Analysis
-
max time kernel
192s -
max time network
198s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
03-05-2022 20:18
Static task
static1
Behavioral task
behavioral1
Sample
8980000809000.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
8980000809000.exe
-
Size
619KB
-
MD5
e04d66f39776231b5b159a053a2b114a
-
SHA1
c9294ca3bb3401882d1af4d740726deda066e091
-
SHA256
fbcf45a88ba1f036c2e124ec1939b8e94ffcee01e56e736553938ff4ba5a0dee
-
SHA512
f965db86ca20748afaafd197ea9c14ed9ad13bad76c33b9300cb81b1db95307421ddb17048550ef118457e9dfd96d2acb93c426447c36c361bed321fbef11c28
Malware Config
Extracted
Family
matiex
C2
https://api.telegram.org/bot1395392888:AAFrJovDdZICOFB0gX0eGWrAUzEKCRpv8xo/sendMessage?chat_id=1300181783
Signatures
-
Matiex Main Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2748-132-0x0000000000400000-0x0000000000476000-memory.dmp family_matiex -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 39 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
8980000809000.exedescription pid process target process PID 4172 set thread context of 2748 4172 8980000809000.exe MSBuild.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
8980000809000.exepid process 4172 8980000809000.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
MSBuild.exedescription pid process Token: SeDebugPrivilege 2748 MSBuild.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
8980000809000.exedescription pid process target process PID 4172 wrote to memory of 2748 4172 8980000809000.exe MSBuild.exe PID 4172 wrote to memory of 2748 4172 8980000809000.exe MSBuild.exe PID 4172 wrote to memory of 2748 4172 8980000809000.exe MSBuild.exe PID 4172 wrote to memory of 2748 4172 8980000809000.exe MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8980000809000.exe"C:\Users\Admin\AppData\Local\Temp\8980000809000.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2748
-