Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
27-04-2022 15:23
Static task
static1
Behavioral task
behavioral1
Sample
DEKONT.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
DEKONT.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
DEKONT.exe
-
Size
611KB
-
MD5
da248e530b6e65e7457a6d472e0aeb47
-
SHA1
84ab397a9d4008c916666d9119e9fdc4b70d5642
-
SHA256
d57b7809ae71b779b00aa2e7e3b55c3ff6c210453e19a872489e330285031ed3
-
SHA512
dfae1e4876df412dbe8137c725a99023485e9e9a8cfbbeeb2026015903ed1522b2d3b1f613c3f4107880c484ee2314907341edb77f1091c670dde4b1dbf47589
Score
10/10
Malware Config
Extracted
Family
matiex
Credentials
Protocol: smtp- Host:
srvc13.turhost.com - Port:
587 - Username:
[email protected] - Password:
italik2015
Signatures
-
Matiex Main Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3828-133-0x0000000000400000-0x0000000000472000-memory.dmp family_matiex -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
MSBuild.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key opened \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key opened \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 27 checkip.dyndns.org 35 freegeoip.app 36 freegeoip.app -
Suspicious use of SetThreadContext 1 IoCs
Processes:
DEKONT.exedescription pid process target process PID 2904 set thread context of 3828 2904 DEKONT.exe MSBuild.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4060 3828 WerFault.exe MSBuild.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
DEKONT.exepid process 2904 DEKONT.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
MSBuild.exedescription pid process Token: SeDebugPrivilege 3828 MSBuild.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
DEKONT.exedescription pid process target process PID 2904 wrote to memory of 4508 2904 DEKONT.exe cmd.exe PID 2904 wrote to memory of 4508 2904 DEKONT.exe cmd.exe PID 2904 wrote to memory of 4508 2904 DEKONT.exe cmd.exe PID 2904 wrote to memory of 3828 2904 DEKONT.exe MSBuild.exe PID 2904 wrote to memory of 3828 2904 DEKONT.exe MSBuild.exe PID 2904 wrote to memory of 3828 2904 DEKONT.exe MSBuild.exe PID 2904 wrote to memory of 3828 2904 DEKONT.exe MSBuild.exe -
outlook_office_path 1 IoCs
Processes:
MSBuild.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe -
outlook_win_path 1 IoCs
Processes:
MSBuild.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\DEKONT.exe"C:\Users\Admin\AppData\Local\Temp\DEKONT.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:4508
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:3828 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3828 -s 19923⤵
- Program crash
PID:4060
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3828 -ip 38281⤵PID:4304