Analysis
-
max time kernel
111s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
03-05-2022 20:37
Static task
static1
Behavioral task
behavioral1
Sample
74e84e3c4b722fc24d404ff538e64b7d3f686fd162080f2bddd7af51d71b5bad.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
74e84e3c4b722fc24d404ff538e64b7d3f686fd162080f2bddd7af51d71b5bad.exe
Resource
win10v2004-20220414-en
General
-
Target
74e84e3c4b722fc24d404ff538e64b7d3f686fd162080f2bddd7af51d71b5bad.exe
-
Size
598KB
-
MD5
4f4f40bd30268357f26125e00fa13983
-
SHA1
230c64413c230a86db04197100daee8cd492e85c
-
SHA256
74e84e3c4b722fc24d404ff538e64b7d3f686fd162080f2bddd7af51d71b5bad
-
SHA512
ecd1105038b353b3a47de0e5c856939ea2284825aa9c0179c666b850addfc09c4297d3d130b7d618b2d2506558b617f0f4f7a02c6768491819dbe68cee0a641f
Malware Config
Extracted
matiex
Protocol: smtp- Host:
mail.vizvec.com - Port:
26 - Username:
[email protected] - Password:
Domain123@
Signatures
-
Matiex Main Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/804-147-0x0000000000400000-0x0000000000474000-memory.dmp family_matiex -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\qip.exe," reg.exe -
Executes dropped EXE 1 IoCs
Processes:
qip.exepid process 924 qip.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
74e84e3c4b722fc24d404ff538e64b7d3f686fd162080f2bddd7af51d71b5bad.exeqip.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation 74e84e3c4b722fc24d404ff538e64b7d3f686fd162080f2bddd7af51d71b5bad.exe Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation qip.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
AppLaunch.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 69 checkip.dyndns.org 71 freegeoip.app 72 freegeoip.app -
Suspicious use of SetThreadContext 1 IoCs
Processes:
qip.exedescription pid process target process PID 924 set thread context of 804 924 qip.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1096 804 WerFault.exe AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
74e84e3c4b722fc24d404ff538e64b7d3f686fd162080f2bddd7af51d71b5bad.exeqip.exepid process 4588 74e84e3c4b722fc24d404ff538e64b7d3f686fd162080f2bddd7af51d71b5bad.exe 924 qip.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
74e84e3c4b722fc24d404ff538e64b7d3f686fd162080f2bddd7af51d71b5bad.exeqip.exeAppLaunch.exedescription pid process Token: SeDebugPrivilege 4588 74e84e3c4b722fc24d404ff538e64b7d3f686fd162080f2bddd7af51d71b5bad.exe Token: SeDebugPrivilege 924 qip.exe Token: SeDebugPrivilege 804 AppLaunch.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
74e84e3c4b722fc24d404ff538e64b7d3f686fd162080f2bddd7af51d71b5bad.execmd.exeqip.execmd.exedescription pid process target process PID 4588 wrote to memory of 3184 4588 74e84e3c4b722fc24d404ff538e64b7d3f686fd162080f2bddd7af51d71b5bad.exe cmd.exe PID 4588 wrote to memory of 3184 4588 74e84e3c4b722fc24d404ff538e64b7d3f686fd162080f2bddd7af51d71b5bad.exe cmd.exe PID 4588 wrote to memory of 3184 4588 74e84e3c4b722fc24d404ff538e64b7d3f686fd162080f2bddd7af51d71b5bad.exe cmd.exe PID 4588 wrote to memory of 2124 4588 74e84e3c4b722fc24d404ff538e64b7d3f686fd162080f2bddd7af51d71b5bad.exe cmd.exe PID 4588 wrote to memory of 2124 4588 74e84e3c4b722fc24d404ff538e64b7d3f686fd162080f2bddd7af51d71b5bad.exe cmd.exe PID 4588 wrote to memory of 2124 4588 74e84e3c4b722fc24d404ff538e64b7d3f686fd162080f2bddd7af51d71b5bad.exe cmd.exe PID 2124 wrote to memory of 924 2124 cmd.exe qip.exe PID 2124 wrote to memory of 924 2124 cmd.exe qip.exe PID 2124 wrote to memory of 924 2124 cmd.exe qip.exe PID 924 wrote to memory of 3208 924 qip.exe cmd.exe PID 924 wrote to memory of 3208 924 qip.exe cmd.exe PID 924 wrote to memory of 3208 924 qip.exe cmd.exe PID 3208 wrote to memory of 4544 3208 cmd.exe reg.exe PID 3208 wrote to memory of 4544 3208 cmd.exe reg.exe PID 3208 wrote to memory of 4544 3208 cmd.exe reg.exe PID 924 wrote to memory of 804 924 qip.exe AppLaunch.exe PID 924 wrote to memory of 804 924 qip.exe AppLaunch.exe PID 924 wrote to memory of 804 924 qip.exe AppLaunch.exe PID 924 wrote to memory of 804 924 qip.exe AppLaunch.exe PID 924 wrote to memory of 804 924 qip.exe AppLaunch.exe PID 924 wrote to memory of 804 924 qip.exe AppLaunch.exe PID 924 wrote to memory of 804 924 qip.exe AppLaunch.exe PID 924 wrote to memory of 804 924 qip.exe AppLaunch.exe -
outlook_office_path 1 IoCs
Processes:
AppLaunch.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
outlook_win_path 1 IoCs
Processes:
AppLaunch.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\74e84e3c4b722fc24d404ff538e64b7d3f686fd162080f2bddd7af51d71b5bad.exe"C:\Users\Admin\AppData\Local\Temp\74e84e3c4b722fc24d404ff538e64b7d3f686fd162080f2bddd7af51d71b5bad.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\74e84e3c4b722fc24d404ff538e64b7d3f686fd162080f2bddd7af51d71b5bad.exe" "C:\Users\Admin\AppData\Roaming\qip.exe"2⤵PID:3184
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\AppData\Roaming\qip.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Roaming\qip.exe"C:\Users\Admin\AppData\Roaming\qip.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\qip.exe,"4⤵
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\qip.exe,"5⤵
- Modifies WinLogon for persistence
PID:4544
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:804 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 804 -s 19885⤵
- Program crash
PID:1096
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 804 -ip 8041⤵PID:3912
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
598KB
MD54f4f40bd30268357f26125e00fa13983
SHA1230c64413c230a86db04197100daee8cd492e85c
SHA25674e84e3c4b722fc24d404ff538e64b7d3f686fd162080f2bddd7af51d71b5bad
SHA512ecd1105038b353b3a47de0e5c856939ea2284825aa9c0179c666b850addfc09c4297d3d130b7d618b2d2506558b617f0f4f7a02c6768491819dbe68cee0a641f
-
Filesize
598KB
MD54f4f40bd30268357f26125e00fa13983
SHA1230c64413c230a86db04197100daee8cd492e85c
SHA25674e84e3c4b722fc24d404ff538e64b7d3f686fd162080f2bddd7af51d71b5bad
SHA512ecd1105038b353b3a47de0e5c856939ea2284825aa9c0179c666b850addfc09c4297d3d130b7d618b2d2506558b617f0f4f7a02c6768491819dbe68cee0a641f