Analysis
-
max time kernel
140s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
11-02-2022 08:22
Static task
static1
Behavioral task
behavioral1
Sample
Enijidjm.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Enijidjm.exe
Resource
win10v2004-en-20220113
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
Enijidjm.exe
-
Size
111KB
-
MD5
dda708bbd533046daf479fd123f75cda
-
SHA1
b8dc0fa033f434eafe46df7c0320676c866814cb
-
SHA256
f442097ffe0336d6712267088a4368aa539f51f7ea7d1e950da88c6a42f1b29e
-
SHA512
b6c983e27964446d6c8c3dcb6f03d0cbb957fd2c2cbe2888444372a4a3b69b22d3e9b3e401972aa5b365bc6b810dbffef9aa0aaeb50bf8e31f720f173b961e58
Score
10/10
Malware Config
Extracted
Credentials
Protocol: smtp- Host:
serv3.devmexico.com - Port:
587 - Username:
[email protected] - Password:
3}l^pI#_4K_!
Extracted
Family
matiex
Credentials
Protocol: smtp- Host:
serv3.devmexico.com - Port:
587 - Username:
[email protected] - Password:
3}l^pI#_4K_! - Email To:
[email protected]
Signatures
-
Matiex Main Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4664-136-0x0000000000400000-0x0000000000472000-memory.dmp family_matiex -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
MSBuild.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key opened \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key opened \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Enijidjm.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Test = "\"C:\\Users\\Admin\\AppData\\Roaming\\Demo\\Test.exe\"" Enijidjm.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 48 freegeoip.app 45 checkip.dyndns.org 47 freegeoip.app -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Enijidjm.exedescription pid process target process PID 1572 set thread context of 4664 1572 Enijidjm.exe MSBuild.exe -
Drops file in Windows directory 8 IoCs
Processes:
svchost.exeTiWorker.exedescription ioc process File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe File opened for modification C:\Windows\Logs\CBS\CBS.log TiWorker.exe File opened for modification C:\Windows\WinSxS\pending.xml TiWorker.exe File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
Enijidjm.exeMSBuild.exepid process 1572 Enijidjm.exe 1572 Enijidjm.exe 4664 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
svchost.exeTiWorker.exeEnijidjm.exedescription pid process Token: SeShutdownPrivilege 2484 svchost.exe Token: SeCreatePagefilePrivilege 2484 svchost.exe Token: SeShutdownPrivilege 2484 svchost.exe Token: SeCreatePagefilePrivilege 2484 svchost.exe Token: SeShutdownPrivilege 2484 svchost.exe Token: SeCreatePagefilePrivilege 2484 svchost.exe Token: SeSecurityPrivilege 3860 TiWorker.exe Token: SeRestorePrivilege 3860 TiWorker.exe Token: SeBackupPrivilege 3860 TiWorker.exe Token: SeDebugPrivilege 1572 Enijidjm.exe Token: SeBackupPrivilege 3860 TiWorker.exe Token: SeRestorePrivilege 3860 TiWorker.exe Token: SeSecurityPrivilege 3860 TiWorker.exe Token: SeBackupPrivilege 3860 TiWorker.exe Token: SeRestorePrivilege 3860 TiWorker.exe Token: SeSecurityPrivilege 3860 TiWorker.exe Token: SeBackupPrivilege 3860 TiWorker.exe Token: SeRestorePrivilege 3860 TiWorker.exe Token: SeSecurityPrivilege 3860 TiWorker.exe Token: SeBackupPrivilege 3860 TiWorker.exe Token: SeRestorePrivilege 3860 TiWorker.exe Token: SeSecurityPrivilege 3860 TiWorker.exe Token: SeBackupPrivilege 3860 TiWorker.exe Token: SeRestorePrivilege 3860 TiWorker.exe Token: SeSecurityPrivilege 3860 TiWorker.exe Token: SeBackupPrivilege 3860 TiWorker.exe Token: SeRestorePrivilege 3860 TiWorker.exe Token: SeSecurityPrivilege 3860 TiWorker.exe Token: SeBackupPrivilege 3860 TiWorker.exe Token: SeRestorePrivilege 3860 TiWorker.exe Token: SeSecurityPrivilege 3860 TiWorker.exe Token: SeBackupPrivilege 3860 TiWorker.exe Token: SeRestorePrivilege 3860 TiWorker.exe Token: SeSecurityPrivilege 3860 TiWorker.exe Token: SeBackupPrivilege 3860 TiWorker.exe Token: SeRestorePrivilege 3860 TiWorker.exe Token: SeSecurityPrivilege 3860 TiWorker.exe Token: SeBackupPrivilege 3860 TiWorker.exe Token: SeRestorePrivilege 3860 TiWorker.exe Token: SeSecurityPrivilege 3860 TiWorker.exe Token: SeBackupPrivilege 3860 TiWorker.exe Token: SeRestorePrivilege 3860 TiWorker.exe Token: SeSecurityPrivilege 3860 TiWorker.exe Token: SeBackupPrivilege 3860 TiWorker.exe Token: SeRestorePrivilege 3860 TiWorker.exe Token: SeSecurityPrivilege 3860 TiWorker.exe Token: SeBackupPrivilege 3860 TiWorker.exe Token: SeRestorePrivilege 3860 TiWorker.exe Token: SeSecurityPrivilege 3860 TiWorker.exe Token: SeBackupPrivilege 3860 TiWorker.exe Token: SeRestorePrivilege 3860 TiWorker.exe Token: SeSecurityPrivilege 3860 TiWorker.exe Token: SeBackupPrivilege 3860 TiWorker.exe Token: SeRestorePrivilege 3860 TiWorker.exe Token: SeSecurityPrivilege 3860 TiWorker.exe Token: SeBackupPrivilege 3860 TiWorker.exe Token: SeRestorePrivilege 3860 TiWorker.exe Token: SeSecurityPrivilege 3860 TiWorker.exe Token: SeBackupPrivilege 3860 TiWorker.exe Token: SeRestorePrivilege 3860 TiWorker.exe Token: SeSecurityPrivilege 3860 TiWorker.exe Token: SeBackupPrivilege 3860 TiWorker.exe Token: SeRestorePrivilege 3860 TiWorker.exe Token: SeSecurityPrivilege 3860 TiWorker.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
Enijidjm.exedescription pid process target process PID 1572 wrote to memory of 4664 1572 Enijidjm.exe MSBuild.exe PID 1572 wrote to memory of 4664 1572 Enijidjm.exe MSBuild.exe PID 1572 wrote to memory of 4664 1572 Enijidjm.exe MSBuild.exe PID 1572 wrote to memory of 4664 1572 Enijidjm.exe MSBuild.exe PID 1572 wrote to memory of 4664 1572 Enijidjm.exe MSBuild.exe PID 1572 wrote to memory of 4664 1572 Enijidjm.exe MSBuild.exe PID 1572 wrote to memory of 4664 1572 Enijidjm.exe MSBuild.exe PID 1572 wrote to memory of 4664 1572 Enijidjm.exe MSBuild.exe -
outlook_office_path 1 IoCs
Processes:
MSBuild.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe -
outlook_win_path 1 IoCs
Processes:
MSBuild.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Enijidjm.exe"C:\Users\Admin\AppData\Local\Temp\Enijidjm.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_office_path
- outlook_win_path
PID:4664
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2484
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3860