Analysis

  • max time kernel
    122s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    15-07-2024 05:04

General

  • Target

    59ccbffadb99ec35b6f8659aff134a55f5f09c505ff3deedeee388a1d3f4a91f.exe

  • Size

    10.7MB

  • MD5

    3837715b7a44d4255ab1190ec2f53605

  • SHA1

    e652ffa3c84e64aad39f7e1766a15892bcb40ac4

  • SHA256

    59ccbffadb99ec35b6f8659aff134a55f5f09c505ff3deedeee388a1d3f4a91f

  • SHA512

    4a8ec8f08771588c46653a8b8e7fc70e262d77b254cc5ab098f52f1384b34cb59dedbbb410af208fdabe3e88eb5f9550ca4e653d142636d29f918e9c491a20a5

  • SSDEEP

    196608:ABs+j9q6y7PuZANMOgvUcjukIPjOpTKku/v6vgC5xU7BlUdinrDRQF6f1:YNBly7Pumpgv6kW0kKvggGBa4nr1jt

Score
10/10

Malware Config

Signatures

  • Detects Monster Stealer. 2 IoCs
  • Monster

    Monster is a Golang stealer that was discovered in 2024.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\59ccbffadb99ec35b6f8659aff134a55f5f09c505ff3deedeee388a1d3f4a91f.exe
    "C:\Users\Admin\AppData\Local\Temp\59ccbffadb99ec35b6f8659aff134a55f5f09c505ff3deedeee388a1d3f4a91f.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2196
    • C:\Users\Admin\AppData\Local\Temp\onefile_2196_133654934564572000\stub.exe
      "C:\Users\Admin\AppData\Local\Temp\59ccbffadb99ec35b6f8659aff134a55f5f09c505ff3deedeee388a1d3f4a91f.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:2924

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\onefile_2196_133654934564572000\python310.dll

    Filesize

    4.3MB

    MD5

    c80b5cb43e5fe7948c3562c1fff1254e

    SHA1

    f73cb1fb9445c96ecd56b984a1822e502e71ab9d

    SHA256

    058925e4bbfcb460a3c00ec824b8390583baef0c780a7c7ff01d43d9eec45f20

    SHA512

    faa97a9d5d2a0bf78123f19f8657c24921b907268938c26f79e1df6d667f7bee564259a3a11022e8629996406cda9fa00434bb2b1de3e10b9bddc59708dbad81

  • \Users\Admin\AppData\Local\Temp\onefile_2196_133654934564572000\stub.exe

    Filesize

    18.0MB

    MD5

    9029b4465072bea5bd86bdcd46725cd8

    SHA1

    9f721371eddc1c2b6c4a3453dc5208e391475335

    SHA256

    511228a7b9067018018849e8b052cc86b9ad4e2e0bc6ca5f3ea03394d92e73db

    SHA512

    45dff4271a96bb282863c054f8584ec00332ca4660acf2d37450e4028492e615cddcdb259e09bdcd25446666746fa7decaefc3928c4e54924c08da206137587d

  • memory/2196-75-0x000000013F0D0000-0x000000013FBA8000-memory.dmp

    Filesize

    10.8MB

  • memory/2924-40-0x000000013F310000-0x000000014054E000-memory.dmp

    Filesize

    18.2MB