Analysis

  • max time kernel
    154s
  • max time network
    133s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    13-12-2021 15:06

General

  • Target

    2fe0d9dfd0fbaa96190944e7476165e9.exe

  • Size

    491KB

  • MD5

    2fe0d9dfd0fbaa96190944e7476165e9

  • SHA1

    4d19923e1648170f22388b60d5b2eee85e894136

  • SHA256

    5a973c144d49d4ca870852219ed8de091cd22359160c82f00c1c5868ab0b124f

  • SHA512

    d8c21aa9aca37bf20a3785c8ae675756b51061da9864950cc6ed2c942619e975802415940d94592c1de1ab6c13cee0fe82702ed547343620c7ce03b8c7fd9a2e

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.salujaford.in
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    saluja@#$chd

Extracted

Family

matiex

Credentials

  • Protocol:
    smtp
  • Host:
    mail.salujaford.in
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    saluja@#$chd

Signatures

  • Matiex

    Matiex is a keylogger and infostealer first seen in July 2020.

  • Matiex Main Payload 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2fe0d9dfd0fbaa96190944e7476165e9.exe
    "C:\Users\Admin\AppData\Local\Temp\2fe0d9dfd0fbaa96190944e7476165e9.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3068
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ogCLil" /XML "C:\Users\Admin\AppData\Local\Temp\tmp7A8B.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:3444
    • C:\Users\Admin\AppData\Local\Temp\2fe0d9dfd0fbaa96190944e7476165e9.exe
      "{path}"
      2⤵
        PID:1504
      • C:\Users\Admin\AppData\Local\Temp\2fe0d9dfd0fbaa96190944e7476165e9.exe
        "{path}"
        2⤵
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        • outlook_office_path
        • outlook_win_path
        PID:1480
        • C:\Windows\SysWOW64\netsh.exe
          "netsh" wlan show profile
          3⤵
            PID:3332

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Execution

      Scheduled Task

      1
      T1053

      Persistence

      Scheduled Task

      1
      T1053

      Privilege Escalation

      Scheduled Task

      1
      T1053

      Credential Access

      Credentials in Files

      3
      T1081

      Discovery

      System Information Discovery

      1
      T1082

      Collection

      Data from Local System

      3
      T1005

      Email Collection

      1
      T1114

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\2fe0d9dfd0fbaa96190944e7476165e9.exe.log
        MD5

        0c2899d7c6746f42d5bbe088c777f94c

        SHA1

        622f66c5f7a3c91b28a9f43ce7c6cabadbf514f1

        SHA256

        5b0b99740cadaeff7b9891136644b396941547e20cc7eea646560d0dad5a5458

        SHA512

        ab7a3409ed4b6ca00358330a3aa4ef6de7d81eb21a5e24bb629ef6a7c7c4e2a70ca3accfbc989ed6e495fdb8eb6203a26d6f2a37b2a5809af4276af375b49078

      • C:\Users\Admin\AppData\Local\Temp\tmp7A8B.tmp
        MD5

        1575fefb8c89a45a15f225dd80216dd9

        SHA1

        2f263564571ab702c34bce164435910053258817

        SHA256

        afa910e156f0cc76efff3e10b986bb6bed27fe52431407e93604197700fff930

        SHA512

        ebfc430419a91e2f72d6ac2088497b282cbcfd907aa1b4f95731e881f5d5ab91fc54bf1c6057d557a41a22a603c3653d44ee1f04a4c24df0e427d099d17d7c08

      • memory/1480-136-0x0000000007370000-0x0000000007371000-memory.dmp
        Filesize

        4KB

      • memory/1480-133-0x0000000005B20000-0x0000000005B21000-memory.dmp
        Filesize

        4KB

      • memory/1480-132-0x00000000058E0000-0x00000000058E1000-memory.dmp
        Filesize

        4KB

      • memory/1480-127-0x00000000004709CE-mapping.dmp
      • memory/1480-126-0x0000000000400000-0x0000000000476000-memory.dmp
        Filesize

        472KB

      • memory/3068-120-0x0000000005840000-0x0000000005841000-memory.dmp
        Filesize

        4KB

      • memory/3068-123-0x00000000092B0000-0x00000000092B1000-memory.dmp
        Filesize

        4KB

      • memory/3068-122-0x0000000009160000-0x000000000920C000-memory.dmp
        Filesize

        688KB

      • memory/3068-121-0x00000000059F0000-0x0000000005A06000-memory.dmp
        Filesize

        88KB

      • memory/3068-115-0x0000000000EF0000-0x0000000000EF1000-memory.dmp
        Filesize

        4KB

      • memory/3068-119-0x00000000058F0000-0x0000000005DEE000-memory.dmp
        Filesize

        5.0MB

      • memory/3068-118-0x00000000057A0000-0x00000000057A1000-memory.dmp
        Filesize

        4KB

      • memory/3068-117-0x0000000005DF0000-0x0000000005DF1000-memory.dmp
        Filesize

        4KB

      • memory/3332-135-0x0000000000000000-mapping.dmp
      • memory/3444-124-0x0000000000000000-mapping.dmp