Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
21-06-2024 01:00
Static task
static1
Behavioral task
behavioral1
Sample
0608a7559f895fab33ae65bbfbdc5bebd21eea984f76e1b5571c80906824d665.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0608a7559f895fab33ae65bbfbdc5bebd21eea984f76e1b5571c80906824d665.exe
Resource
win10v2004-20240508-en
General
-
Target
0608a7559f895fab33ae65bbfbdc5bebd21eea984f76e1b5571c80906824d665.exe
-
Size
10.7MB
-
MD5
3f4f5c57433724a32b7498b6a2c91bf0
-
SHA1
04757ff666e1afa31679dd6bed4ed3af671332a3
-
SHA256
0608a7559f895fab33ae65bbfbdc5bebd21eea984f76e1b5571c80906824d665
-
SHA512
cf572ca616b4f4e6e472e33e8d6d90b85d5885fa64d8bca4507450d66d65057efa771f58c31ea13f394fd0e7b0ff2fcaa9d54c61f28b27b98a79c27bc964f935
-
SSDEEP
196608:mRu4YAJSAfoaqA6U+L5LsSmyYbH6t08RMQcCqcGUIRBw0xvH77Y:2u4YAJSAfoaZ0sSmpH6W8R/RVIc2vH7
Malware Config
Signatures
-
Detects Monster Stealer. 2 IoCs
resource yara_rule behavioral1/files/0x002f000000014c2d-35.dat family_monster behavioral1/memory/2552-40-0x000000013F4A0000-0x00000001406DF000-memory.dmp family_monster -
Executes dropped EXE 1 IoCs
pid Process 2552 stub.exe -
Loads dropped DLL 2 IoCs
pid Process 2868 0608a7559f895fab33ae65bbfbdc5bebd21eea984f76e1b5571c80906824d665.exe 2552 stub.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2552 2868 0608a7559f895fab33ae65bbfbdc5bebd21eea984f76e1b5571c80906824d665.exe 28 PID 2868 wrote to memory of 2552 2868 0608a7559f895fab33ae65bbfbdc5bebd21eea984f76e1b5571c80906824d665.exe 28 PID 2868 wrote to memory of 2552 2868 0608a7559f895fab33ae65bbfbdc5bebd21eea984f76e1b5571c80906824d665.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0608a7559f895fab33ae65bbfbdc5bebd21eea984f76e1b5571c80906824d665.exe"C:\Users\Admin\AppData\Local\Temp\0608a7559f895fab33ae65bbfbdc5bebd21eea984f76e1b5571c80906824d665.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\onefile_2868_133634052513562000\stub.exe"C:\Users\Admin\AppData\Local\Temp\0608a7559f895fab33ae65bbfbdc5bebd21eea984f76e1b5571c80906824d665.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD5c80b5cb43e5fe7948c3562c1fff1254e
SHA1f73cb1fb9445c96ecd56b984a1822e502e71ab9d
SHA256058925e4bbfcb460a3c00ec824b8390583baef0c780a7c7ff01d43d9eec45f20
SHA512faa97a9d5d2a0bf78123f19f8657c24921b907268938c26f79e1df6d667f7bee564259a3a11022e8629996406cda9fa00434bb2b1de3e10b9bddc59708dbad81
-
Filesize
18.0MB
MD5ed9d600d2e640eaa1c915dc516da9988
SHA19c10629bc0255009434e64deaee5b898fc3711e2
SHA2562b8a2a3c53a019ca674287e1513a8e0851f2181699e37f385541537801ed1d41
SHA5129001454bfabf2d9621ad997726aad281638c4b2e8dc134994f479d391bae91c5d0aa24317e85e8e91956cc34357e1ed9d6682f2fe9a023d74b003a420325db68