Analysis
-
max time kernel
81s -
max time network
146s -
platform
windows10_x64 -
resource
win10-en -
submitted
10-09-2021 16:45
Static task
static1
Behavioral task
behavioral1
Sample
28f416d3d15990c1f3496f1f50e27430.exe
Resource
win7-en
Behavioral task
behavioral2
Sample
28f416d3d15990c1f3496f1f50e27430.exe
Resource
win10-en
General
-
Target
28f416d3d15990c1f3496f1f50e27430.exe
-
Size
851KB
-
MD5
28f416d3d15990c1f3496f1f50e27430
-
SHA1
f894aba5978f920d54d054add03f2e4b6e06b199
-
SHA256
d19dc1aef457a11c415d41b9bec1f6e7679b20aacc6771f789c66701be2d9a10
-
SHA512
aef4a944ad31362a50351b53b070219aa533bec721f536c13f77ccb244cc723946e4462a7a6e78a18c5ff433ed2969821979ca499eb60429e8a20ddc61b4c20d
Malware Config
Signatures
-
Matiex Main Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3976-610-0x000000000047023E-mapping.dmp family_matiex behavioral2/memory/3976-617-0x00000000055D0000-0x000000000566C000-memory.dmp family_matiex -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
28f416d3d15990c1f3496f1f50e27430.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000\Software\Microsoft\Windows\CurrentVersion\Run\win32 = "\"C:\\Users\\Admin\\AppData\\Roaming\\win32.exe\"" 28f416d3d15990c1f3496f1f50e27430.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 13 checkip.dyndns.org 15 freegeoip.app 16 freegeoip.app -
Suspicious use of SetThreadContext 1 IoCs
Processes:
28f416d3d15990c1f3496f1f50e27430.exedescription pid process target process PID 3996 set thread context of 3976 3996 28f416d3d15990c1f3496f1f50e27430.exe 28f416d3d15990c1f3496f1f50e27430.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exe28f416d3d15990c1f3496f1f50e27430.exe28f416d3d15990c1f3496f1f50e27430.exepid process 3692 powershell.exe 3692 powershell.exe 3692 powershell.exe 420 powershell.exe 420 powershell.exe 420 powershell.exe 1728 powershell.exe 1728 powershell.exe 1728 powershell.exe 896 powershell.exe 896 powershell.exe 896 powershell.exe 2180 powershell.exe 2180 powershell.exe 2180 powershell.exe 3996 28f416d3d15990c1f3496f1f50e27430.exe 3996 28f416d3d15990c1f3496f1f50e27430.exe 3976 28f416d3d15990c1f3496f1f50e27430.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
28f416d3d15990c1f3496f1f50e27430.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 3996 28f416d3d15990c1f3496f1f50e27430.exe Token: SeDebugPrivilege 3692 powershell.exe Token: SeIncreaseQuotaPrivilege 3692 powershell.exe Token: SeSecurityPrivilege 3692 powershell.exe Token: SeTakeOwnershipPrivilege 3692 powershell.exe Token: SeLoadDriverPrivilege 3692 powershell.exe Token: SeSystemProfilePrivilege 3692 powershell.exe Token: SeSystemtimePrivilege 3692 powershell.exe Token: SeProfSingleProcessPrivilege 3692 powershell.exe Token: SeIncBasePriorityPrivilege 3692 powershell.exe Token: SeCreatePagefilePrivilege 3692 powershell.exe Token: SeBackupPrivilege 3692 powershell.exe Token: SeRestorePrivilege 3692 powershell.exe Token: SeShutdownPrivilege 3692 powershell.exe Token: SeDebugPrivilege 3692 powershell.exe Token: SeSystemEnvironmentPrivilege 3692 powershell.exe Token: SeRemoteShutdownPrivilege 3692 powershell.exe Token: SeUndockPrivilege 3692 powershell.exe Token: SeManageVolumePrivilege 3692 powershell.exe Token: 33 3692 powershell.exe Token: 34 3692 powershell.exe Token: 35 3692 powershell.exe Token: 36 3692 powershell.exe Token: SeIncreaseQuotaPrivilege 3692 powershell.exe Token: SeSecurityPrivilege 3692 powershell.exe Token: SeTakeOwnershipPrivilege 3692 powershell.exe Token: SeLoadDriverPrivilege 3692 powershell.exe Token: SeSystemProfilePrivilege 3692 powershell.exe Token: SeSystemtimePrivilege 3692 powershell.exe Token: SeProfSingleProcessPrivilege 3692 powershell.exe Token: SeIncBasePriorityPrivilege 3692 powershell.exe Token: SeCreatePagefilePrivilege 3692 powershell.exe Token: SeBackupPrivilege 3692 powershell.exe Token: SeRestorePrivilege 3692 powershell.exe Token: SeShutdownPrivilege 3692 powershell.exe Token: SeDebugPrivilege 3692 powershell.exe Token: SeSystemEnvironmentPrivilege 3692 powershell.exe Token: SeRemoteShutdownPrivilege 3692 powershell.exe Token: SeUndockPrivilege 3692 powershell.exe Token: SeManageVolumePrivilege 3692 powershell.exe Token: 33 3692 powershell.exe Token: 34 3692 powershell.exe Token: 35 3692 powershell.exe Token: 36 3692 powershell.exe Token: SeDebugPrivilege 420 powershell.exe Token: SeIncreaseQuotaPrivilege 420 powershell.exe Token: SeSecurityPrivilege 420 powershell.exe Token: SeTakeOwnershipPrivilege 420 powershell.exe Token: SeLoadDriverPrivilege 420 powershell.exe Token: SeSystemProfilePrivilege 420 powershell.exe Token: SeSystemtimePrivilege 420 powershell.exe Token: SeProfSingleProcessPrivilege 420 powershell.exe Token: SeIncBasePriorityPrivilege 420 powershell.exe Token: SeCreatePagefilePrivilege 420 powershell.exe Token: SeBackupPrivilege 420 powershell.exe Token: SeRestorePrivilege 420 powershell.exe Token: SeShutdownPrivilege 420 powershell.exe Token: SeDebugPrivilege 420 powershell.exe Token: SeSystemEnvironmentPrivilege 420 powershell.exe Token: SeRemoteShutdownPrivilege 420 powershell.exe Token: SeUndockPrivilege 420 powershell.exe Token: SeManageVolumePrivilege 420 powershell.exe Token: 33 420 powershell.exe Token: 34 420 powershell.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
28f416d3d15990c1f3496f1f50e27430.exe28f416d3d15990c1f3496f1f50e27430.exedescription pid process target process PID 3996 wrote to memory of 3692 3996 28f416d3d15990c1f3496f1f50e27430.exe powershell.exe PID 3996 wrote to memory of 3692 3996 28f416d3d15990c1f3496f1f50e27430.exe powershell.exe PID 3996 wrote to memory of 3692 3996 28f416d3d15990c1f3496f1f50e27430.exe powershell.exe PID 3996 wrote to memory of 420 3996 28f416d3d15990c1f3496f1f50e27430.exe powershell.exe PID 3996 wrote to memory of 420 3996 28f416d3d15990c1f3496f1f50e27430.exe powershell.exe PID 3996 wrote to memory of 420 3996 28f416d3d15990c1f3496f1f50e27430.exe powershell.exe PID 3996 wrote to memory of 1728 3996 28f416d3d15990c1f3496f1f50e27430.exe powershell.exe PID 3996 wrote to memory of 1728 3996 28f416d3d15990c1f3496f1f50e27430.exe powershell.exe PID 3996 wrote to memory of 1728 3996 28f416d3d15990c1f3496f1f50e27430.exe powershell.exe PID 3996 wrote to memory of 896 3996 28f416d3d15990c1f3496f1f50e27430.exe powershell.exe PID 3996 wrote to memory of 896 3996 28f416d3d15990c1f3496f1f50e27430.exe powershell.exe PID 3996 wrote to memory of 896 3996 28f416d3d15990c1f3496f1f50e27430.exe powershell.exe PID 3996 wrote to memory of 2180 3996 28f416d3d15990c1f3496f1f50e27430.exe powershell.exe PID 3996 wrote to memory of 2180 3996 28f416d3d15990c1f3496f1f50e27430.exe powershell.exe PID 3996 wrote to memory of 2180 3996 28f416d3d15990c1f3496f1f50e27430.exe powershell.exe PID 3996 wrote to memory of 3976 3996 28f416d3d15990c1f3496f1f50e27430.exe 28f416d3d15990c1f3496f1f50e27430.exe PID 3996 wrote to memory of 3976 3996 28f416d3d15990c1f3496f1f50e27430.exe 28f416d3d15990c1f3496f1f50e27430.exe PID 3996 wrote to memory of 3976 3996 28f416d3d15990c1f3496f1f50e27430.exe 28f416d3d15990c1f3496f1f50e27430.exe PID 3996 wrote to memory of 3976 3996 28f416d3d15990c1f3496f1f50e27430.exe 28f416d3d15990c1f3496f1f50e27430.exe PID 3996 wrote to memory of 3976 3996 28f416d3d15990c1f3496f1f50e27430.exe 28f416d3d15990c1f3496f1f50e27430.exe PID 3996 wrote to memory of 3976 3996 28f416d3d15990c1f3496f1f50e27430.exe 28f416d3d15990c1f3496f1f50e27430.exe PID 3996 wrote to memory of 3976 3996 28f416d3d15990c1f3496f1f50e27430.exe 28f416d3d15990c1f3496f1f50e27430.exe PID 3996 wrote to memory of 3976 3996 28f416d3d15990c1f3496f1f50e27430.exe 28f416d3d15990c1f3496f1f50e27430.exe PID 3976 wrote to memory of 804 3976 28f416d3d15990c1f3496f1f50e27430.exe netsh.exe PID 3976 wrote to memory of 804 3976 28f416d3d15990c1f3496f1f50e27430.exe netsh.exe PID 3976 wrote to memory of 804 3976 28f416d3d15990c1f3496f1f50e27430.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\28f416d3d15990c1f3496f1f50e27430.exe"C:\Users\Admin\AppData\Local\Temp\28f416d3d15990c1f3496f1f50e27430.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection google.com2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3692 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection google.com2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:420 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection google.com2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1728 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection google.com2⤵
- Suspicious behavior: EnumeratesProcesses
PID:896 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection google.com2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\28f416d3d15990c1f3496f1f50e27430.exeC:\Users\Admin\AppData\Local\Temp\28f416d3d15990c1f3496f1f50e27430.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Windows\SysWOW64\netsh.exe"netsh" wlan show profile3⤵PID:804
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\28f416d3d15990c1f3496f1f50e27430.exe.log
MD54a30a8132195c1aa1a62b78676b178d9
SHA1506e6d99a2ba08c9d3553af30daaaa0fc46ae4be
SHA25671636c227625058652c089035480b7bb3e5795f3998bc9823c401029fc844a20
SHA5123272b5129525c2b8f7efb99f5a2115cf2572480ff6938ca80e63f02c52588216f861307b9ef962ba015787cae0d5a95e74ebb5fe4b35b34f1c4f3a7deac8ce09
-
MD5
a4022a7d2b113226b000be0705680813
SHA1599e22d03201704127a045ca53ffb78f9ea3b6c3
SHA2562557a14e476d55330043af2858dbf1377e24dba3fa9aedc369d5feefefb7f9a7
SHA51240ef88632a4ad38a7d21c640a7f0c8cd7c76b8451f55dd758c15baa5a90f4f0938de409426570c4405362fd2d90fadd96d23d190e09692b5fbe2c87ebc8d3c60
-
MD5
a3e0400ece1213fc0f0fd1c54e61765e
SHA163ab24cd5b3a1ccb6591da896574107e24405f91
SHA2568124b112e0f2638d92476ab65620446ab8c8ca6f25591ee866ff59e0cb6876b4
SHA51246757a1d5d73a0553b51222d75f73961ff6cbf97208e34e8eb8fc43bd9c4afc550b54d7e08aca37c44a625a71dfbaf8780a0c9a9b77097ad5733fa11a97bc5a6
-
MD5
e110b4685bcfb455cc6db9f69c3cefc9
SHA1fdf8ef506d3a8ba63bd324bc9799b66bb7ceecd4
SHA25669f14a60147e552b212407e68663e55bdec54e32e9519ef2024b9f5a417984e5
SHA51248b3bd8bfa8e740b10215904722a5c29e31511737d3ca4f69dfeeaf824d25ecd8df402554c0e70649846e745d1c3669fac281991bd327506c4b99c8542e9c971
-
MD5
fe93d375d1acb7683da8c98f5d9329b2
SHA18fc57b4834fc2701adef852b5e0b034d2a45bc23
SHA25637a7bafdc0edd94e99cdf87f4e1cbf8d21c98165984c466cceff4b12bf71b7fe
SHA5127e13e63e31a491567cc5da91028981d238a2b7a96150022b3e842ea19154b95b5c725e5045ed5a57eafe69ffc2c1799fde60a52c37ba241bfe382165a40119fd
-
MD5
5b81ecaed08ea22551f8e144bce18644
SHA1e0cd7404c091086e5675f4f015caf9001ee87d23
SHA256551fb1d61d443e40e0f45acc53be0f3e87979f51539503a23316dca2b6cd4485
SHA512d94ec3f1d4b92a61b83606616f1c95163e27dd7535e1c3023f2e675701210abc7f3bda03895d66e745d6f7d63eb705e282c4d725d2135fd44696ad21f0e108db