Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
01-05-2022 23:48
Static task
static1
Behavioral task
behavioral1
Sample
f4b29519255e0d839cac6027463fc12016f0f94faa2c201901f516489ec9a0ef.exe
Resource
win7-20220414-en
General
-
Target
f4b29519255e0d839cac6027463fc12016f0f94faa2c201901f516489ec9a0ef.exe
-
Size
995KB
-
MD5
05a8fd3356cef3603e257335d54b1804
-
SHA1
beea500b48ec4702359a2c7973fb0d29aecead28
-
SHA256
f4b29519255e0d839cac6027463fc12016f0f94faa2c201901f516489ec9a0ef
-
SHA512
4b4885209ec3b1d7dbcf6618cbbadd35eeede391cbd08fc0792166632fe320d8e9632437a85613c008703f700b41abeb18a575136c68a72cd3b56bce8b279870
Malware Config
Extracted
matiex
https://api.telegram.org/bot1329208090:AAED2kwCe6Uq4WmAg--eYiyQfDEc5qPX0D4/sendMessage?chat_id=1299117268
Signatures
-
Matiex Main Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1996-141-0x0000000000400000-0x0000000000472000-memory.dmp family_matiex -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
f4b29519255e0d839cac6027463fc12016f0f94faa2c201901f516489ec9a0ef.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation f4b29519255e0d839cac6027463fc12016f0f94faa2c201901f516489ec9a0ef.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 34 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
f4b29519255e0d839cac6027463fc12016f0f94faa2c201901f516489ec9a0ef.exedescription pid process target process PID 3504 set thread context of 1996 3504 f4b29519255e0d839cac6027463fc12016f0f94faa2c201901f516489ec9a0ef.exe f4b29519255e0d839cac6027463fc12016f0f94faa2c201901f516489ec9a0ef.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
f4b29519255e0d839cac6027463fc12016f0f94faa2c201901f516489ec9a0ef.exepid process 3504 f4b29519255e0d839cac6027463fc12016f0f94faa2c201901f516489ec9a0ef.exe 3504 f4b29519255e0d839cac6027463fc12016f0f94faa2c201901f516489ec9a0ef.exe 3504 f4b29519255e0d839cac6027463fc12016f0f94faa2c201901f516489ec9a0ef.exe 3504 f4b29519255e0d839cac6027463fc12016f0f94faa2c201901f516489ec9a0ef.exe 3504 f4b29519255e0d839cac6027463fc12016f0f94faa2c201901f516489ec9a0ef.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
f4b29519255e0d839cac6027463fc12016f0f94faa2c201901f516489ec9a0ef.exef4b29519255e0d839cac6027463fc12016f0f94faa2c201901f516489ec9a0ef.exedescription pid process Token: SeDebugPrivilege 3504 f4b29519255e0d839cac6027463fc12016f0f94faa2c201901f516489ec9a0ef.exe Token: SeDebugPrivilege 1996 f4b29519255e0d839cac6027463fc12016f0f94faa2c201901f516489ec9a0ef.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
f4b29519255e0d839cac6027463fc12016f0f94faa2c201901f516489ec9a0ef.exedescription pid process target process PID 3504 wrote to memory of 4408 3504 f4b29519255e0d839cac6027463fc12016f0f94faa2c201901f516489ec9a0ef.exe schtasks.exe PID 3504 wrote to memory of 4408 3504 f4b29519255e0d839cac6027463fc12016f0f94faa2c201901f516489ec9a0ef.exe schtasks.exe PID 3504 wrote to memory of 4408 3504 f4b29519255e0d839cac6027463fc12016f0f94faa2c201901f516489ec9a0ef.exe schtasks.exe PID 3504 wrote to memory of 2232 3504 f4b29519255e0d839cac6027463fc12016f0f94faa2c201901f516489ec9a0ef.exe f4b29519255e0d839cac6027463fc12016f0f94faa2c201901f516489ec9a0ef.exe PID 3504 wrote to memory of 2232 3504 f4b29519255e0d839cac6027463fc12016f0f94faa2c201901f516489ec9a0ef.exe f4b29519255e0d839cac6027463fc12016f0f94faa2c201901f516489ec9a0ef.exe PID 3504 wrote to memory of 2232 3504 f4b29519255e0d839cac6027463fc12016f0f94faa2c201901f516489ec9a0ef.exe f4b29519255e0d839cac6027463fc12016f0f94faa2c201901f516489ec9a0ef.exe PID 3504 wrote to memory of 3448 3504 f4b29519255e0d839cac6027463fc12016f0f94faa2c201901f516489ec9a0ef.exe f4b29519255e0d839cac6027463fc12016f0f94faa2c201901f516489ec9a0ef.exe PID 3504 wrote to memory of 3448 3504 f4b29519255e0d839cac6027463fc12016f0f94faa2c201901f516489ec9a0ef.exe f4b29519255e0d839cac6027463fc12016f0f94faa2c201901f516489ec9a0ef.exe PID 3504 wrote to memory of 3448 3504 f4b29519255e0d839cac6027463fc12016f0f94faa2c201901f516489ec9a0ef.exe f4b29519255e0d839cac6027463fc12016f0f94faa2c201901f516489ec9a0ef.exe PID 3504 wrote to memory of 1996 3504 f4b29519255e0d839cac6027463fc12016f0f94faa2c201901f516489ec9a0ef.exe f4b29519255e0d839cac6027463fc12016f0f94faa2c201901f516489ec9a0ef.exe PID 3504 wrote to memory of 1996 3504 f4b29519255e0d839cac6027463fc12016f0f94faa2c201901f516489ec9a0ef.exe f4b29519255e0d839cac6027463fc12016f0f94faa2c201901f516489ec9a0ef.exe PID 3504 wrote to memory of 1996 3504 f4b29519255e0d839cac6027463fc12016f0f94faa2c201901f516489ec9a0ef.exe f4b29519255e0d839cac6027463fc12016f0f94faa2c201901f516489ec9a0ef.exe PID 3504 wrote to memory of 1996 3504 f4b29519255e0d839cac6027463fc12016f0f94faa2c201901f516489ec9a0ef.exe f4b29519255e0d839cac6027463fc12016f0f94faa2c201901f516489ec9a0ef.exe PID 3504 wrote to memory of 1996 3504 f4b29519255e0d839cac6027463fc12016f0f94faa2c201901f516489ec9a0ef.exe f4b29519255e0d839cac6027463fc12016f0f94faa2c201901f516489ec9a0ef.exe PID 3504 wrote to memory of 1996 3504 f4b29519255e0d839cac6027463fc12016f0f94faa2c201901f516489ec9a0ef.exe f4b29519255e0d839cac6027463fc12016f0f94faa2c201901f516489ec9a0ef.exe PID 3504 wrote to memory of 1996 3504 f4b29519255e0d839cac6027463fc12016f0f94faa2c201901f516489ec9a0ef.exe f4b29519255e0d839cac6027463fc12016f0f94faa2c201901f516489ec9a0ef.exe PID 3504 wrote to memory of 1996 3504 f4b29519255e0d839cac6027463fc12016f0f94faa2c201901f516489ec9a0ef.exe f4b29519255e0d839cac6027463fc12016f0f94faa2c201901f516489ec9a0ef.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f4b29519255e0d839cac6027463fc12016f0f94faa2c201901f516489ec9a0ef.exe"C:\Users\Admin\AppData\Local\Temp\f4b29519255e0d839cac6027463fc12016f0f94faa2c201901f516489ec9a0ef.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\EvvUebihf" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4CC8.tmp"2⤵
- Creates scheduled task(s)
PID:4408 -
C:\Users\Admin\AppData\Local\Temp\f4b29519255e0d839cac6027463fc12016f0f94faa2c201901f516489ec9a0ef.exe"C:\Users\Admin\AppData\Local\Temp\f4b29519255e0d839cac6027463fc12016f0f94faa2c201901f516489ec9a0ef.exe"2⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\f4b29519255e0d839cac6027463fc12016f0f94faa2c201901f516489ec9a0ef.exe"C:\Users\Admin\AppData\Local\Temp\f4b29519255e0d839cac6027463fc12016f0f94faa2c201901f516489ec9a0ef.exe"2⤵PID:3448
-
C:\Users\Admin\AppData\Local\Temp\f4b29519255e0d839cac6027463fc12016f0f94faa2c201901f516489ec9a0ef.exe"C:\Users\Admin\AppData\Local\Temp\f4b29519255e0d839cac6027463fc12016f0f94faa2c201901f516489ec9a0ef.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1996
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\f4b29519255e0d839cac6027463fc12016f0f94faa2c201901f516489ec9a0ef.exe.logFilesize
1KB
MD517573558c4e714f606f997e5157afaac
SHA113e16e9415ceef429aaf124139671ebeca09ed23
SHA256c18db6aecad2436da4a63ff26af4e3a337cca48f01c21b8db494fe5ccc60e553
SHA512f4edf13f05a0d142e4dd42802098c8c44988ee8869621a62c2b565a77c9a95857f636583ff8d6d9baa366603d98b9bfbf1fc75bc6f9f8f83c80cb1215b2941cc
-
C:\Users\Admin\AppData\Local\Temp\tmp4CC8.tmpFilesize
1KB
MD5814c12f4edda49bf412541e68af10116
SHA18b83022059f904b764edb96923df6d0496999649
SHA2569b5582dc76af3d2b4893bbd8d179fa19be073d66d2699efbf74f6ae6046f887a
SHA512d7e4ab6a6659e4a0043394b27e5ee6594280e4e5017a161b185cdd63634a94c6b5f1b36aab44fc650fb2d4713c038a7685691ee20c4b5594a20a9a1d05c82dee
-
memory/1996-143-0x00000000052A0000-0x0000000005306000-memory.dmpFilesize
408KB
-
memory/1996-141-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/1996-140-0x0000000000000000-mapping.dmp
-
memory/2232-138-0x0000000000000000-mapping.dmp
-
memory/3448-139-0x0000000000000000-mapping.dmp
-
memory/3504-133-0x00000000071A0000-0x0000000007232000-memory.dmpFilesize
584KB
-
memory/3504-135-0x00000000073F0000-0x0000000007446000-memory.dmpFilesize
344KB
-
memory/3504-134-0x00000000070D0000-0x00000000070DA000-memory.dmpFilesize
40KB
-
memory/3504-130-0x0000000000160000-0x000000000025E000-memory.dmpFilesize
1016KB
-
memory/3504-132-0x0000000007750000-0x0000000007CF4000-memory.dmpFilesize
5.6MB
-
memory/3504-131-0x0000000007100000-0x000000000719C000-memory.dmpFilesize
624KB
-
memory/4408-136-0x0000000000000000-mapping.dmp