Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28-10-2024 19:13

General

  • Target

    c53e3fa2e42c4d020cd5115b84d535a24625abfb61894c4e24e6f61b30d426ca.exe

  • Size

    10.7MB

  • MD5

    7bb1211519414dc50b5bc7dcdb76d572

  • SHA1

    e84fb165b5a60db76e03bd0f50cd4d4d199697a0

  • SHA256

    c53e3fa2e42c4d020cd5115b84d535a24625abfb61894c4e24e6f61b30d426ca

  • SHA512

    325e002003d34caea72f622eac4855f35098dec32d16c36587733b2cfe62f361caee67afbf54813e6670ae535e94572b64261b1cef52fec7502400c034cd979d

  • SSDEEP

    196608:T46gBp3M/NHlLJwfWzJhRWY6Z0sU+FNuQ4zOZ+1ak3Yzb5:T46ksNHL31bWYwUaMrz5aP/

Score
10/10

Malware Config

Signatures

  • Detects Monster Stealer. 2 IoCs
  • Monster

    Monster is a Golang stealer that was discovered in 2024.

  • Monster family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c53e3fa2e42c4d020cd5115b84d535a24625abfb61894c4e24e6f61b30d426ca.exe
    "C:\Users\Admin\AppData\Local\Temp\c53e3fa2e42c4d020cd5115b84d535a24625abfb61894c4e24e6f61b30d426ca.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1680
    • C:\Users\Admin\AppData\Local\Temp\onefile_1680_133746164393526000\stub.exe
      "C:\Users\Admin\AppData\Local\Temp\c53e3fa2e42c4d020cd5115b84d535a24625abfb61894c4e24e6f61b30d426ca.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:2384

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\onefile_1680_133746164393526000\python310.dll

    Filesize

    4.3MB

    MD5

    c80b5cb43e5fe7948c3562c1fff1254e

    SHA1

    f73cb1fb9445c96ecd56b984a1822e502e71ab9d

    SHA256

    058925e4bbfcb460a3c00ec824b8390583baef0c780a7c7ff01d43d9eec45f20

    SHA512

    faa97a9d5d2a0bf78123f19f8657c24921b907268938c26f79e1df6d667f7bee564259a3a11022e8629996406cda9fa00434bb2b1de3e10b9bddc59708dbad81

  • \Users\Admin\AppData\Local\Temp\onefile_1680_133746164393526000\stub.exe

    Filesize

    17.9MB

    MD5

    6bfc9dc4ed69dca566f447971e0d2dc7

    SHA1

    21007c7f1418f57d2200e3a4ba8d018799dd8857

    SHA256

    df78017c1b0a339b33d6959c9434e5918ed6d5d2b3b795fba301fa314b9fc59b

    SHA512

    40719c80c363552ed3546e1a0ddfceab363eb1bb8c0b990fafcc9749c13c6722b2c94ee15e10a0597f7b4954bceaf7a7255becd2d7a5e764db74947f715ccf2c

  • memory/1680-75-0x000000013F370000-0x000000013FE45000-memory.dmp

    Filesize

    10.8MB

  • memory/2384-40-0x000000013FCB0000-0x0000000140EE5000-memory.dmp

    Filesize

    18.2MB