Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
09-02-2025 18:17
Static task
static1
Behavioral task
behavioral1
Sample
Monster.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Monster.exe
Resource
win10v2004-20250207-en
General
-
Target
Monster.exe
-
Size
10.7MB
-
MD5
f48d8f28e2b8138e30b5031ae90f79f9
-
SHA1
6c6e00d7a5a295f7814f082c5650070c25e868ab
-
SHA256
c0e7d1d19d8d48d10db4458cfee55d4926e3bbe72147c8d7e6c0fbd1c33e66ec
-
SHA512
ea066497681861fa7ce2e7234569415c2621f9a80ef3dc7c86ac8bb382f697025ec87003b28f389e164f64aaccefb950917978772cb6b5a21fd18bf766f1f6a0
-
SSDEEP
196608:uWx18CmQ6ADFxwNpp1v7QFpsslzon4s0D7uKj00qgDyp4EA2EQ2nEEgh:uA18CmUFSNpjcesla4s0DCB7NMEE
Malware Config
Signatures
-
Detects Monster Stealer. 2 IoCs
resource yara_rule behavioral1/files/0x000800000001932a-35.dat family_monster behavioral1/memory/2856-40-0x000000013F710000-0x0000000140946000-memory.dmp family_monster -
Monster family
-
Executes dropped EXE 1 IoCs
pid Process 2856 stub.exe -
Loads dropped DLL 2 IoCs
pid Process 1688 Monster.exe 2856 stub.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2856 1688 Monster.exe 30 PID 1688 wrote to memory of 2856 1688 Monster.exe 30 PID 1688 wrote to memory of 2856 1688 Monster.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Monster.exe"C:\Users\Admin\AppData\Local\Temp\Monster.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\onefile_1688_133835986814426000\stub.exe"C:\Users\Admin\AppData\Local\Temp\Monster.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD5c80b5cb43e5fe7948c3562c1fff1254e
SHA1f73cb1fb9445c96ecd56b984a1822e502e71ab9d
SHA256058925e4bbfcb460a3c00ec824b8390583baef0c780a7c7ff01d43d9eec45f20
SHA512faa97a9d5d2a0bf78123f19f8657c24921b907268938c26f79e1df6d667f7bee564259a3a11022e8629996406cda9fa00434bb2b1de3e10b9bddc59708dbad81
-
Filesize
17.9MB
MD56670b9a06b5ab7fb49ca6d5e56f43be0
SHA18d5cf860b24a4b5a10e3b0fd431df823836c97c5
SHA25617a9b376d9eeeb3bf20a25629f6724540c3f6dbbf24672204e1a8e50b79f45df
SHA51230da6a2c4d98b4ca24f694030d33d5d8e252109f0c187d2a7482fc45747d6d1f24170643f4a414310f5f5fa71be3109b796338d376d880481c5316a4b0b87c6c