Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01-08-2024 09:41
Static task
static1
Behavioral task
behavioral1
Sample
build.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
build.exe
Resource
win10v2004-20240730-en
General
-
Target
build.exe
-
Size
10.7MB
-
MD5
c8cf26425a6ce325035e6da8dfb16c4e
-
SHA1
31c2b3a26c05b4bf8dea8718d1df13a0c2be22ee
-
SHA256
9f7be9bf913d8378f094b3f6416db9aa4c80c380000202f7cfaddadb6efc41b4
-
SHA512
0321e48e185c22165ac6429e08afac1ccfdf393249436c8eac8a6d64794b3b399740aa5b2be23d568f57495d17e9220280ed1c2ea8f012b2c4021beb02cbc646
-
SSDEEP
196608:SnvxO+j9q6y7PuZANMCgvUF+j6yrO5H+KB4kj6vgC51U7BlUdinrDRQF6f1:WvxPBly7Pumdgv9RrOF+LkGvgMGBa4n7
Malware Config
Signatures
-
Detects Monster Stealer. 2 IoCs
resource yara_rule behavioral1/files/0x0008000000016dff-35.dat family_monster behavioral1/memory/2560-40-0x000000013FD70000-0x0000000140FAE000-memory.dmp family_monster -
Executes dropped EXE 1 IoCs
pid Process 2560 stub.exe -
Loads dropped DLL 2 IoCs
pid Process 2680 build.exe 2560 stub.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2680 wrote to memory of 2560 2680 build.exe 30 PID 2680 wrote to memory of 2560 2680 build.exe 30 PID 2680 wrote to memory of 2560 2680 build.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\build.exe"C:\Users\Admin\AppData\Local\Temp\build.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\onefile_2680_133669789104632000\stub.exe"C:\Users\Admin\AppData\Local\Temp\build.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD5c80b5cb43e5fe7948c3562c1fff1254e
SHA1f73cb1fb9445c96ecd56b984a1822e502e71ab9d
SHA256058925e4bbfcb460a3c00ec824b8390583baef0c780a7c7ff01d43d9eec45f20
SHA512faa97a9d5d2a0bf78123f19f8657c24921b907268938c26f79e1df6d667f7bee564259a3a11022e8629996406cda9fa00434bb2b1de3e10b9bddc59708dbad81
-
Filesize
18.0MB
MD51cf17408048317fc82265ed6a1c7893d
SHA19bfec40d6eb339c5a6c2ad6e5fa7cebc147654c5
SHA2561352ad9860a42137b096d9675a7b8d578fbc596d965de3cb352619cbe6aaf4e9
SHA51266322d7cb5931017acaa29970da48642d03ce35007f130511b2848b67169c1dd4167f1e5a31e5e1dfe5f7122846482bdb878b5cd695ac58009033fd620813a0f