Analysis

  • max time kernel
    192s
  • max time network
    198s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    03-05-2022 20:18

General

  • Target

    8980000809000.exe

  • Size

    619KB

  • MD5

    e04d66f39776231b5b159a053a2b114a

  • SHA1

    c9294ca3bb3401882d1af4d740726deda066e091

  • SHA256

    fbcf45a88ba1f036c2e124ec1939b8e94ffcee01e56e736553938ff4ba5a0dee

  • SHA512

    f965db86ca20748afaafd197ea9c14ed9ad13bad76c33b9300cb81b1db95307421ddb17048550ef118457e9dfd96d2acb93c426447c36c361bed321fbef11c28

Malware Config

Extracted

Family

matiex

C2

https://api.telegram.org/bot1395392888:AAFrJovDdZICOFB0gX0eGWrAUzEKCRpv8xo/sendMessage?chat_id=1300181783

Signatures

  • Matiex

    Matiex is a keylogger and infostealer first seen in July 2020.

  • Matiex Main Payload 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8980000809000.exe
    "C:\Users\Admin\AppData\Local\Temp\8980000809000.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:4172
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2748

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2748-131-0x0000000000000000-mapping.dmp

  • memory/2748-132-0x0000000000400000-0x0000000000476000-memory.dmp

    Filesize

    472KB

  • memory/2748-133-0x0000000004FC0000-0x000000000505C000-memory.dmp

    Filesize

    624KB

  • memory/2748-134-0x0000000005060000-0x00000000050C6000-memory.dmp

    Filesize

    408KB

  • memory/2748-135-0x0000000006070000-0x0000000006614000-memory.dmp

    Filesize

    5.6MB

  • memory/4172-130-0x0000000000B80000-0x0000000000BB2000-memory.dmp

    Filesize

    200KB