Analysis

  • max time kernel
    114s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    20-04-2022 02:57

General

  • Target

    f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe

  • Size

    595KB

  • MD5

    e6bab12c7456216175a7ed7598d39b02

  • SHA1

    525990e346d2708da8ef38dd0254e49f2c3330b6

  • SHA256

    f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8

  • SHA512

    b90c9d3e55b48d42e165bbe9d12217d2d4c31bcce5ec2590fd2bfb26e068d5dd8d8515eaa6b5e5b98f26e2066142c2a432bbea7ad1f955dfc9a916e3da98dcad

Malware Config

Extracted

Family

matiex

C2

https://api.telegram.org/bot1402180145:AAG6hmg8QGRGiHQwRXC9wKOtIEyFy3aT6ms/sendMessage?chat_id=1299507057

Signatures

  • Matiex

    Matiex is a keylogger and infostealer first seen in July 2020.

  • Matiex Main Payload 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe
    "C:\Users\Admin\AppData\Local\Temp\f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:4716
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c cls
      2⤵
        PID:4276
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c schtasks /Create /TN name /XML "C:\Users\Admin\AppData\Local\Temp\039462f71f604c9aaf15be88cc879815.xml"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4176
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /Create /TN name /XML "C:\Users\Admin\AppData\Local\Temp\039462f71f604c9aaf15be88cc879815.xml"
          3⤵
          • Creates scheduled task(s)
          PID:4240
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
        2⤵
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        • outlook_office_path
        • outlook_win_path
        PID:4548
        • C:\Windows\SysWOW64\netsh.exe
          "netsh" wlan show profile
          3⤵
            PID:4344

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\039462f71f604c9aaf15be88cc879815.xml

        Filesize

        1KB

        MD5

        57e80c1cd83971b009db6462dec561e8

        SHA1

        9890fc3fc7b93bb9dce0c624486307cff2a26927

        SHA256

        e6cb647c0aee80cbac58f101ba47620657c8cd58f9a0aa91c6f8a4466e4ebc6f

        SHA512

        acc99eb56c615f669ef933c34ae86a1ba41a5ea5108a211de14107293d0bea7eb45e317bdb9b833b1262a1022fa4aa4462f4f3c6a19fa9481320dbb75ee41dd6

      • memory/4176-132-0x0000000000000000-mapping.dmp

      • memory/4240-133-0x0000000000000000-mapping.dmp

      • memory/4276-130-0x0000000000000000-mapping.dmp

      • memory/4344-140-0x0000000000000000-mapping.dmp

      • memory/4548-136-0x0000000000410000-0x0000000000486000-memory.dmp

        Filesize

        472KB

      • memory/4548-135-0x0000000000000000-mapping.dmp

      • memory/4548-137-0x0000000004AA0000-0x0000000004B3C000-memory.dmp

        Filesize

        624KB

      • memory/4548-138-0x0000000004B40000-0x0000000004BA6000-memory.dmp

        Filesize

        408KB

      • memory/4548-139-0x0000000005E30000-0x00000000063D4000-memory.dmp

        Filesize

        5.6MB

      • memory/4548-141-0x0000000005C00000-0x0000000005DC2000-memory.dmp

        Filesize

        1.8MB

      • memory/4548-142-0x0000000005AD0000-0x0000000005B62000-memory.dmp

        Filesize

        584KB

      • memory/4548-143-0x0000000005A30000-0x0000000005A3A000-memory.dmp

        Filesize

        40KB

      • memory/4716-131-0x0000000000D10000-0x0000000000D3C000-memory.dmp

        Filesize

        176KB