Analysis

  • max time kernel
    140s
  • max time network
    148s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    12-12-2021 12:11

General

  • Target

    ba41cfdab066b1042c036a2afd729db8.exe

  • Size

    1.9MB

  • MD5

    ba41cfdab066b1042c036a2afd729db8

  • SHA1

    8369841c075f35cbe718adf6a82fc1169f649678

  • SHA256

    2822e6831ea3af883164c1711d3b6ac0a59b5403b557c044f56ac590b8ef5e22

  • SHA512

    dba0fb5a990ceb2780a2c9f7b6b172f1533f5e611fbf31234729096f23c029cc7c4b5eef6bbea87e86b446ed71478a7cf81b1103a4afeffae2be2bfa63eb0058

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    ijxswknmmmycxzso

Extracted

Family

matiex

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    ijxswknmmmycxzso

Signatures

  • Matiex

    Matiex is a keylogger and infostealer first seen in July 2020.

  • Matiex Main Payload 2 IoCs
  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Turns off Windows Defender SpyNet reporting 2 TTPs
  • Windows security bypass 2 TTPs
  • Drops startup file 2 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 11 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ba41cfdab066b1042c036a2afd729db8.exe
    "C:\Users\Admin\AppData\Local\Temp\ba41cfdab066b1042c036a2afd729db8.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops startup file
    • Windows security modification
    • Adds Run key to start application
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3584
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ba41cfdab066b1042c036a2afd729db8.exe" -Force
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1324
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ba41cfdab066b1042c036a2afd729db8.exe" -Force
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3312
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ba41cfdab066b1042c036a2afd729db8.exe" -Force
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:436
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\ba41cfdab066b1042c036a2afd729db8.exe" -Force
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3420
    • C:\Users\Admin\AppData\Local\Temp\ba41cfdab066b1042c036a2afd729db8.exe
      "C:\Users\Admin\AppData\Local\Temp\ba41cfdab066b1042c036a2afd729db8.exe"
      2⤵
        PID:1964
      • C:\Users\Admin\AppData\Local\Temp\ba41cfdab066b1042c036a2afd729db8.exe
        "C:\Users\Admin\AppData\Local\Temp\ba41cfdab066b1042c036a2afd729db8.exe"
        2⤵
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • outlook_office_path
        • outlook_win_path
        PID:2072
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3584 -s 2264
        2⤵
        • Program crash
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1356

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Winlogon Helper DLL

    1
    T1004

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    5
    T1112

    Disabling Security Tools

    3
    T1089

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    System Information Discovery

    1
    T1082

    Collection

    Data from Local System

    2
    T1005

    Email Collection

    1
    T1114

    Command and Control

    Web Service

    1
    T1102

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
      MD5

      db01a2c1c7e70b2b038edf8ad5ad9826

      SHA1

      540217c647a73bad8d8a79e3a0f3998b5abd199b

      SHA256

      413da361d77055dae7007f82b58b366c8783aa72e0b8fbe41519b940c253b38d

      SHA512

      c76ff57fcee5cdf9fdf3116d4e1dc0cf106867bf19ab474b763e242acf5dca9a7509cb837c35e130c3e056636b4e8a4e135512a978bcd3dd641e20f5bf76c3d6

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
      MD5

      7247129cd0644457905b7d6bf17fd078

      SHA1

      dbf9139b5a1b72141f170d2eae911bbbe7e128c8

      SHA256

      dfa6e0d79449f29310b2a0400dc7fa5a3a6b08182233147a81902d1f80a0f8e4

      SHA512

      9b1ebd7fe485811f10ec02778d90a7f7eccafa0231027b640b94eaed8408107051da7fcc4f17a9aa0eef900fa2595f44be7fd115331fb6da9b10076f5fcf87e0

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
      MD5

      7247129cd0644457905b7d6bf17fd078

      SHA1

      dbf9139b5a1b72141f170d2eae911bbbe7e128c8

      SHA256

      dfa6e0d79449f29310b2a0400dc7fa5a3a6b08182233147a81902d1f80a0f8e4

      SHA512

      9b1ebd7fe485811f10ec02778d90a7f7eccafa0231027b640b94eaed8408107051da7fcc4f17a9aa0eef900fa2595f44be7fd115331fb6da9b10076f5fcf87e0

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
      MD5

      0b5d94d20be9eecbaed3dddd04143f07

      SHA1

      c677d0355f4cc7301075a554adc889bce502e15a

      SHA256

      3c6f74219d419accdd3de0d14fa46ff290fd430eddcc5352deddd7de59b4928c

      SHA512

      395e5d0f28819f773b8d53363b7df73cc976124d1accce104390fdb3f5ebf57d8bb357e616910c03e1a9d67985704592640e442bd637009e32086bb1b2088916

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
      MD5

      0b5d94d20be9eecbaed3dddd04143f07

      SHA1

      c677d0355f4cc7301075a554adc889bce502e15a

      SHA256

      3c6f74219d419accdd3de0d14fa46ff290fd430eddcc5352deddd7de59b4928c

      SHA512

      395e5d0f28819f773b8d53363b7df73cc976124d1accce104390fdb3f5ebf57d8bb357e616910c03e1a9d67985704592640e442bd637009e32086bb1b2088916

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
      MD5

      0b5d94d20be9eecbaed3dddd04143f07

      SHA1

      c677d0355f4cc7301075a554adc889bce502e15a

      SHA256

      3c6f74219d419accdd3de0d14fa46ff290fd430eddcc5352deddd7de59b4928c

      SHA512

      395e5d0f28819f773b8d53363b7df73cc976124d1accce104390fdb3f5ebf57d8bb357e616910c03e1a9d67985704592640e442bd637009e32086bb1b2088916

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
      MD5

      8627173538a50e10242ab7e68760fcf5

      SHA1

      bb1c746df10770c1f54cb71a35881f955fefc58a

      SHA256

      caedbfbcfb7713926696f3f2d8732b078c1f17a7ded9f86ecf3ec04bfbb81aa7

      SHA512

      9d0d52f2e4d6ab55ffc510a5dc08057db642e6fe6bce0d28d6580facbbbe70cac24513e2bdb6d7c5c2e3fa8fe7e9fe93aa51b817ac9ce30342980ff3828bc55d

    • memory/436-262-0x0000000000B23000-0x0000000000B24000-memory.dmp
      Filesize

      4KB

    • memory/436-163-0x0000000007460000-0x0000000007461000-memory.dmp
      Filesize

      4KB

    • memory/436-125-0x0000000000000000-mapping.dmp
    • memory/436-133-0x0000000000670000-0x0000000000671000-memory.dmp
      Filesize

      4KB

    • memory/436-246-0x000000007F1D0000-0x000000007F1D1000-memory.dmp
      Filesize

      4KB

    • memory/436-150-0x0000000000B22000-0x0000000000B23000-memory.dmp
      Filesize

      4KB

    • memory/436-189-0x0000000000670000-0x0000000000671000-memory.dmp
      Filesize

      4KB

    • memory/436-167-0x0000000007870000-0x0000000007871000-memory.dmp
      Filesize

      4KB

    • memory/436-132-0x0000000000670000-0x0000000000671000-memory.dmp
      Filesize

      4KB

    • memory/436-146-0x0000000000B20000-0x0000000000B21000-memory.dmp
      Filesize

      4KB

    • memory/1324-130-0x0000000002E50000-0x0000000002E51000-memory.dmp
      Filesize

      4KB

    • memory/1324-135-0x00000000045D0000-0x00000000045D1000-memory.dmp
      Filesize

      4KB

    • memory/1324-144-0x00000000045C0000-0x00000000045C1000-memory.dmp
      Filesize

      4KB

    • memory/1324-187-0x0000000002E50000-0x0000000002E51000-memory.dmp
      Filesize

      4KB

    • memory/1324-127-0x0000000002E50000-0x0000000002E51000-memory.dmp
      Filesize

      4KB

    • memory/1324-148-0x00000000045C2000-0x00000000045C3000-memory.dmp
      Filesize

      4KB

    • memory/1324-123-0x0000000000000000-mapping.dmp
    • memory/2072-186-0x00000000050F0000-0x000000000518C000-memory.dmp
      Filesize

      624KB

    • memory/2072-175-0x000000000046DFDE-mapping.dmp
    • memory/2072-171-0x0000000000400000-0x0000000000472000-memory.dmp
      Filesize

      456KB

    • memory/3312-151-0x00000000078E0000-0x00000000078E1000-memory.dmp
      Filesize

      4KB

    • memory/3312-190-0x00000000033E0000-0x00000000033E1000-memory.dmp
      Filesize

      4KB

    • memory/3312-124-0x0000000000000000-mapping.dmp
    • memory/3312-265-0x0000000004F73000-0x0000000004F74000-memory.dmp
      Filesize

      4KB

    • memory/3312-128-0x00000000033E0000-0x00000000033E1000-memory.dmp
      Filesize

      4KB

    • memory/3312-147-0x0000000004F72000-0x0000000004F73000-memory.dmp
      Filesize

      4KB

    • memory/3312-243-0x000000007EA60000-0x000000007EA61000-memory.dmp
      Filesize

      4KB

    • memory/3312-143-0x0000000004F70000-0x0000000004F71000-memory.dmp
      Filesize

      4KB

    • memory/3312-129-0x00000000033E0000-0x00000000033E1000-memory.dmp
      Filesize

      4KB

    • memory/3312-139-0x0000000007940000-0x0000000007941000-memory.dmp
      Filesize

      4KB

    • memory/3420-172-0x0000000008170000-0x0000000008171000-memory.dmp
      Filesize

      4KB

    • memory/3420-261-0x0000000006C03000-0x0000000006C04000-memory.dmp
      Filesize

      4KB

    • memory/3420-182-0x0000000008270000-0x0000000008271000-memory.dmp
      Filesize

      4KB

    • memory/3420-131-0x0000000004580000-0x0000000004581000-memory.dmp
      Filesize

      4KB

    • memory/3420-149-0x0000000006C02000-0x0000000006C03000-memory.dmp
      Filesize

      4KB

    • memory/3420-188-0x0000000004580000-0x0000000004581000-memory.dmp
      Filesize

      4KB

    • memory/3420-239-0x000000007F780000-0x000000007F781000-memory.dmp
      Filesize

      4KB

    • memory/3420-145-0x0000000006C00000-0x0000000006C01000-memory.dmp
      Filesize

      4KB

    • memory/3420-159-0x0000000007A60000-0x0000000007A61000-memory.dmp
      Filesize

      4KB

    • memory/3420-134-0x0000000004580000-0x0000000004581000-memory.dmp
      Filesize

      4KB

    • memory/3420-126-0x0000000000000000-mapping.dmp
    • memory/3420-155-0x00000000079F0000-0x00000000079F1000-memory.dmp
      Filesize

      4KB

    • memory/3584-115-0x0000000000BE0000-0x0000000000BE1000-memory.dmp
      Filesize

      4KB

    • memory/3584-122-0x00000000056C0000-0x00000000056C1000-memory.dmp
      Filesize

      4KB

    • memory/3584-121-0x00000000057A0000-0x0000000005823000-memory.dmp
      Filesize

      524KB

    • memory/3584-120-0x0000000005890000-0x0000000005891000-memory.dmp
      Filesize

      4KB

    • memory/3584-119-0x00000000058A0000-0x00000000058A1000-memory.dmp
      Filesize

      4KB

    • memory/3584-118-0x0000000005DA0000-0x0000000005DA1000-memory.dmp
      Filesize

      4KB

    • memory/3584-117-0x0000000005700000-0x0000000005701000-memory.dmp
      Filesize

      4KB