Analysis

  • max time kernel
    14s
  • max time network
    21s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    09-07-2024 17:36

General

  • Target

    7bb30c9b75980b7bcd755d2d968077a2c8c582a0ca11e86ae9454d067182139a.exe

  • Size

    10.7MB

  • MD5

    f7f9d3c98351d9be736e7aafb3563561

  • SHA1

    1f60f25b4b8f3f38a9f40680289554216c2f9924

  • SHA256

    7bb30c9b75980b7bcd755d2d968077a2c8c582a0ca11e86ae9454d067182139a

  • SHA512

    fed3e1bb950d746f1ed4dffeb88259b2a6e8ad40afe161469e8b0cff7c70e40617d3ca1dffc2899d3ac35790d1817f1d54724ead5d5941d485c6c67070070a87

  • SSDEEP

    196608:es+j9q6y7PuZANMUgvUExd8zeiHf/jC51U7BlUdinrDRQF6f1:eNBly7Pum3gvizei/rMGBa4nr1jt

Score
10/10

Malware Config

Signatures

  • Detects Monster Stealer. 2 IoCs
  • Monster

    Monster is a Golang stealer that was discovered in 2024.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7bb30c9b75980b7bcd755d2d968077a2c8c582a0ca11e86ae9454d067182139a.exe
    "C:\Users\Admin\AppData\Local\Temp\7bb30c9b75980b7bcd755d2d968077a2c8c582a0ca11e86ae9454d067182139a.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1140
    • C:\Users\Admin\AppData\Local\Temp\onefile_1140_133650202336720000\stub.exe
      "C:\Users\Admin\AppData\Local\Temp\7bb30c9b75980b7bcd755d2d968077a2c8c582a0ca11e86ae9454d067182139a.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:2764

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\onefile_1140_133650202336720000\python310.dll

    Filesize

    4.3MB

    MD5

    c80b5cb43e5fe7948c3562c1fff1254e

    SHA1

    f73cb1fb9445c96ecd56b984a1822e502e71ab9d

    SHA256

    058925e4bbfcb460a3c00ec824b8390583baef0c780a7c7ff01d43d9eec45f20

    SHA512

    faa97a9d5d2a0bf78123f19f8657c24921b907268938c26f79e1df6d667f7bee564259a3a11022e8629996406cda9fa00434bb2b1de3e10b9bddc59708dbad81

  • \Users\Admin\AppData\Local\Temp\onefile_1140_133650202336720000\stub.exe

    Filesize

    18.0MB

    MD5

    29c69826ec2d163248c5c197bca46bf9

    SHA1

    09bbc60b1cb75a889cf1f3e69b559614756ce5b2

    SHA256

    97fac7dcecc7df1aa7e772929db5f13b6397097b729be7c809f4313906f7c844

    SHA512

    f1ed496499adcbff74a1f01d7beb0823533292d436054519d1a1c18ce6ba1b3d63073f36ccc886a60347dc06e1d7a4a715811b95f084d16513051658133c8dbf

  • memory/1140-75-0x000000013FE10000-0x00000001408E7000-memory.dmp

    Filesize

    10.8MB

  • memory/2764-40-0x000000013F480000-0x00000001406BE000-memory.dmp

    Filesize

    18.2MB