Analysis
-
max time kernel
119s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
12-07-2024 15:06
Static task
static1
Behavioral task
behavioral1
Sample
buildjudit.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
buildjudit.exe
Resource
win10v2004-20240709-en
General
-
Target
buildjudit.exe
-
Size
10.7MB
-
MD5
c09ff1273b09cb1f9c7698ed147bf22e
-
SHA1
5634aec5671c4fd565694aa12cd3bf11758675d2
-
SHA256
bf8ce6bb537881386facfe6c1f9003812b985cbc4b9e9addd39e102449868d92
-
SHA512
e8f19b432dc3be9a6138d6a2f79521599087466d1c55a49d73600c876508ab307a6e65694e0effb5b705fdecdd0e201f588c8d5c3767fe9ae0b8581c318cadac
-
SSDEEP
196608:JYPBUPXmkw/NHIAj3DxH9pIKwp4+WY6Z0sU+FNuQ4zOZ+1ak3Yzb5:JYpe25NHIAj3D1rf+WYwUaMrz5aP/
Malware Config
Signatures
-
Detects Monster Stealer. 2 IoCs
resource yara_rule behavioral1/files/0x0008000000016d45-35.dat family_monster behavioral1/memory/2696-40-0x000000013FD20000-0x0000000140F55000-memory.dmp family_monster -
Executes dropped EXE 1 IoCs
pid Process 2696 stub.exe -
Loads dropped DLL 2 IoCs
pid Process 2624 buildjudit.exe 2696 stub.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2624 wrote to memory of 2696 2624 buildjudit.exe 30 PID 2624 wrote to memory of 2696 2624 buildjudit.exe 30 PID 2624 wrote to memory of 2696 2624 buildjudit.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\buildjudit.exe"C:\Users\Admin\AppData\Local\Temp\buildjudit.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\onefile_2624_133652704114732000\stub.exe"C:\Users\Admin\AppData\Local\Temp\buildjudit.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2696
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD5c80b5cb43e5fe7948c3562c1fff1254e
SHA1f73cb1fb9445c96ecd56b984a1822e502e71ab9d
SHA256058925e4bbfcb460a3c00ec824b8390583baef0c780a7c7ff01d43d9eec45f20
SHA512faa97a9d5d2a0bf78123f19f8657c24921b907268938c26f79e1df6d667f7bee564259a3a11022e8629996406cda9fa00434bb2b1de3e10b9bddc59708dbad81
-
Filesize
17.9MB
MD5972d9d2422f1a71bed840709024302f8
SHA1e52170710e3c413ae3cfa45fcdecf19db4aa382c
SHA2561c666df4eafab03ecde809ffbc40dd60b8ac2fe7bdca5632c5c4002254e6e564
SHA5123d84252756dcb4820b7794e9a92811d32631b9f3e9bd1a558fd040736b1472c0d00efb6ff7a13ae3bcd327f3bfac2b6ad94a5a3dfbc8ba54511a366c4f4727a6