Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
29-12-2024 10:41
Behavioral task
behavioral1
Sample
StarGrabber.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
StarGrabber.exe
Resource
win10v2004-20241007-en
General
-
Target
StarGrabber.exe
-
Size
15.8MB
-
MD5
ca2dd73369bee9856e72fa7ea09e0a8a
-
SHA1
0c0154c3408402a17e6311580174fed7c6fbbe4a
-
SHA256
824e76a21ae447e382bb32a0b234ccfc68ce5ffd76ae170b340eb9249184668f
-
SHA512
2caf95091fdc953a1e171b37a916852da9ed9efb468d124414710cebbbfee5a50a40fc6ac0d147d544d6609785ad8ed80f86304c76ad18a22324aa71bd76d3c3
-
SSDEEP
393216:pQNPWFszf490j9c5hlERpAdZYycn0trh9Jb8YT:pQoFszfm0JEhkpAdZgCFjF
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1828 StarGrabber.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2380 wrote to memory of 1828 2380 StarGrabber.exe 30 PID 2380 wrote to memory of 1828 2380 StarGrabber.exe 30 PID 2380 wrote to memory of 1828 2380 StarGrabber.exe 30
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD511c051f93c922d6b6b4829772f27a5be
SHA142fbdf3403a4bc3d46d348ca37a9f835e073d440
SHA2560eabf135bb9492e561bbbc5602a933623c9e461aceaf6eb1ceced635e363cd5c
SHA5121cdec23486cffcb91098a8b2c3f1262d6703946acf52aa2fe701964fb228d1411d9b6683bd54527860e10affc0e3d3de92a6ecf2c6c8465e9c8b9a7304e2a4a6
-
Filesize
4B
MD5365c9bfeb7d89244f2ce01c1de44cb85
SHA1d7a03141d5d6b1e88b6b59ef08b6681df212c599
SHA256ceebae7b8927a3227e5303cf5e0f1f7b34bb542ad7250ac03fbcde36ec2f1508
SHA512d220d322a4053d84130567d626a9f7bb2fb8f0b854da1621f001826dc61b0ed6d3f91793627e6f0ac2ac27aea2b986b6a7a63427f05fe004d8a2adfbdadc13c1