Analysis

  • max time kernel
    150s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    03-05-2022 20:44

General

  • Target

    gsxp5mkd0ACsDub.exe

  • Size

    949KB

  • MD5

    ac9577cdc33e7cf5cd3193d9a02b5ee6

  • SHA1

    3ca264ffe003d0a1c3b196169ed5cf672b3b1794

  • SHA256

    e1f6a0b698c957d92bc86fdaf9add81405fc26c716f691fb34148485a93de97c

  • SHA512

    0f9b55ff971e618a53f2366f2a2dc7236ef513dffd561e0e0eb97c3166a738ae754ad9ea83e9d8803639c91f8bc8b90a843ca1a6fb854c7b8b978e88edb3e54a

Malware Config

Extracted

Family

matiex

C2

https://api.telegram.org/bot1395392888:AAFrJovDdZICOFB0gX0eGWrAUzEKCRpv8xo/sendMessage?chat_id=1300181783

Signatures

  • Matiex

    Matiex is a keylogger and infostealer first seen in July 2020.

  • Matiex Main Payload 1 IoCs
  • Looks for VirtualBox Guest Additions in registry 2 TTPs
  • Looks for VMWare Tools registry key 2 TTPs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\gsxp5mkd0ACsDub.exe
    "C:\Users\Admin\AppData\Local\Temp\gsxp5mkd0ACsDub.exe"
    1⤵
    • Checks BIOS information in registry
    • Maps connected drives based on registry
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2300
    • C:\Users\Admin\AppData\Local\Temp\gsxp5mkd0ACsDub.exe
      "{path}"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:5028

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\gsxp5mkd0ACsDub.exe.log
    Filesize

    1KB

    MD5

    e08f822522c617a40840c62e4b0fb45e

    SHA1

    ae516dca4da5234be6676d3f234c19ec55725be7

    SHA256

    bd9d5e9f7fe6fcff17d873555d4077d15f7d6cdda1183e7f7d278b735ffe1fd7

    SHA512

    894a7fb7bbc18ac6ba13378f58a7db80ad00d6080be9a66b01cae8e23e41d9d2d4cd53c1e20669356b73590c8a3ebfda4bdda3258f81240db56c4a81b7313fe4

  • memory/2300-130-0x0000000000260000-0x0000000000354000-memory.dmp
    Filesize

    976KB

  • memory/2300-131-0x0000000005240000-0x00000000057E4000-memory.dmp
    Filesize

    5.6MB

  • memory/2300-132-0x0000000004FB0000-0x0000000005042000-memory.dmp
    Filesize

    584KB

  • memory/2300-133-0x0000000005050000-0x000000000505A000-memory.dmp
    Filesize

    40KB

  • memory/2300-134-0x0000000005890000-0x000000000592C000-memory.dmp
    Filesize

    624KB

  • memory/2300-135-0x0000000007690000-0x00000000076F6000-memory.dmp
    Filesize

    408KB

  • memory/5028-137-0x0000000000400000-0x0000000000476000-memory.dmp
    Filesize

    472KB

  • memory/5028-136-0x0000000000000000-mapping.dmp