Analysis
-
max time kernel
209s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20240903-es -
resource tags
arch:x64arch:x86image:win7-20240903-eslocale:es-esos:windows7-x64systemwindows -
submitted
06-09-2024 06:37
Behavioral task
behavioral1
Sample
ezswfdgotk30.exe
Resource
win7-20240903-es
Behavioral task
behavioral2
Sample
ezswfdgotk30.exe
Resource
win10v2004-20240802-es
General
-
Target
ezswfdgotk30.exe
-
Size
193.7MB
-
MD5
d739f133a59e226662059a9977abab6d
-
SHA1
132b492fa0e88014ec9dd8b510168b5e8f9261e2
-
SHA256
f850d6912a840db1b98fa63b47c0948ed5fb298d607f8a9ba86864891e1e160f
-
SHA512
170c7653e9b1d01d8abc93f5204f2c440bd3ca29a639c5a168066b1fa67812131ec8200d4c5d73ab4463c874b13a462c8d927c0d0561c9a93b93fa073fe1a11a
-
SSDEEP
49152:Vqk94kPpenXf4J15XRafS8nFsA/FjKvIIGIIFVMeDZC5ntPGiGcb3Ud779g3syvj:Vqk96tQRwvxzX4zkY7/59
Malware Config
Signatures
-
Detects Grandoreiro payload 2 IoCs
resource yara_rule behavioral1/memory/2756-0-0x0000000000400000-0x0000000001400000-memory.dmp family_grandoreiro_v1 behavioral1/memory/2756-6-0x0000000000400000-0x0000000001400000-memory.dmp family_grandoreiro_v1 -
Grandoreiro
Part of a group of banking trojans, targeting Spanish and Portuguese speaking countries.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\ezswfdgotk30 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ezswfdgotk30.exe" ezswfdgotk30.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ezswfdgotk30.exe