Static task
static1
Behavioral task
behavioral1
Sample
672-60-0x0000000000400000-0x0000000000472000-memory.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
672-60-0x0000000000400000-0x0000000000472000-memory.exe
Resource
win10v2004-en-20220113
General
-
Target
672-60-0x0000000000400000-0x0000000000472000-memory.dmp
-
Size
456KB
-
MD5
accb0ee81e806459927b2f67b9f3a847
-
SHA1
eae5b671acf195944098e6d484a248a32dc0549c
-
SHA256
ce4da76462c710d8ef6b1c07e5357fdf4d688b91a59b6131a7d2d3bc04a56953
-
SHA512
ad2420df5509348ec18c393bef9b3399d4b8d84d102e7738a4f43bcaa75af55b89ee0519dc95dd1234c8c23dda378b03280014ceef19694827d0029b81e30b46
Malware Config
Signatures
-
Matiex Main Payload 1 IoCs
Processes:
resource yara_rule sample family_matiex -
Matiex family
Files
-
672-60-0x0000000000400000-0x0000000000472000-memory.dmp.exe windows x86
Code Sign
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 428KB - Virtual size: 427KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ