Analysis

  • max time kernel
    168s
  • max time network
    176s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    08-05-2022 06:32

General

  • Target

    7ab64e35c5907423159e5257e38154b671c88b9b96808ae73c8dff6b9ae9ed63.exe

  • Size

    187KB

  • MD5

    3f6af7853bb4ccf152c7034aa908fa71

  • SHA1

    698a08dc0ae407391b20b304f49e09bfd29c4193

  • SHA256

    7ab64e35c5907423159e5257e38154b671c88b9b96808ae73c8dff6b9ae9ed63

  • SHA512

    2cfc51f46c0e97d1b28f9762fb7843c5bcbab8f01fadbc19c0760dea12391c95f6f7874ff29732bbaeec6eca251c15941d6e19152dcae024dec19d1d4675ec26

Malware Config

Extracted

Family

matiex

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Goodness123x

Signatures

  • Matiex

    Matiex is a keylogger and infostealer first seen in July 2020.

  • Matiex Main Payload 7 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7ab64e35c5907423159e5257e38154b671c88b9b96808ae73c8dff6b9ae9ed63.exe
    "C:\Users\Admin\AppData\Local\Temp\7ab64e35c5907423159e5257e38154b671c88b9b96808ae73c8dff6b9ae9ed63.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1876
    • C:\Users\Admin\AppData\Local\Temp\ab.exe
      "C:\Users\Admin\AppData\Local\Temp\ab.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of AdjustPrivilegeToken
      PID:1320
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
    1⤵
    • Suspicious use of FindShellTrayWindow
    PID:1756

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ab.exe
    Filesize

    454KB

    MD5

    c3708a21241b7b529452b90d104e2cbf

    SHA1

    b97239286634751f45fa86cc357690480b2215f8

    SHA256

    f1da6dd79e65bc2ce30541256889af3f8916345debc3b1c4dfef918837d33f08

    SHA512

    a7e757f3170ea73b1db42748cc76d5012b248ec6b3a44da7c59293878600bbece5f890a291b8d3385ee40d99e45e83255dbb43cb21d8b9dae382ea79a232e497

  • C:\Users\Admin\AppData\Local\Temp\ab.exe
    Filesize

    454KB

    MD5

    c3708a21241b7b529452b90d104e2cbf

    SHA1

    b97239286634751f45fa86cc357690480b2215f8

    SHA256

    f1da6dd79e65bc2ce30541256889af3f8916345debc3b1c4dfef918837d33f08

    SHA512

    a7e757f3170ea73b1db42748cc76d5012b248ec6b3a44da7c59293878600bbece5f890a291b8d3385ee40d99e45e83255dbb43cb21d8b9dae382ea79a232e497

  • C:\Users\Admin\AppData\Local\Temp\pic.jpg
    Filesize

    766B

    MD5

    dcec80e653decab1b30a7d3f18eddf74

    SHA1

    2545818359c1c97f5fa0103462956ff2c3d569b4

    SHA256

    2579763cf6a501f2e4d3fff981cb7531b934f76ae7e479703fd0fd80f3906afb

    SHA512

    3330c807c99729b870ba0f9058d3c23a3dc8411bc5085f8a144a5959f7125c396f4e6b30ed5af2430d2c5bdfcc4ec3c8099b108ee7830931fa43c4387b78397b

  • \Users\Admin\AppData\Local\Temp\ab.exe
    Filesize

    454KB

    MD5

    c3708a21241b7b529452b90d104e2cbf

    SHA1

    b97239286634751f45fa86cc357690480b2215f8

    SHA256

    f1da6dd79e65bc2ce30541256889af3f8916345debc3b1c4dfef918837d33f08

    SHA512

    a7e757f3170ea73b1db42748cc76d5012b248ec6b3a44da7c59293878600bbece5f890a291b8d3385ee40d99e45e83255dbb43cb21d8b9dae382ea79a232e497

  • \Users\Admin\AppData\Local\Temp\ab.exe
    Filesize

    454KB

    MD5

    c3708a21241b7b529452b90d104e2cbf

    SHA1

    b97239286634751f45fa86cc357690480b2215f8

    SHA256

    f1da6dd79e65bc2ce30541256889af3f8916345debc3b1c4dfef918837d33f08

    SHA512

    a7e757f3170ea73b1db42748cc76d5012b248ec6b3a44da7c59293878600bbece5f890a291b8d3385ee40d99e45e83255dbb43cb21d8b9dae382ea79a232e497

  • \Users\Admin\AppData\Local\Temp\ab.exe
    Filesize

    454KB

    MD5

    c3708a21241b7b529452b90d104e2cbf

    SHA1

    b97239286634751f45fa86cc357690480b2215f8

    SHA256

    f1da6dd79e65bc2ce30541256889af3f8916345debc3b1c4dfef918837d33f08

    SHA512

    a7e757f3170ea73b1db42748cc76d5012b248ec6b3a44da7c59293878600bbece5f890a291b8d3385ee40d99e45e83255dbb43cb21d8b9dae382ea79a232e497

  • \Users\Admin\AppData\Local\Temp\ab.exe
    Filesize

    454KB

    MD5

    c3708a21241b7b529452b90d104e2cbf

    SHA1

    b97239286634751f45fa86cc357690480b2215f8

    SHA256

    f1da6dd79e65bc2ce30541256889af3f8916345debc3b1c4dfef918837d33f08

    SHA512

    a7e757f3170ea73b1db42748cc76d5012b248ec6b3a44da7c59293878600bbece5f890a291b8d3385ee40d99e45e83255dbb43cb21d8b9dae382ea79a232e497

  • memory/1320-60-0x0000000000000000-mapping.dmp
  • memory/1320-64-0x0000000000840000-0x00000000008B8000-memory.dmp
    Filesize

    480KB

  • memory/1876-54-0x00000000763E1000-0x00000000763E3000-memory.dmp
    Filesize

    8KB