Analysis

  • max time kernel
    145s
  • max time network
    143s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    19-01-2021 06:13

General

  • Target

    03ba23a85802f57beed2d5c69453c6d2.exe

  • Size

    500KB

  • MD5

    03ba23a85802f57beed2d5c69453c6d2

  • SHA1

    3d83f5623299630fd6f57a567ac048c7d1853dcb

  • SHA256

    39d7b97907b7836d51b332d85ecdbf4cd5fa55de562959a020a6752adeea4e1c

  • SHA512

    028c6edb097565b888589159fb7c8eb92604c333ac58cd075447eb369ae2cd071b85ee0ffdd427ec448fe1b3070adfe26ff5c28482b997a630f8f95b719e2974

Malware Config

Extracted

Family

matiex

C2

https://api.telegram.org/bot1271137457:AAFNGECSqnP1dXVAPgbr-EWVUDbzylXjmhg/sendMessage?chat_id=1216524090

Signatures

  • Matiex

    Matiex is a keylogger and infostealer first seen in July 2020.

  • Matiex Main Payload 2 IoCs
  • Drops startup file 2 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\03ba23a85802f57beed2d5c69453c6d2.exe
    "C:\Users\Admin\AppData\Local\Temp\03ba23a85802f57beed2d5c69453c6d2.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3940
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\pOwERsHeLl.exe
      "pOwERsHeLl.exe" Copy-Item 'C:\Users\Admin\AppData\Local\Temp\03ba23a85802f57beed2d5c69453c6d2.exe' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nameup.exe'
      2⤵
      • Drops startup file
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2300
    • C:\Users\Admin\AppData\Local\Temp\03ba23a85802f57beed2d5c69453c6d2.exe
      "C:\Users\Admin\AppData\Local\Temp\03ba23a85802f57beed2d5c69453c6d2.exe"
      2⤵
        PID:3124
      • C:\Users\Admin\AppData\Local\Temp\03ba23a85802f57beed2d5c69453c6d2.exe
        "C:\Users\Admin\AppData\Local\Temp\03ba23a85802f57beed2d5c69453c6d2.exe"
        2⤵
          PID:3292
        • C:\Users\Admin\AppData\Local\Temp\03ba23a85802f57beed2d5c69453c6d2.exe
          "C:\Users\Admin\AppData\Local\Temp\03ba23a85802f57beed2d5c69453c6d2.exe"
          2⤵
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:3928

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Credential Access

      Credentials in Files

      2
      T1081

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\03ba23a85802f57beed2d5c69453c6d2.exe.log
        MD5

        6c1aa60b46ba4e118b6f5600603df204

        SHA1

        6222484928ba6d048b1c8f54a9e2ffcd6c531e10

        SHA256

        8b85cca831586dab3ccf44d25760a783c7eaf14107930850678b66ea79001d4a

        SHA512

        2089faae7b8dd76594306a23c4e73e836dee6be7a9f03d5b45d613e4c78a266f8c3267574c3fd335eafdcd66aebaf0c3a8ea82b78cdb6601d6797d1c0a3057bb

      • memory/2300-19-0x00000000087C0000-0x00000000087C1000-memory.dmp
        Filesize

        4KB

      • memory/2300-13-0x00000000070D2000-0x00000000070D3000-memory.dmp
        Filesize

        4KB

      • memory/2300-18-0x0000000008410000-0x0000000008411000-memory.dmp
        Filesize

        4KB

      • memory/2300-7-0x0000000000000000-mapping.dmp
      • memory/2300-8-0x0000000073BA0000-0x000000007428E000-memory.dmp
        Filesize

        6.9MB

      • memory/2300-9-0x0000000006F90000-0x0000000006F91000-memory.dmp
        Filesize

        4KB

      • memory/2300-25-0x00000000070D3000-0x00000000070D4000-memory.dmp
        Filesize

        4KB

      • memory/2300-11-0x00000000070D0000-0x00000000070D1000-memory.dmp
        Filesize

        4KB

      • memory/2300-12-0x0000000007710000-0x0000000007711000-memory.dmp
        Filesize

        4KB

      • memory/2300-21-0x00000000096A0000-0x00000000096A1000-memory.dmp
        Filesize

        4KB

      • memory/2300-14-0x0000000007570000-0x0000000007571000-memory.dmp
        Filesize

        4KB

      • memory/2300-15-0x0000000007D40000-0x0000000007D41000-memory.dmp
        Filesize

        4KB

      • memory/2300-16-0x0000000007F90000-0x0000000007F91000-memory.dmp
        Filesize

        4KB

      • memory/2300-17-0x0000000008000000-0x0000000008001000-memory.dmp
        Filesize

        4KB

      • memory/2300-23-0x0000000009460000-0x0000000009461000-memory.dmp
        Filesize

        4KB

      • memory/2300-20-0x0000000008730000-0x0000000008731000-memory.dmp
        Filesize

        4KB

      • memory/2300-22-0x0000000009410000-0x0000000009411000-memory.dmp
        Filesize

        4KB

      • memory/3928-40-0x0000000005113000-0x0000000005115000-memory.dmp
        Filesize

        8KB

      • memory/3928-30-0x0000000073BB0000-0x000000007429E000-memory.dmp
        Filesize

        6.9MB

      • memory/3928-39-0x0000000006AD0000-0x0000000006AD1000-memory.dmp
        Filesize

        4KB

      • memory/3928-38-0x0000000006C70000-0x0000000006C71000-memory.dmp
        Filesize

        4KB

      • memory/3928-37-0x0000000006A00000-0x0000000006A01000-memory.dmp
        Filesize

        4KB

      • memory/3928-27-0x0000000000400000-0x0000000000474000-memory.dmp
        Filesize

        464KB

      • memory/3928-28-0x000000000046E71E-mapping.dmp
      • memory/3928-36-0x0000000005110000-0x0000000005111000-memory.dmp
        Filesize

        4KB

      • memory/3940-26-0x0000000005600000-0x000000000560C000-memory.dmp
        Filesize

        48KB

      • memory/3940-3-0x0000000000D40000-0x0000000000D41000-memory.dmp
        Filesize

        4KB

      • memory/3940-5-0x0000000005610000-0x0000000005611000-memory.dmp
        Filesize

        4KB

      • memory/3940-10-0x0000000005A00000-0x0000000005A01000-memory.dmp
        Filesize

        4KB

      • memory/3940-6-0x0000000005BB0000-0x0000000005BB1000-memory.dmp
        Filesize

        4KB

      • memory/3940-2-0x0000000073BA0000-0x000000007428E000-memory.dmp
        Filesize

        6.9MB