Analysis

  • max time kernel
    239s
  • max time network
    240s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    29-08-2024 22:39

General

  • Target

    8f7f41837b9cc115588a83268e8f240149e07859eb1a811aaf135c03d14dbe0c.exe

  • Size

    10.5MB

  • MD5

    e6d4b7b529cc401a1c528e8833352039

  • SHA1

    7b2837a2c9eea49e328a425db174a3b5c77d6bb5

  • SHA256

    8f7f41837b9cc115588a83268e8f240149e07859eb1a811aaf135c03d14dbe0c

  • SHA512

    35804a8eb6c31da2b8d36518bd1c2e9afeb5efbb522f2fc47b8d4ba83fb525bd65210732aa4823d7da8aa4f8b5accb4817588a8e103ab7a10e87a585d6cf4ea3

  • SSDEEP

    196608:/S0cuyka/QRjnlhhitMYQRs53WiJpP4vdfoOjvHNCtT4732ZYWf1:/SzEj30mDRs9pPP4vpR32ZYWf

Score
10/10

Malware Config

Signatures

  • Detects Monster Stealer. 2 IoCs
  • Monster

    Monster is a Golang stealer that was discovered in 2024.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8f7f41837b9cc115588a83268e8f240149e07859eb1a811aaf135c03d14dbe0c.exe
    "C:\Users\Admin\AppData\Local\Temp\8f7f41837b9cc115588a83268e8f240149e07859eb1a811aaf135c03d14dbe0c.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2744
    • C:\Users\Admin\AppData\Local\Temp\onefile_2744_133694447483838000\stub.exe
      C:\Users\Admin\AppData\Local\Temp\8f7f41837b9cc115588a83268e8f240149e07859eb1a811aaf135c03d14dbe0c.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:2812

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\onefile_2744_133694447483838000\python310.dll

    Filesize

    4.3MB

    MD5

    c80b5cb43e5fe7948c3562c1fff1254e

    SHA1

    f73cb1fb9445c96ecd56b984a1822e502e71ab9d

    SHA256

    058925e4bbfcb460a3c00ec824b8390583baef0c780a7c7ff01d43d9eec45f20

    SHA512

    faa97a9d5d2a0bf78123f19f8657c24921b907268938c26f79e1df6d667f7bee564259a3a11022e8629996406cda9fa00434bb2b1de3e10b9bddc59708dbad81

  • \Users\Admin\AppData\Local\Temp\onefile_2744_133694447483838000\stub.exe

    Filesize

    15.9MB

    MD5

    d66b6390d1b5b309676b59d5017869a9

    SHA1

    b1821d78403faa151cd771a9df7e140b0ee686b8

    SHA256

    e3499112471e1fee441ff5ea3302661d6089c46d45922a1aaca547712352702f

    SHA512

    55f6a8dd7e2fd783469bd608348f659aa28c3ceec3f4fe0fa3ac362d745da0a3e518efff2c54e550102cb8b008617d24ca4bb7169ace5ecc0b6c856be61770d6

  • memory/2744-75-0x000000013F660000-0x0000000140107000-memory.dmp

    Filesize

    10.7MB

  • memory/2812-40-0x000000013F6F0000-0x0000000140716000-memory.dmp

    Filesize

    16.1MB