Analysis

  • max time kernel
    81s
  • max time network
    146s
  • platform
    windows10_x64
  • resource
    win10-en
  • submitted
    10-09-2021 16:45

General

  • Target

    28f416d3d15990c1f3496f1f50e27430.exe

  • Size

    851KB

  • MD5

    28f416d3d15990c1f3496f1f50e27430

  • SHA1

    f894aba5978f920d54d054add03f2e4b6e06b199

  • SHA256

    d19dc1aef457a11c415d41b9bec1f6e7679b20aacc6771f789c66701be2d9a10

  • SHA512

    aef4a944ad31362a50351b53b070219aa533bec721f536c13f77ccb244cc723946e4462a7a6e78a18c5ff433ed2969821979ca499eb60429e8a20ddc61b4c20d

Malware Config

Signatures

  • Matiex

    Matiex is a keylogger and infostealer first seen in July 2020.

  • Matiex Main Payload 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\28f416d3d15990c1f3496f1f50e27430.exe
    "C:\Users\Admin\AppData\Local\Temp\28f416d3d15990c1f3496f1f50e27430.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3996
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection google.com
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3692
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection google.com
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:420
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection google.com
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:1728
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection google.com
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:896
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection google.com
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2180
    • C:\Users\Admin\AppData\Local\Temp\28f416d3d15990c1f3496f1f50e27430.exe
      C:\Users\Admin\AppData\Local\Temp\28f416d3d15990c1f3496f1f50e27430.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3976
      • C:\Windows\SysWOW64\netsh.exe
        "netsh" wlan show profile
        3⤵
          PID:804

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\28f416d3d15990c1f3496f1f50e27430.exe.log

      MD5

      4a30a8132195c1aa1a62b78676b178d9

      SHA1

      506e6d99a2ba08c9d3553af30daaaa0fc46ae4be

      SHA256

      71636c227625058652c089035480b7bb3e5795f3998bc9823c401029fc844a20

      SHA512

      3272b5129525c2b8f7efb99f5a2115cf2572480ff6938ca80e63f02c52588216f861307b9ef962ba015787cae0d5a95e74ebb5fe4b35b34f1c4f3a7deac8ce09

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

      MD5

      a4022a7d2b113226b000be0705680813

      SHA1

      599e22d03201704127a045ca53ffb78f9ea3b6c3

      SHA256

      2557a14e476d55330043af2858dbf1377e24dba3fa9aedc369d5feefefb7f9a7

      SHA512

      40ef88632a4ad38a7d21c640a7f0c8cd7c76b8451f55dd758c15baa5a90f4f0938de409426570c4405362fd2d90fadd96d23d190e09692b5fbe2c87ebc8d3c60

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      MD5

      a3e0400ece1213fc0f0fd1c54e61765e

      SHA1

      63ab24cd5b3a1ccb6591da896574107e24405f91

      SHA256

      8124b112e0f2638d92476ab65620446ab8c8ca6f25591ee866ff59e0cb6876b4

      SHA512

      46757a1d5d73a0553b51222d75f73961ff6cbf97208e34e8eb8fc43bd9c4afc550b54d7e08aca37c44a625a71dfbaf8780a0c9a9b77097ad5733fa11a97bc5a6

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      MD5

      e110b4685bcfb455cc6db9f69c3cefc9

      SHA1

      fdf8ef506d3a8ba63bd324bc9799b66bb7ceecd4

      SHA256

      69f14a60147e552b212407e68663e55bdec54e32e9519ef2024b9f5a417984e5

      SHA512

      48b3bd8bfa8e740b10215904722a5c29e31511737d3ca4f69dfeeaf824d25ecd8df402554c0e70649846e745d1c3669fac281991bd327506c4b99c8542e9c971

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      MD5

      fe93d375d1acb7683da8c98f5d9329b2

      SHA1

      8fc57b4834fc2701adef852b5e0b034d2a45bc23

      SHA256

      37a7bafdc0edd94e99cdf87f4e1cbf8d21c98165984c466cceff4b12bf71b7fe

      SHA512

      7e13e63e31a491567cc5da91028981d238a2b7a96150022b3e842ea19154b95b5c725e5045ed5a57eafe69ffc2c1799fde60a52c37ba241bfe382165a40119fd

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      MD5

      5b81ecaed08ea22551f8e144bce18644

      SHA1

      e0cd7404c091086e5675f4f015caf9001ee87d23

      SHA256

      551fb1d61d443e40e0f45acc53be0f3e87979f51539503a23316dca2b6cd4485

      SHA512

      d94ec3f1d4b92a61b83606616f1c95163e27dd7535e1c3023f2e675701210abc7f3bda03895d66e745d6f7d63eb705e282c4d725d2135fd44696ad21f0e108db

    • memory/420-217-0x0000000000000000-mapping.dmp

    • memory/420-243-0x0000000007333000-0x0000000007334000-memory.dmp

      Filesize

      4KB

    • memory/420-231-0x0000000007330000-0x0000000007331000-memory.dmp

      Filesize

      4KB

    • memory/420-232-0x0000000007332000-0x0000000007333000-memory.dmp

      Filesize

      4KB

    • memory/804-618-0x0000000000000000-mapping.dmp

    • memory/896-423-0x0000000004640000-0x0000000004641000-memory.dmp

      Filesize

      4KB

    • memory/896-456-0x0000000004643000-0x0000000004644000-memory.dmp

      Filesize

      4KB

    • memory/896-424-0x0000000004642000-0x0000000004643000-memory.dmp

      Filesize

      4KB

    • memory/896-410-0x0000000000000000-mapping.dmp

    • memory/1728-314-0x0000000000000000-mapping.dmp

    • memory/1728-360-0x0000000002A23000-0x0000000002A24000-memory.dmp

      Filesize

      4KB

    • memory/1728-325-0x0000000002A22000-0x0000000002A23000-memory.dmp

      Filesize

      4KB

    • memory/1728-324-0x0000000002A20000-0x0000000002A21000-memory.dmp

      Filesize

      4KB

    • memory/2180-552-0x00000000049A3000-0x00000000049A4000-memory.dmp

      Filesize

      4KB

    • memory/2180-519-0x00000000049A2000-0x00000000049A3000-memory.dmp

      Filesize

      4KB

    • memory/2180-518-0x00000000049A0000-0x00000000049A1000-memory.dmp

      Filesize

      4KB

    • memory/2180-506-0x0000000000000000-mapping.dmp

    • memory/3692-150-0x000000000A9E0000-0x000000000A9E1000-memory.dmp

      Filesize

      4KB

    • memory/3692-130-0x0000000007270000-0x0000000007271000-memory.dmp

      Filesize

      4KB

    • memory/3692-127-0x00000000077F0000-0x00000000077F1000-memory.dmp

      Filesize

      4KB

    • memory/3692-126-0x00000000078B0000-0x00000000078B1000-memory.dmp

      Filesize

      4KB

    • memory/3692-125-0x0000000004D70000-0x0000000004D71000-memory.dmp

      Filesize

      4KB

    • memory/3692-122-0x0000000000000000-mapping.dmp

    • memory/3692-129-0x00000000081A0000-0x00000000081A1000-memory.dmp

      Filesize

      4KB

    • memory/3692-128-0x0000000007EE0000-0x0000000007EE1000-memory.dmp

      Filesize

      4KB

    • memory/3692-157-0x0000000007273000-0x0000000007274000-memory.dmp

      Filesize

      4KB

    • memory/3692-131-0x0000000007272000-0x0000000007273000-memory.dmp

      Filesize

      4KB

    • memory/3692-142-0x00000000095C0000-0x00000000095C1000-memory.dmp

      Filesize

      4KB

    • memory/3692-141-0x00000000095A0000-0x00000000095A1000-memory.dmp

      Filesize

      4KB

    • memory/3692-133-0x00000000085A0000-0x00000000085A1000-memory.dmp

      Filesize

      4KB

    • memory/3692-132-0x0000000008210000-0x0000000008211000-memory.dmp

      Filesize

      4KB

    • memory/3692-140-0x00000000098C0000-0x00000000098C1000-memory.dmp

      Filesize

      4KB

    • memory/3692-135-0x00000000088D0000-0x00000000088D1000-memory.dmp

      Filesize

      4KB

    • memory/3692-134-0x00000000085C0000-0x00000000085C1000-memory.dmp

      Filesize

      4KB

    • memory/3976-610-0x000000000047023E-mapping.dmp

    • memory/3976-617-0x00000000055D0000-0x000000000566C000-memory.dmp

      Filesize

      624KB

    • memory/3996-121-0x0000000007300000-0x000000000734C000-memory.dmp

      Filesize

      304KB

    • memory/3996-119-0x0000000004FA0000-0x0000000004FA1000-memory.dmp

      Filesize

      4KB

    • memory/3996-115-0x00000000006A0000-0x00000000006A1000-memory.dmp

      Filesize

      4KB

    • memory/3996-118-0x0000000005020000-0x0000000005021000-memory.dmp

      Filesize

      4KB

    • memory/3996-120-0x0000000004F80000-0x0000000005012000-memory.dmp

      Filesize

      584KB

    • memory/3996-117-0x0000000005600000-0x0000000005601000-memory.dmp

      Filesize

      4KB