Analysis
-
max time kernel
12s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
28-10-2024 19:15
Static task
static1
Behavioral task
behavioral1
Sample
Counter-Strike 2 VIP.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Counter-Strike 2 VIP.exe
Resource
win10v2004-20241007-en
General
-
Target
Counter-Strike 2 VIP.exe
-
Size
11.0MB
-
MD5
ef63dbe9318ba8d158435306e2012b14
-
SHA1
19c056e736d0787f1f7cddbcf311ce18c73d066f
-
SHA256
826c939a28a63fcdad2f3ac8ff5680b1296bbf4b5c7a19bf6ba61f1e04287590
-
SHA512
8660bcb1a5acb7155cdeba05ddaad24a7fa6142d876eb8ae06f3b5d4a72e5c136658f10f231f0be3fca0bc1d682ba82ac91ef8c754104bbdecd269f7f952ac04
-
SSDEEP
196608:x2Wx18CmQ6ADFxwNpp1v7QFpsslzon4s0D7uKj00qgDyp4EA2EQ2nEEgh:x2A18CmUFSNpjcesla4s0DCB7NMEE
Malware Config
Signatures
-
Detects Monster Stealer. 2 IoCs
Processes:
resource yara_rule behavioral1/files/0x00080000000186b7-35.dat family_monster behavioral1/memory/2780-40-0x000000013FF10000-0x0000000141146000-memory.dmp family_monster -
Monster family
-
Executes dropped EXE 1 IoCs
Processes:
stub.exepid Process 2780 stub.exe -
Loads dropped DLL 2 IoCs
Processes:
Counter-Strike 2 VIP.exestub.exepid Process 1056 Counter-Strike 2 VIP.exe 2780 stub.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Counter-Strike 2 VIP.exedescription pid Process procid_target PID 1056 wrote to memory of 2780 1056 Counter-Strike 2 VIP.exe 29 PID 1056 wrote to memory of 2780 1056 Counter-Strike 2 VIP.exe 29 PID 1056 wrote to memory of 2780 1056 Counter-Strike 2 VIP.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\Counter-Strike 2 VIP.exe"C:\Users\Admin\AppData\Local\Temp\Counter-Strike 2 VIP.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\onefile_1056_133746165843434000\stub.exe"C:\Users\Admin\AppData\Local\Temp\Counter-Strike 2 VIP.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD5c80b5cb43e5fe7948c3562c1fff1254e
SHA1f73cb1fb9445c96ecd56b984a1822e502e71ab9d
SHA256058925e4bbfcb460a3c00ec824b8390583baef0c780a7c7ff01d43d9eec45f20
SHA512faa97a9d5d2a0bf78123f19f8657c24921b907268938c26f79e1df6d667f7bee564259a3a11022e8629996406cda9fa00434bb2b1de3e10b9bddc59708dbad81
-
Filesize
17.9MB
MD56670b9a06b5ab7fb49ca6d5e56f43be0
SHA18d5cf860b24a4b5a10e3b0fd431df823836c97c5
SHA25617a9b376d9eeeb3bf20a25629f6724540c3f6dbbf24672204e1a8e50b79f45df
SHA51230da6a2c4d98b4ca24f694030d33d5d8e252109f0c187d2a7482fc45747d6d1f24170643f4a414310f5f5fa71be3109b796338d376d880481c5316a4b0b87c6c