Analysis

  • max time kernel
    12s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    28-10-2024 19:15

General

  • Target

    Counter-Strike 2 VIP.exe

  • Size

    11.0MB

  • MD5

    ef63dbe9318ba8d158435306e2012b14

  • SHA1

    19c056e736d0787f1f7cddbcf311ce18c73d066f

  • SHA256

    826c939a28a63fcdad2f3ac8ff5680b1296bbf4b5c7a19bf6ba61f1e04287590

  • SHA512

    8660bcb1a5acb7155cdeba05ddaad24a7fa6142d876eb8ae06f3b5d4a72e5c136658f10f231f0be3fca0bc1d682ba82ac91ef8c754104bbdecd269f7f952ac04

  • SSDEEP

    196608:x2Wx18CmQ6ADFxwNpp1v7QFpsslzon4s0D7uKj00qgDyp4EA2EQ2nEEgh:x2A18CmUFSNpjcesla4s0DCB7NMEE

Score
10/10

Malware Config

Signatures

  • Detects Monster Stealer. 2 IoCs
  • Monster

    Monster is a Golang stealer that was discovered in 2024.

  • Monster family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Counter-Strike 2 VIP.exe
    "C:\Users\Admin\AppData\Local\Temp\Counter-Strike 2 VIP.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1056
    • C:\Users\Admin\AppData\Local\Temp\onefile_1056_133746165843434000\stub.exe
      "C:\Users\Admin\AppData\Local\Temp\Counter-Strike 2 VIP.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:2780

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\onefile_1056_133746165843434000\python310.dll

    Filesize

    4.3MB

    MD5

    c80b5cb43e5fe7948c3562c1fff1254e

    SHA1

    f73cb1fb9445c96ecd56b984a1822e502e71ab9d

    SHA256

    058925e4bbfcb460a3c00ec824b8390583baef0c780a7c7ff01d43d9eec45f20

    SHA512

    faa97a9d5d2a0bf78123f19f8657c24921b907268938c26f79e1df6d667f7bee564259a3a11022e8629996406cda9fa00434bb2b1de3e10b9bddc59708dbad81

  • \Users\Admin\AppData\Local\Temp\onefile_1056_133746165843434000\stub.exe

    Filesize

    17.9MB

    MD5

    6670b9a06b5ab7fb49ca6d5e56f43be0

    SHA1

    8d5cf860b24a4b5a10e3b0fd431df823836c97c5

    SHA256

    17a9b376d9eeeb3bf20a25629f6724540c3f6dbbf24672204e1a8e50b79f45df

    SHA512

    30da6a2c4d98b4ca24f694030d33d5d8e252109f0c187d2a7482fc45747d6d1f24170643f4a414310f5f5fa71be3109b796338d376d880481c5316a4b0b87c6c

  • memory/1056-75-0x000000013F8F0000-0x0000000140407000-memory.dmp

    Filesize

    11.1MB

  • memory/2780-40-0x000000013FF10000-0x0000000141146000-memory.dmp

    Filesize

    18.2MB