Analysis
-
max time kernel
239s -
max time network
240s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
29-08-2024 22:39
Static task
static1
Behavioral task
behavioral1
Sample
8f7f41837b9cc115588a83268e8f240149e07859eb1a811aaf135c03d14dbe0c.exe
Resource
win7-20240729-en
General
-
Target
8f7f41837b9cc115588a83268e8f240149e07859eb1a811aaf135c03d14dbe0c.exe
-
Size
10.5MB
-
MD5
e6d4b7b529cc401a1c528e8833352039
-
SHA1
7b2837a2c9eea49e328a425db174a3b5c77d6bb5
-
SHA256
8f7f41837b9cc115588a83268e8f240149e07859eb1a811aaf135c03d14dbe0c
-
SHA512
35804a8eb6c31da2b8d36518bd1c2e9afeb5efbb522f2fc47b8d4ba83fb525bd65210732aa4823d7da8aa4f8b5accb4817588a8e103ab7a10e87a585d6cf4ea3
-
SSDEEP
196608:/S0cuyka/QRjnlhhitMYQRs53WiJpP4vdfoOjvHNCtT4732ZYWf1:/SzEj30mDRs9pPP4vpR32ZYWf
Malware Config
Signatures
-
Detects Monster Stealer. 2 IoCs
resource yara_rule behavioral1/files/0x00070000000186d9-35.dat family_monster behavioral1/memory/2812-40-0x000000013F6F0000-0x0000000140716000-memory.dmp family_monster -
Executes dropped EXE 1 IoCs
pid Process 2812 stub.exe -
Loads dropped DLL 2 IoCs
pid Process 2744 8f7f41837b9cc115588a83268e8f240149e07859eb1a811aaf135c03d14dbe0c.exe 2812 stub.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2744 wrote to memory of 2812 2744 8f7f41837b9cc115588a83268e8f240149e07859eb1a811aaf135c03d14dbe0c.exe 30 PID 2744 wrote to memory of 2812 2744 8f7f41837b9cc115588a83268e8f240149e07859eb1a811aaf135c03d14dbe0c.exe 30 PID 2744 wrote to memory of 2812 2744 8f7f41837b9cc115588a83268e8f240149e07859eb1a811aaf135c03d14dbe0c.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f7f41837b9cc115588a83268e8f240149e07859eb1a811aaf135c03d14dbe0c.exe"C:\Users\Admin\AppData\Local\Temp\8f7f41837b9cc115588a83268e8f240149e07859eb1a811aaf135c03d14dbe0c.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\onefile_2744_133694447483838000\stub.exeC:\Users\Admin\AppData\Local\Temp\8f7f41837b9cc115588a83268e8f240149e07859eb1a811aaf135c03d14dbe0c.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD5c80b5cb43e5fe7948c3562c1fff1254e
SHA1f73cb1fb9445c96ecd56b984a1822e502e71ab9d
SHA256058925e4bbfcb460a3c00ec824b8390583baef0c780a7c7ff01d43d9eec45f20
SHA512faa97a9d5d2a0bf78123f19f8657c24921b907268938c26f79e1df6d667f7bee564259a3a11022e8629996406cda9fa00434bb2b1de3e10b9bddc59708dbad81
-
Filesize
15.9MB
MD5d66b6390d1b5b309676b59d5017869a9
SHA1b1821d78403faa151cd771a9df7e140b0ee686b8
SHA256e3499112471e1fee441ff5ea3302661d6089c46d45922a1aaca547712352702f
SHA51255f6a8dd7e2fd783469bd608348f659aa28c3ceec3f4fe0fa3ac362d745da0a3e518efff2c54e550102cb8b008617d24ca4bb7169ace5ecc0b6c856be61770d6