Analysis

  • max time kernel
    85s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    02-05-2022 21:31

General

  • Target

    Quotation 7339.exe

  • Size

    3.6MB

  • MD5

    830dcd49c9b23bf35d7d8bc6caf099a8

  • SHA1

    8faecce6b954965528969fc946e7650865dbd763

  • SHA256

    0ee6256edbcb97ace761a15d86ce3e3adc080364f752473dd941339060a4e4b2

  • SHA512

    d7f7ac208933fb7a7aa65524bc4c37c983b7b01e1b1b112f0b83749b9bbc915d1678add8fcce77279a8859c496d690a879a84d525f9e987170479566ba8d8ea5

Malware Config

Extracted

Family

matiex

Credentials

  • Protocol:
    smtp
  • Host:
    srvc13.turhost.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    italik2015

Signatures

  • Matiex

    Matiex is a keylogger and infostealer first seen in July 2020.

  • Matiex Main Payload 6 IoCs
  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops startup file 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Quotation 7339.exe
    "C:\Users\Admin\AppData\Local\Temp\Quotation 7339.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1292
    • C:\Users\Admin\AppData\Local\Temp\Quotation 7339.exe
      "C:\Users\Admin\AppData\Local\Temp\Quotation 7339.exe"
      2⤵
        PID:1584
      • C:\Users\Admin\AppData\Local\Temp\Quotation 7339.exe
        "C:\Users\Admin\AppData\Local\Temp\Quotation 7339.exe"
        2⤵
          PID:1780
        • C:\Users\Admin\AppData\Local\Temp\Quotation 7339.exe
          "C:\Users\Admin\AppData\Local\Temp\Quotation 7339.exe"
          2⤵
          • Accesses Microsoft Outlook profiles
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • outlook_office_path
          • outlook_win_path
          PID:1540
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1540 -s 1792
            3⤵
            • Program crash
            PID:1708

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Winlogon Helper DLL

      1
      T1004

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      2
      T1112

      Credential Access

      Credentials in Files

      2
      T1081

      Collection

      Data from Local System

      2
      T1005

      Email Collection

      1
      T1114

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1292-54-0x0000000000A10000-0x0000000000DA2000-memory.dmp
        Filesize

        3.6MB

      • memory/1292-55-0x0000000000440000-0x00000000004C8000-memory.dmp
        Filesize

        544KB

      • memory/1540-56-0x0000000000400000-0x0000000000476000-memory.dmp
        Filesize

        472KB

      • memory/1540-57-0x0000000000400000-0x0000000000476000-memory.dmp
        Filesize

        472KB

      • memory/1540-59-0x0000000000400000-0x0000000000476000-memory.dmp
        Filesize

        472KB

      • memory/1540-60-0x0000000000400000-0x0000000000476000-memory.dmp
        Filesize

        472KB

      • memory/1540-61-0x0000000000400000-0x0000000000476000-memory.dmp
        Filesize

        472KB

      • memory/1540-62-0x000000000047023E-mapping.dmp
      • memory/1540-64-0x0000000000400000-0x0000000000476000-memory.dmp
        Filesize

        472KB

      • memory/1540-66-0x0000000000400000-0x0000000000476000-memory.dmp
        Filesize

        472KB

      • memory/1540-67-0x0000000075721000-0x0000000075723000-memory.dmp
        Filesize

        8KB

      • memory/1708-68-0x0000000000000000-mapping.dmp