Analysis
-
max time kernel
85s -
max time network
150s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
28-07-2021 05:59
Static task
static1
Behavioral task
behavioral1
Sample
Confirmation Of Proforma Invoice.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
Confirmation Of Proforma Invoice.exe
Resource
win10v20210410
General
-
Target
Confirmation Of Proforma Invoice.exe
-
Size
1.5MB
-
MD5
f5142955783a16ea5957a10c51e64f33
-
SHA1
c843043f0b39623bf0862f8460b669c923b4c2e9
-
SHA256
a80660a551d427bd67935c0380d3edca52a17a57005dde154ba2acfd29bebade
-
SHA512
e214ac6ba2d3cb4d9b6c77fc7ce87345d196542f50531d93b103803b5f5c16c4bb59424325ad8ccbf7095af6db1428c4ffea489287aa73aae2358734913870b5
Malware Config
Extracted
matiex
Protocol: smtp- Host:
mail.thts.vn - Port:
25 - Username:
[email protected] - Password:
123luongngan1989
Signatures
-
Matiex Main Payload 3 IoCs
resource yara_rule behavioral1/memory/1624-67-0x000000000046D95E-mapping.dmp family_matiex behavioral1/memory/1624-66-0x0000000000400000-0x0000000000472000-memory.dmp family_matiex behavioral1/memory/1624-68-0x0000000000400000-0x0000000000472000-memory.dmp family_matiex -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1768 set thread context of 1624 1768 Confirmation Of Proforma Invoice.exe 29 -
Program crash 1 IoCs
pid pid_target Process procid_target 1528 1624 WerFault.exe 29 -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1528 WerFault.exe 1528 WerFault.exe 1528 WerFault.exe 1528 WerFault.exe 1528 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1768 Confirmation Of Proforma Invoice.exe Token: SeDebugPrivilege 1624 Confirmation Of Proforma Invoice.exe Token: SeDebugPrivilege 1528 WerFault.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1768 wrote to memory of 1624 1768 Confirmation Of Proforma Invoice.exe 29 PID 1768 wrote to memory of 1624 1768 Confirmation Of Proforma Invoice.exe 29 PID 1768 wrote to memory of 1624 1768 Confirmation Of Proforma Invoice.exe 29 PID 1768 wrote to memory of 1624 1768 Confirmation Of Proforma Invoice.exe 29 PID 1768 wrote to memory of 1624 1768 Confirmation Of Proforma Invoice.exe 29 PID 1768 wrote to memory of 1624 1768 Confirmation Of Proforma Invoice.exe 29 PID 1768 wrote to memory of 1624 1768 Confirmation Of Proforma Invoice.exe 29 PID 1768 wrote to memory of 1624 1768 Confirmation Of Proforma Invoice.exe 29 PID 1768 wrote to memory of 1624 1768 Confirmation Of Proforma Invoice.exe 29 PID 1624 wrote to memory of 1528 1624 Confirmation Of Proforma Invoice.exe 31 PID 1624 wrote to memory of 1528 1624 Confirmation Of Proforma Invoice.exe 31 PID 1624 wrote to memory of 1528 1624 Confirmation Of Proforma Invoice.exe 31 PID 1624 wrote to memory of 1528 1624 Confirmation Of Proforma Invoice.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Confirmation Of Proforma Invoice.exe"C:\Users\Admin\AppData\Local\Temp\Confirmation Of Proforma Invoice.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\Confirmation Of Proforma Invoice.exe"C:\Users\Admin\AppData\Local\Temp\Confirmation Of Proforma Invoice.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1624 -s 12763⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1528
-
-