Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27/12/2024, 18:08
Behavioral task
behavioral1
Sample
Sigmanly_bdd775603c502c44f8fcb4ba3edcde48a6c6b188f20cc76b9b662cc6c7a284c0.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Sigmanly_bdd775603c502c44f8fcb4ba3edcde48a6c6b188f20cc76b9b662cc6c7a284c0.dll
Resource
win10v2004-20241007-en
General
-
Target
Sigmanly_bdd775603c502c44f8fcb4ba3edcde48a6c6b188f20cc76b9b662cc6c7a284c0.dll
-
Size
30.5MB
-
MD5
458c377c22340ea17a942ab200c063ae
-
SHA1
5c69e074616448b725250b7181102318f986239b
-
SHA256
bdd775603c502c44f8fcb4ba3edcde48a6c6b188f20cc76b9b662cc6c7a284c0
-
SHA512
82105cc7477b4cf208067324358ff6fb5c4a80da881eb7dfcd74551fc5d5cb757f02b1a6ed5da0c3b79770d7c1a195cb65473df04272b405e6dc4a32ae32a7f0
-
SSDEEP
393216:NpjeWRbosw2LgMubfSEh8XASixsd2mz5KP6AGP5U7dKgw:NteilDE3bKwSIsd2m+5vdKR
Malware Config
Signatures
-
Detects Grandoreiro payload 2 IoCs
resource yara_rule behavioral1/memory/2468-0-0x00000000021F0000-0x0000000004088000-memory.dmp family_grandoreiro_v1 behavioral1/memory/2468-32-0x00000000021F0000-0x0000000004088000-memory.dmp family_grandoreiro_v1 -
Grandoreiro
Part of a group of banking trojans, targeting Spanish and Portuguese speaking countries.
-
Grandoreiro family
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2468 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2468 2160 rundll32.exe 30 PID 2160 wrote to memory of 2468 2160 rundll32.exe 30 PID 2160 wrote to memory of 2468 2160 rundll32.exe 30 PID 2160 wrote to memory of 2468 2160 rundll32.exe 30 PID 2160 wrote to memory of 2468 2160 rundll32.exe 30 PID 2160 wrote to memory of 2468 2160 rundll32.exe 30 PID 2160 wrote to memory of 2468 2160 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Sigmanly_bdd775603c502c44f8fcb4ba3edcde48a6c6b188f20cc76b9b662cc6c7a284c0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Sigmanly_bdd775603c502c44f8fcb4ba3edcde48a6c6b188f20cc76b9b662cc6c7a284c0.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2468
-