Analysis
-
max time kernel
136s -
max time network
152s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
22-07-2021 19:01
Static task
static1
Behavioral task
behavioral1
Sample
QYD Quotation 20210702.exe
Resource
win7v20210410
General
-
Target
QYD Quotation 20210702.exe
-
Size
1.1MB
-
MD5
494fc5838b2ff1381ab5d806cf7820a2
-
SHA1
d7ec8bb026fe526535ed556936ec057409fb00fa
-
SHA256
e58284d351b21f134a31fdccd3e53f952133f671892da8a86347d7b930399f28
-
SHA512
1c18d8524f0aecd4b4dfb2518de69c94362c23c60b3bc2e7229e6b06a9ed6e559212d97f740f4675c028cc5c5f9ab12b51d21589a42656232e207d2866120821
Malware Config
Extracted
Protocol: smtp- Host:
mail.thts.vn - Port:
25 - Username:
[email protected] - Password:
123luongngan1989
Extracted
matiex
Protocol: smtp- Host:
mail.thts.vn - Port:
25 - Username:
[email protected] - Password:
123luongngan1989
Signatures
-
Matiex Main Payload 2 IoCs
resource yara_rule behavioral2/memory/3956-126-0x0000000000400000-0x0000000000474000-memory.dmp family_matiex behavioral2/memory/3956-127-0x000000000046E07E-mapping.dmp family_matiex -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 16 freegeoip.app 17 freegeoip.app 14 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3560 set thread context of 3956 3560 QYD Quotation 20210702.exe 80 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2376 schtasks.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\ms-settings\shell QYD Quotation 20210702.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\ms-settings\shell\open QYD Quotation 20210702.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\ms-settings\shell\open\command\ QYD Quotation 20210702.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\ms-settings\shell\open\command QYD Quotation 20210702.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\ms-settings QYD Quotation 20210702.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3956 QYD Quotation 20210702.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3956 QYD Quotation 20210702.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3560 QYD Quotation 20210702.exe Token: SeDebugPrivilege 3956 QYD Quotation 20210702.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3560 wrote to memory of 2376 3560 QYD Quotation 20210702.exe 78 PID 3560 wrote to memory of 2376 3560 QYD Quotation 20210702.exe 78 PID 3560 wrote to memory of 2376 3560 QYD Quotation 20210702.exe 78 PID 3560 wrote to memory of 3956 3560 QYD Quotation 20210702.exe 80 PID 3560 wrote to memory of 3956 3560 QYD Quotation 20210702.exe 80 PID 3560 wrote to memory of 3956 3560 QYD Quotation 20210702.exe 80 PID 3560 wrote to memory of 3956 3560 QYD Quotation 20210702.exe 80 PID 3560 wrote to memory of 3956 3560 QYD Quotation 20210702.exe 80 PID 3560 wrote to memory of 3956 3560 QYD Quotation 20210702.exe 80 PID 3560 wrote to memory of 3956 3560 QYD Quotation 20210702.exe 80 PID 3560 wrote to memory of 3956 3560 QYD Quotation 20210702.exe 80 PID 3956 wrote to memory of 1308 3956 QYD Quotation 20210702.exe 82 PID 3956 wrote to memory of 1308 3956 QYD Quotation 20210702.exe 82 PID 3956 wrote to memory of 1308 3956 QYD Quotation 20210702.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\QYD Quotation 20210702.exe"C:\Users\Admin\AppData\Local\Temp\QYD Quotation 20210702.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DQuUJXrfqT" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8581.tmp"2⤵
- Creates scheduled task(s)
PID:2376
-
-
C:\Users\Admin\AppData\Local\Temp\QYD Quotation 20210702.exe"{path}"2⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Windows\SysWOW64\netsh.exe"netsh" wlan show profile3⤵PID:1308
-
-