Analysis
-
max time kernel
85s -
max time network
150s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
28-07-2021 05:59
Static task
static1
Behavioral task
behavioral1
Sample
Confirmation Of Proforma Invoice.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
Confirmation Of Proforma Invoice.exe
Resource
win10v20210410
General
-
Target
Confirmation Of Proforma Invoice.exe
-
Size
1.5MB
-
MD5
f5142955783a16ea5957a10c51e64f33
-
SHA1
c843043f0b39623bf0862f8460b669c923b4c2e9
-
SHA256
a80660a551d427bd67935c0380d3edca52a17a57005dde154ba2acfd29bebade
-
SHA512
e214ac6ba2d3cb4d9b6c77fc7ce87345d196542f50531d93b103803b5f5c16c4bb59424325ad8ccbf7095af6db1428c4ffea489287aa73aae2358734913870b5
Malware Config
Extracted
matiex
Protocol: smtp- Host:
mail.thts.vn - Port:
25 - Username:
[email protected] - Password:
123luongngan1989
Signatures
-
Matiex Main Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1624-67-0x000000000046D95E-mapping.dmp family_matiex behavioral1/memory/1624-66-0x0000000000400000-0x0000000000472000-memory.dmp family_matiex behavioral1/memory/1624-68-0x0000000000400000-0x0000000000472000-memory.dmp family_matiex -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Confirmation Of Proforma Invoice.exedescription pid process target process PID 1768 set thread context of 1624 1768 Confirmation Of Proforma Invoice.exe Confirmation Of Proforma Invoice.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1528 1624 WerFault.exe Confirmation Of Proforma Invoice.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
WerFault.exepid process 1528 WerFault.exe 1528 WerFault.exe 1528 WerFault.exe 1528 WerFault.exe 1528 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
Confirmation Of Proforma Invoice.exeConfirmation Of Proforma Invoice.exeWerFault.exedescription pid process Token: SeDebugPrivilege 1768 Confirmation Of Proforma Invoice.exe Token: SeDebugPrivilege 1624 Confirmation Of Proforma Invoice.exe Token: SeDebugPrivilege 1528 WerFault.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
Confirmation Of Proforma Invoice.exeConfirmation Of Proforma Invoice.exedescription pid process target process PID 1768 wrote to memory of 1624 1768 Confirmation Of Proforma Invoice.exe Confirmation Of Proforma Invoice.exe PID 1768 wrote to memory of 1624 1768 Confirmation Of Proforma Invoice.exe Confirmation Of Proforma Invoice.exe PID 1768 wrote to memory of 1624 1768 Confirmation Of Proforma Invoice.exe Confirmation Of Proforma Invoice.exe PID 1768 wrote to memory of 1624 1768 Confirmation Of Proforma Invoice.exe Confirmation Of Proforma Invoice.exe PID 1768 wrote to memory of 1624 1768 Confirmation Of Proforma Invoice.exe Confirmation Of Proforma Invoice.exe PID 1768 wrote to memory of 1624 1768 Confirmation Of Proforma Invoice.exe Confirmation Of Proforma Invoice.exe PID 1768 wrote to memory of 1624 1768 Confirmation Of Proforma Invoice.exe Confirmation Of Proforma Invoice.exe PID 1768 wrote to memory of 1624 1768 Confirmation Of Proforma Invoice.exe Confirmation Of Proforma Invoice.exe PID 1768 wrote to memory of 1624 1768 Confirmation Of Proforma Invoice.exe Confirmation Of Proforma Invoice.exe PID 1624 wrote to memory of 1528 1624 Confirmation Of Proforma Invoice.exe WerFault.exe PID 1624 wrote to memory of 1528 1624 Confirmation Of Proforma Invoice.exe WerFault.exe PID 1624 wrote to memory of 1528 1624 Confirmation Of Proforma Invoice.exe WerFault.exe PID 1624 wrote to memory of 1528 1624 Confirmation Of Proforma Invoice.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Confirmation Of Proforma Invoice.exe"C:\Users\Admin\AppData\Local\Temp\Confirmation Of Proforma Invoice.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\Confirmation Of Proforma Invoice.exe"C:\Users\Admin\AppData\Local\Temp\Confirmation Of Proforma Invoice.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1624 -s 12763⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1528
-
-