1
Sample
i4D5zW6J\CBSCreateVC.dll
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
i4D5zW6J\CBSCreateVC.dll
Resource
win10v2004-20231023-en
Behavioral task
behavioral3
Sample
i4D5zW6J\CBSProducstInfo.dll
Resource
win7-20231023-en
Behavioral task
behavioral4
Sample
i4D5zW6J\CBSProducstInfo.dll
Resource
win10v2004-20231023-en
Behavioral task
behavioral5
Sample
i4D5zW6J\DAQExp.dll
Resource
win7-20231020-en
Behavioral task
behavioral6
Sample
i4D5zW6J\DAQExp.dll
Resource
win10v2004-20231020-en
Behavioral task
behavioral7
Sample
i4D5zW6J\analistcs.exe
Resource
win7-20231023-en
Behavioral task
behavioral8
Sample
i4D5zW6J\analistcs.exe
Resource
win10v2004-20231023-en
General
-
Target
i4D5zW6J\analistcs.exe
-
Size
2.0MB
-
MD5
db67e9196605d61d8278e5278777c71f
-
SHA1
6fe39b3ace96505269745ed2b81975abb5aea647
-
SHA256
9b5f85fb164d177a24a521df6a9515f1dfb502d1b83581d37dae8ac3f1ad9010
-
SHA512
d2a77d6c1c7771e714f5a19db82823a8a4dd0f0402aca0751d17e7b4d66219049aa33eab3f3841de251f7393f0d01e3c7664ef0aa17f5593ba0f569d2bfe7022
-
SSDEEP
24576:4CtqIkZmZI+NFCwGYt7hGxhZxGv/Ai3DRqz1ZALpqfWmA6Nt7CaG0lCfXCwyMlna:XrZjGYoM3qc3P3gRQTXT6Fdsbs7k+
Malware Config
Signatures
-
Detects Grandoreiro payload 9 IoCs
resource yara_rule behavioral7/memory/2228-0-0x0000000000620000-0x0000000001620000-memory.dmp family_grandoreiro_v1 behavioral7/memory/2228-2-0x0000000000620000-0x0000000001620000-memory.dmp family_grandoreiro_v1 behavioral7/memory/2228-5-0x0000000000620000-0x0000000001620000-memory.dmp family_grandoreiro_v1 behavioral7/memory/2228-11-0x0000000000620000-0x0000000001620000-memory.dmp family_grandoreiro_v1 behavioral7/memory/2228-24-0x0000000000620000-0x0000000001620000-memory.dmp family_grandoreiro_v1 behavioral7/memory/2228-32-0x0000000000620000-0x0000000001620000-memory.dmp family_grandoreiro_v1 behavioral7/memory/2228-38-0x0000000000620000-0x0000000001620000-memory.dmp family_grandoreiro_v1 behavioral7/memory/2228-44-0x0000000000620000-0x0000000001620000-memory.dmp family_grandoreiro_v1 behavioral7/memory/2228-47-0x0000000000620000-0x0000000001620000-memory.dmp family_grandoreiro_v1 -
Grandoreiro
Part of a group of banking trojans, targeting Spanish and Portuguese speaking countries.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Windows\CurrentVersion\Run\cbgtpxlr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\i4D5zW6J\\analistcs.exe" analistcs.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2228 analistcs.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2228 analistcs.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2228 analistcs.exe 2228 analistcs.exe 2228 analistcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\i4D5zW6J\analistcs.exe"C:\Users\Admin\AppData\Local\Temp\i4D5zW6J\analistcs.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2228