Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
18-07-2024 22:34
Static task
static1
Behavioral task
behavioral1
Sample
59ccbffadb99ec35b6f8659aff134a55f5f09c505ff3deedeee388a1d3f4a91f.exe
Resource
win7-20240705-en
General
-
Target
59ccbffadb99ec35b6f8659aff134a55f5f09c505ff3deedeee388a1d3f4a91f.exe
-
Size
10.7MB
-
MD5
3837715b7a44d4255ab1190ec2f53605
-
SHA1
e652ffa3c84e64aad39f7e1766a15892bcb40ac4
-
SHA256
59ccbffadb99ec35b6f8659aff134a55f5f09c505ff3deedeee388a1d3f4a91f
-
SHA512
4a8ec8f08771588c46653a8b8e7fc70e262d77b254cc5ab098f52f1384b34cb59dedbbb410af208fdabe3e88eb5f9550ca4e653d142636d29f918e9c491a20a5
-
SSDEEP
196608:ABs+j9q6y7PuZANMOgvUcjukIPjOpTKku/v6vgC5xU7BlUdinrDRQF6f1:YNBly7Pumpgv6kW0kKvggGBa4nr1jt
Malware Config
Signatures
-
Detects Monster Stealer. 2 IoCs
resource yara_rule behavioral1/files/0x00080000000171a6-35.dat family_monster behavioral1/memory/1448-40-0x000000013F090000-0x00000001402CE000-memory.dmp family_monster -
Executes dropped EXE 1 IoCs
pid Process 1448 stub.exe -
Loads dropped DLL 2 IoCs
pid Process 2224 59ccbffadb99ec35b6f8659aff134a55f5f09c505ff3deedeee388a1d3f4a91f.exe 1448 stub.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2224 wrote to memory of 1448 2224 59ccbffadb99ec35b6f8659aff134a55f5f09c505ff3deedeee388a1d3f4a91f.exe 30 PID 2224 wrote to memory of 1448 2224 59ccbffadb99ec35b6f8659aff134a55f5f09c505ff3deedeee388a1d3f4a91f.exe 30 PID 2224 wrote to memory of 1448 2224 59ccbffadb99ec35b6f8659aff134a55f5f09c505ff3deedeee388a1d3f4a91f.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\59ccbffadb99ec35b6f8659aff134a55f5f09c505ff3deedeee388a1d3f4a91f.exe"C:\Users\Admin\AppData\Local\Temp\59ccbffadb99ec35b6f8659aff134a55f5f09c505ff3deedeee388a1d3f4a91f.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\onefile_2224_133658157024188000\stub.exe"C:\Users\Admin\AppData\Local\Temp\59ccbffadb99ec35b6f8659aff134a55f5f09c505ff3deedeee388a1d3f4a91f.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1448
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD5c80b5cb43e5fe7948c3562c1fff1254e
SHA1f73cb1fb9445c96ecd56b984a1822e502e71ab9d
SHA256058925e4bbfcb460a3c00ec824b8390583baef0c780a7c7ff01d43d9eec45f20
SHA512faa97a9d5d2a0bf78123f19f8657c24921b907268938c26f79e1df6d667f7bee564259a3a11022e8629996406cda9fa00434bb2b1de3e10b9bddc59708dbad81
-
Filesize
18.0MB
MD59029b4465072bea5bd86bdcd46725cd8
SHA19f721371eddc1c2b6c4a3453dc5208e391475335
SHA256511228a7b9067018018849e8b052cc86b9ad4e2e0bc6ca5f3ea03394d92e73db
SHA51245dff4271a96bb282863c054f8584ec00332ca4660acf2d37450e4028492e615cddcdb259e09bdcd25446666746fa7decaefc3928c4e54924c08da206137587d