Analysis

  • max time kernel
    85s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    28/07/2021, 05:59 UTC

General

  • Target

    Confirmation Of Proforma Invoice.exe

  • Size

    1.5MB

  • MD5

    f5142955783a16ea5957a10c51e64f33

  • SHA1

    c843043f0b39623bf0862f8460b669c923b4c2e9

  • SHA256

    a80660a551d427bd67935c0380d3edca52a17a57005dde154ba2acfd29bebade

  • SHA512

    e214ac6ba2d3cb4d9b6c77fc7ce87345d196542f50531d93b103803b5f5c16c4bb59424325ad8ccbf7095af6db1428c4ffea489287aa73aae2358734913870b5

Malware Config

Extracted

Family

matiex

Credentials

  • Protocol:
    smtp
  • Host:
    mail.thts.vn
  • Port:
    25
  • Username:
    sales01@mtlvn.com.vn
  • Password:
    123luongngan1989

Signatures

  • Matiex

    Matiex is a keylogger and infostealer first seen in July 2020.

  • Matiex Main Payload 3 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Confirmation Of Proforma Invoice.exe
    "C:\Users\Admin\AppData\Local\Temp\Confirmation Of Proforma Invoice.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1768
    • C:\Users\Admin\AppData\Local\Temp\Confirmation Of Proforma Invoice.exe
      "C:\Users\Admin\AppData\Local\Temp\Confirmation Of Proforma Invoice.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1624
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1624 -s 1276
        3⤵
        • Program crash
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1528

Network

  • flag-unknown
    DNS
    checkip.dyndns.org
    Confirmation Of Proforma Invoice.exe
    Remote address:
    8.8.8.8:53
    Request
    checkip.dyndns.org
    IN A
    Response
    checkip.dyndns.org
    IN CNAME
    checkip.dyndns.com
    checkip.dyndns.com
    IN A
    132.226.247.73
    checkip.dyndns.com
    IN A
    158.101.44.242
    checkip.dyndns.com
    IN A
    193.122.6.168
    checkip.dyndns.com
    IN A
    193.122.130.0
    checkip.dyndns.com
    IN A
    132.226.8.169
  • flag-unknown
    GET
    http://checkip.dyndns.org/
    Confirmation Of Proforma Invoice.exe
    Remote address:
    132.226.247.73:80
    Request
    GET / HTTP/1.1
    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
    Host: checkip.dyndns.org
    Connection: Keep-Alive
    Response
    HTTP/1.1 502 Bad Gateway
    Date: Wed, 28 Jul 2021 06:00:30 GMT
    Content-Type: text/html
    Content-Length: 563
    Connection: keep-alive
  • 132.226.247.73:80
    http://checkip.dyndns.org/
    http
    Confirmation Of Proforma Invoice.exe
    381 B
    870 B
    5
    4

    HTTP Request

    GET http://checkip.dyndns.org/

    HTTP Response

    502
  • 8.8.8.8:53
    checkip.dyndns.org
    dns
    Confirmation Of Proforma Invoice.exe
    64 B
    176 B
    1
    1

    DNS Request

    checkip.dyndns.org

    DNS Response

    132.226.247.73
    158.101.44.242
    193.122.6.168
    193.122.130.0
    132.226.8.169

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1528-72-0x0000000000380000-0x0000000000381000-memory.dmp

    Filesize

    4KB

  • memory/1624-66-0x0000000000400000-0x0000000000472000-memory.dmp

    Filesize

    456KB

  • memory/1624-68-0x0000000000400000-0x0000000000472000-memory.dmp

    Filesize

    456KB

  • memory/1624-70-0x0000000002660000-0x0000000002661000-memory.dmp

    Filesize

    4KB

  • memory/1768-60-0x0000000000D50000-0x0000000000D51000-memory.dmp

    Filesize

    4KB

  • memory/1768-62-0x0000000000CF0000-0x0000000000CF1000-memory.dmp

    Filesize

    4KB

  • memory/1768-63-0x00000000008D0000-0x00000000008FD000-memory.dmp

    Filesize

    180KB

  • memory/1768-64-0x00000000051F0000-0x0000000005276000-memory.dmp

    Filesize

    536KB

  • memory/1768-65-0x0000000005280000-0x00000000052EF000-memory.dmp

    Filesize

    444KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.