Analysis
-
max time kernel
137s -
max time network
121s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
03-10-2021 09:00
Static task
static1
Behavioral task
behavioral1
Sample
Ref 2998390020 purchasing inquiry.exe
Resource
win7-en-20210920
General
-
Target
Ref 2998390020 purchasing inquiry.exe
-
Size
442KB
-
MD5
4db15735772716ead8b0a838c67f91c6
-
SHA1
e7770b8a8d3d092f3bd38de265890f6cf17d1406
-
SHA256
5d65c8c1dbe91d020fe6dfefe37ef17651aaead257fdd7f24aa08b9a38cbb8fc
-
SHA512
38f0d118a3dfdb2ca0a0fd64b23cde9cdd76c410b85fa1f69dd164b121a25c213ea5dff75a7ab658c57cd5b7822cc16f7e19bcdeb63d202271065147cb22cc4c
Malware Config
Extracted
matiex
Protocol: smtp- Host:
mail.thts.vn - Port:
25 - Username:
[email protected] - Password:
123luongngan1989
Signatures
-
Matiex Main Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1620-60-0x0000000000400000-0x0000000000478000-memory.dmp family_matiex behavioral1/memory/1620-61-0x0000000000472BFE-mapping.dmp family_matiex behavioral1/memory/1620-62-0x0000000000400000-0x0000000000478000-memory.dmp family_matiex -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 checkip.dyndns.org 8 freegeoip.app 9 freegeoip.app -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Ref 2998390020 purchasing inquiry.exedescription pid process target process PID 1740 set thread context of 1620 1740 Ref 2998390020 purchasing inquiry.exe Ref 2998390020 purchasing inquiry.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Ref 2998390020 purchasing inquiry.exeRef 2998390020 purchasing inquiry.exepid process 1740 Ref 2998390020 purchasing inquiry.exe 1620 Ref 2998390020 purchasing inquiry.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Ref 2998390020 purchasing inquiry.exeRef 2998390020 purchasing inquiry.exedescription pid process Token: SeDebugPrivilege 1740 Ref 2998390020 purchasing inquiry.exe Token: SeDebugPrivilege 1620 Ref 2998390020 purchasing inquiry.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
Ref 2998390020 purchasing inquiry.exedescription pid process target process PID 1740 wrote to memory of 1400 1740 Ref 2998390020 purchasing inquiry.exe schtasks.exe PID 1740 wrote to memory of 1400 1740 Ref 2998390020 purchasing inquiry.exe schtasks.exe PID 1740 wrote to memory of 1400 1740 Ref 2998390020 purchasing inquiry.exe schtasks.exe PID 1740 wrote to memory of 1400 1740 Ref 2998390020 purchasing inquiry.exe schtasks.exe PID 1740 wrote to memory of 1640 1740 Ref 2998390020 purchasing inquiry.exe Ref 2998390020 purchasing inquiry.exe PID 1740 wrote to memory of 1640 1740 Ref 2998390020 purchasing inquiry.exe Ref 2998390020 purchasing inquiry.exe PID 1740 wrote to memory of 1640 1740 Ref 2998390020 purchasing inquiry.exe Ref 2998390020 purchasing inquiry.exe PID 1740 wrote to memory of 1640 1740 Ref 2998390020 purchasing inquiry.exe Ref 2998390020 purchasing inquiry.exe PID 1740 wrote to memory of 1620 1740 Ref 2998390020 purchasing inquiry.exe Ref 2998390020 purchasing inquiry.exe PID 1740 wrote to memory of 1620 1740 Ref 2998390020 purchasing inquiry.exe Ref 2998390020 purchasing inquiry.exe PID 1740 wrote to memory of 1620 1740 Ref 2998390020 purchasing inquiry.exe Ref 2998390020 purchasing inquiry.exe PID 1740 wrote to memory of 1620 1740 Ref 2998390020 purchasing inquiry.exe Ref 2998390020 purchasing inquiry.exe PID 1740 wrote to memory of 1620 1740 Ref 2998390020 purchasing inquiry.exe Ref 2998390020 purchasing inquiry.exe PID 1740 wrote to memory of 1620 1740 Ref 2998390020 purchasing inquiry.exe Ref 2998390020 purchasing inquiry.exe PID 1740 wrote to memory of 1620 1740 Ref 2998390020 purchasing inquiry.exe Ref 2998390020 purchasing inquiry.exe PID 1740 wrote to memory of 1620 1740 Ref 2998390020 purchasing inquiry.exe Ref 2998390020 purchasing inquiry.exe PID 1740 wrote to memory of 1620 1740 Ref 2998390020 purchasing inquiry.exe Ref 2998390020 purchasing inquiry.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Ref 2998390020 purchasing inquiry.exe"C:\Users\Admin\AppData\Local\Temp\Ref 2998390020 purchasing inquiry.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vDOhzfeKq" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3D0F.tmp"2⤵
- Creates scheduled task(s)
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\Ref 2998390020 purchasing inquiry.exe"C:\Users\Admin\AppData\Local\Temp\Ref 2998390020 purchasing inquiry.exe"2⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\Ref 2998390020 purchasing inquiry.exe"C:\Users\Admin\AppData\Local\Temp\Ref 2998390020 purchasing inquiry.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1620