Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
28-10-2024 19:13
Static task
static1
Behavioral task
behavioral1
Sample
buildjudit.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
buildjudit.exe
Resource
win10v2004-20241007-en
General
-
Target
buildjudit.exe
-
Size
10.7MB
-
MD5
c09ff1273b09cb1f9c7698ed147bf22e
-
SHA1
5634aec5671c4fd565694aa12cd3bf11758675d2
-
SHA256
bf8ce6bb537881386facfe6c1f9003812b985cbc4b9e9addd39e102449868d92
-
SHA512
e8f19b432dc3be9a6138d6a2f79521599087466d1c55a49d73600c876508ab307a6e65694e0effb5b705fdecdd0e201f588c8d5c3767fe9ae0b8581c318cadac
-
SSDEEP
196608:JYPBUPXmkw/NHIAj3DxH9pIKwp4+WY6Z0sU+FNuQ4zOZ+1ak3Yzb5:JYpe25NHIAj3D1rf+WYwUaMrz5aP/
Malware Config
Signatures
-
Detects Monster Stealer. 2 IoCs
resource yara_rule behavioral1/files/0x0008000000016d71-35.dat family_monster behavioral1/memory/2764-40-0x000000013F8A0000-0x0000000140AD5000-memory.dmp family_monster -
Monster family
-
Executes dropped EXE 1 IoCs
pid Process 2764 stub.exe -
Loads dropped DLL 2 IoCs
pid Process 1540 buildjudit.exe 2764 stub.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1540 wrote to memory of 2764 1540 buildjudit.exe 30 PID 1540 wrote to memory of 2764 1540 buildjudit.exe 30 PID 1540 wrote to memory of 2764 1540 buildjudit.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\buildjudit.exe"C:\Users\Admin\AppData\Local\Temp\buildjudit.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\onefile_1540_133746164336818000\stub.exe"C:\Users\Admin\AppData\Local\Temp\buildjudit.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD5c80b5cb43e5fe7948c3562c1fff1254e
SHA1f73cb1fb9445c96ecd56b984a1822e502e71ab9d
SHA256058925e4bbfcb460a3c00ec824b8390583baef0c780a7c7ff01d43d9eec45f20
SHA512faa97a9d5d2a0bf78123f19f8657c24921b907268938c26f79e1df6d667f7bee564259a3a11022e8629996406cda9fa00434bb2b1de3e10b9bddc59708dbad81
-
Filesize
17.9MB
MD5972d9d2422f1a71bed840709024302f8
SHA1e52170710e3c413ae3cfa45fcdecf19db4aa382c
SHA2561c666df4eafab03ecde809ffbc40dd60b8ac2fe7bdca5632c5c4002254e6e564
SHA5123d84252756dcb4820b7794e9a92811d32631b9f3e9bd1a558fd040736b1472c0d00efb6ff7a13ae3bcd327f3bfac2b6ad94a5a3dfbc8ba54511a366c4f4727a6