Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
18-04-2022 12:53
Static task
static1
Behavioral task
behavioral1
Sample
3345b3680b62996cf0e617dca35459ba8cadd9eacc0cfce472c96e4e2bf1b2ab.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3345b3680b62996cf0e617dca35459ba8cadd9eacc0cfce472c96e4e2bf1b2ab.exe
Resource
win10v2004-20220414-en
General
-
Target
3345b3680b62996cf0e617dca35459ba8cadd9eacc0cfce472c96e4e2bf1b2ab.exe
-
Size
811KB
-
MD5
f7f85f2d85bc9f27dea6901ce759b6a0
-
SHA1
340cb9d1e107ecee278e10943cfc83a3e6f17abf
-
SHA256
3345b3680b62996cf0e617dca35459ba8cadd9eacc0cfce472c96e4e2bf1b2ab
-
SHA512
b9bdac23032c8706f8095c0def0389630b03141f38534fc73d044e7af4bfd2a8848e359b87a0c0044f621c95c7124f49304d2fb2d724347caac34b05eaa8a0b9
Malware Config
Extracted
matiex
Protocol: smtp- Host:
mail.salujaford.in - Port:
587 - Username:
[email protected] - Password:
saluja@#$chd
Signatures
-
Matiex Main Payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/1220-62-0x0000000000400000-0x0000000000476000-memory.dmp family_matiex behavioral1/memory/1220-63-0x0000000000400000-0x0000000000476000-memory.dmp family_matiex behavioral1/memory/1220-64-0x0000000000400000-0x0000000000476000-memory.dmp family_matiex behavioral1/memory/1220-65-0x00000000004709CE-mapping.dmp family_matiex behavioral1/memory/1220-67-0x0000000000400000-0x0000000000476000-memory.dmp family_matiex behavioral1/memory/1220-69-0x0000000000400000-0x0000000000476000-memory.dmp family_matiex -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 checkip.dyndns.org 8 freegeoip.app 9 freegeoip.app -
Suspicious use of SetThreadContext 1 IoCs
Processes:
3345b3680b62996cf0e617dca35459ba8cadd9eacc0cfce472c96e4e2bf1b2ab.exedescription pid process target process PID 1844 set thread context of 1220 1844 3345b3680b62996cf0e617dca35459ba8cadd9eacc0cfce472c96e4e2bf1b2ab.exe 3345b3680b62996cf0e617dca35459ba8cadd9eacc0cfce472c96e4e2bf1b2ab.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
3345b3680b62996cf0e617dca35459ba8cadd9eacc0cfce472c96e4e2bf1b2ab.exepid process 1220 3345b3680b62996cf0e617dca35459ba8cadd9eacc0cfce472c96e4e2bf1b2ab.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
3345b3680b62996cf0e617dca35459ba8cadd9eacc0cfce472c96e4e2bf1b2ab.exedescription pid process Token: SeDebugPrivilege 1220 3345b3680b62996cf0e617dca35459ba8cadd9eacc0cfce472c96e4e2bf1b2ab.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
3345b3680b62996cf0e617dca35459ba8cadd9eacc0cfce472c96e4e2bf1b2ab.exedescription pid process target process PID 1844 wrote to memory of 1420 1844 3345b3680b62996cf0e617dca35459ba8cadd9eacc0cfce472c96e4e2bf1b2ab.exe schtasks.exe PID 1844 wrote to memory of 1420 1844 3345b3680b62996cf0e617dca35459ba8cadd9eacc0cfce472c96e4e2bf1b2ab.exe schtasks.exe PID 1844 wrote to memory of 1420 1844 3345b3680b62996cf0e617dca35459ba8cadd9eacc0cfce472c96e4e2bf1b2ab.exe schtasks.exe PID 1844 wrote to memory of 1420 1844 3345b3680b62996cf0e617dca35459ba8cadd9eacc0cfce472c96e4e2bf1b2ab.exe schtasks.exe PID 1844 wrote to memory of 1220 1844 3345b3680b62996cf0e617dca35459ba8cadd9eacc0cfce472c96e4e2bf1b2ab.exe 3345b3680b62996cf0e617dca35459ba8cadd9eacc0cfce472c96e4e2bf1b2ab.exe PID 1844 wrote to memory of 1220 1844 3345b3680b62996cf0e617dca35459ba8cadd9eacc0cfce472c96e4e2bf1b2ab.exe 3345b3680b62996cf0e617dca35459ba8cadd9eacc0cfce472c96e4e2bf1b2ab.exe PID 1844 wrote to memory of 1220 1844 3345b3680b62996cf0e617dca35459ba8cadd9eacc0cfce472c96e4e2bf1b2ab.exe 3345b3680b62996cf0e617dca35459ba8cadd9eacc0cfce472c96e4e2bf1b2ab.exe PID 1844 wrote to memory of 1220 1844 3345b3680b62996cf0e617dca35459ba8cadd9eacc0cfce472c96e4e2bf1b2ab.exe 3345b3680b62996cf0e617dca35459ba8cadd9eacc0cfce472c96e4e2bf1b2ab.exe PID 1844 wrote to memory of 1220 1844 3345b3680b62996cf0e617dca35459ba8cadd9eacc0cfce472c96e4e2bf1b2ab.exe 3345b3680b62996cf0e617dca35459ba8cadd9eacc0cfce472c96e4e2bf1b2ab.exe PID 1844 wrote to memory of 1220 1844 3345b3680b62996cf0e617dca35459ba8cadd9eacc0cfce472c96e4e2bf1b2ab.exe 3345b3680b62996cf0e617dca35459ba8cadd9eacc0cfce472c96e4e2bf1b2ab.exe PID 1844 wrote to memory of 1220 1844 3345b3680b62996cf0e617dca35459ba8cadd9eacc0cfce472c96e4e2bf1b2ab.exe 3345b3680b62996cf0e617dca35459ba8cadd9eacc0cfce472c96e4e2bf1b2ab.exe PID 1844 wrote to memory of 1220 1844 3345b3680b62996cf0e617dca35459ba8cadd9eacc0cfce472c96e4e2bf1b2ab.exe 3345b3680b62996cf0e617dca35459ba8cadd9eacc0cfce472c96e4e2bf1b2ab.exe PID 1844 wrote to memory of 1220 1844 3345b3680b62996cf0e617dca35459ba8cadd9eacc0cfce472c96e4e2bf1b2ab.exe 3345b3680b62996cf0e617dca35459ba8cadd9eacc0cfce472c96e4e2bf1b2ab.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3345b3680b62996cf0e617dca35459ba8cadd9eacc0cfce472c96e4e2bf1b2ab.exe"C:\Users\Admin\AppData\Local\Temp\3345b3680b62996cf0e617dca35459ba8cadd9eacc0cfce472c96e4e2bf1b2ab.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\aHjTIpAw" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC2D3.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\3345b3680b62996cf0e617dca35459ba8cadd9eacc0cfce472c96e4e2bf1b2ab.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpC2D3.tmpFilesize
1KB
MD5aeead3e8f9dfce5bf75608cea87990e7
SHA172a670a3c7694bc26f06ce698d83969882250791
SHA25649c95e8691f0ed57d849b9b854a547d3e1096fb2c79e25d414c2040ba53e7608
SHA512a253e1dc30817ee693e3574ceede69c2a4af2e165ec99dccffc075786ea675eac0b7455508d21cc17b2f96343f2a9ad78753f3b6cde70285d395aec587ef046a
-
memory/1220-64-0x0000000000400000-0x0000000000476000-memory.dmpFilesize
472KB
-
memory/1220-59-0x0000000000400000-0x0000000000476000-memory.dmpFilesize
472KB
-
memory/1220-60-0x0000000000400000-0x0000000000476000-memory.dmpFilesize
472KB
-
memory/1220-62-0x0000000000400000-0x0000000000476000-memory.dmpFilesize
472KB
-
memory/1220-63-0x0000000000400000-0x0000000000476000-memory.dmpFilesize
472KB
-
memory/1220-65-0x00000000004709CE-mapping.dmp
-
memory/1220-67-0x0000000000400000-0x0000000000476000-memory.dmpFilesize
472KB
-
memory/1220-69-0x0000000000400000-0x0000000000476000-memory.dmpFilesize
472KB
-
memory/1420-57-0x0000000000000000-mapping.dmp
-
memory/1844-56-0x00000000055F0000-0x00000000056E2000-memory.dmpFilesize
968KB
-
memory/1844-55-0x00000000003C0000-0x00000000003DE000-memory.dmpFilesize
120KB
-
memory/1844-54-0x0000000001100000-0x00000000011D2000-memory.dmpFilesize
840KB