Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11-07-2024 22:36
Static task
static1
Behavioral task
behavioral1
Sample
7bb30c9b75980b7bcd755d2d968077a2c8c582a0ca11e86ae9454d067182139a.exe
Resource
win7-20240704-en
General
-
Target
7bb30c9b75980b7bcd755d2d968077a2c8c582a0ca11e86ae9454d067182139a.exe
-
Size
10.7MB
-
MD5
f7f9d3c98351d9be736e7aafb3563561
-
SHA1
1f60f25b4b8f3f38a9f40680289554216c2f9924
-
SHA256
7bb30c9b75980b7bcd755d2d968077a2c8c582a0ca11e86ae9454d067182139a
-
SHA512
fed3e1bb950d746f1ed4dffeb88259b2a6e8ad40afe161469e8b0cff7c70e40617d3ca1dffc2899d3ac35790d1817f1d54724ead5d5941d485c6c67070070a87
-
SSDEEP
196608:es+j9q6y7PuZANMUgvUExd8zeiHf/jC51U7BlUdinrDRQF6f1:eNBly7Pum3gvizei/rMGBa4nr1jt
Malware Config
Signatures
-
Detects Monster Stealer. 2 IoCs
resource yara_rule behavioral1/files/0x00070000000194f0-35.dat family_monster behavioral1/memory/2736-40-0x000000013F020000-0x000000014025E000-memory.dmp family_monster -
Executes dropped EXE 1 IoCs
pid Process 2736 stub.exe -
Loads dropped DLL 2 IoCs
pid Process 2584 7bb30c9b75980b7bcd755d2d968077a2c8c582a0ca11e86ae9454d067182139a.exe 2736 stub.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2584 wrote to memory of 2736 2584 7bb30c9b75980b7bcd755d2d968077a2c8c582a0ca11e86ae9454d067182139a.exe 30 PID 2584 wrote to memory of 2736 2584 7bb30c9b75980b7bcd755d2d968077a2c8c582a0ca11e86ae9454d067182139a.exe 30 PID 2584 wrote to memory of 2736 2584 7bb30c9b75980b7bcd755d2d968077a2c8c582a0ca11e86ae9454d067182139a.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\7bb30c9b75980b7bcd755d2d968077a2c8c582a0ca11e86ae9454d067182139a.exe"C:\Users\Admin\AppData\Local\Temp\7bb30c9b75980b7bcd755d2d968077a2c8c582a0ca11e86ae9454d067182139a.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\onefile_2584_133652109913566000\stub.exe"C:\Users\Admin\AppData\Local\Temp\7bb30c9b75980b7bcd755d2d968077a2c8c582a0ca11e86ae9454d067182139a.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD5c80b5cb43e5fe7948c3562c1fff1254e
SHA1f73cb1fb9445c96ecd56b984a1822e502e71ab9d
SHA256058925e4bbfcb460a3c00ec824b8390583baef0c780a7c7ff01d43d9eec45f20
SHA512faa97a9d5d2a0bf78123f19f8657c24921b907268938c26f79e1df6d667f7bee564259a3a11022e8629996406cda9fa00434bb2b1de3e10b9bddc59708dbad81
-
Filesize
18.0MB
MD529c69826ec2d163248c5c197bca46bf9
SHA109bbc60b1cb75a889cf1f3e69b559614756ce5b2
SHA25697fac7dcecc7df1aa7e772929db5f13b6397097b729be7c809f4313906f7c844
SHA512f1ed496499adcbff74a1f01d7beb0823533292d436054519d1a1c18ce6ba1b3d63073f36ccc886a60347dc06e1d7a4a715811b95f084d16513051658133c8dbf