Analysis

  • max time kernel
    149s
  • max time network
    171s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    12-05-2022 15:48

General

  • Target

    f9bf4cfd9b01450f92f9b0e1e329fdf4b31b234f60607b626a258aa6cbf40782.exe

  • Size

    579KB

  • MD5

    f9061b35c7ed637323aac46c5d15d002

  • SHA1

    797b13720bbc9ae30134fb421941e02ba73d7bd4

  • SHA256

    f9bf4cfd9b01450f92f9b0e1e329fdf4b31b234f60607b626a258aa6cbf40782

  • SHA512

    da07e25ae000328dce3ae94e1e8ef7737813767975d400bfceabcc0fb63c75582b274cc07724295e1ff675d9f69c69885946dc276ebd4c8554b4819ce54f2408

Malware Config

Extracted

Family

matiex

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.porkbun.com
  • Port:
    587
  • Username:
    info@wholesalesltd.xyz
  • Password:
    godisable147

Signatures

  • Matiex

    Matiex is a keylogger and infostealer first seen in July 2020.

  • Matiex Main Payload 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f9bf4cfd9b01450f92f9b0e1e329fdf4b31b234f60607b626a258aa6cbf40782.exe
    "C:\Users\Admin\AppData\Local\Temp\f9bf4cfd9b01450f92f9b0e1e329fdf4b31b234f60607b626a258aa6cbf40782.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4352
    • C:\Users\Admin\AppData\Local\Temp\tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
      2⤵
      • Executes dropped EXE
      • Accesses Microsoft Outlook profiles
      • Suspicious use of AdjustPrivilegeToken
      PID:4356
    • C:\Users\Admin\AppData\Local\Temp\svhost.exe
      "C:\Users\Admin\AppData\Local\Temp\svhost.exe"
      2⤵
      • Executes dropped EXE
      • Accesses Microsoft Outlook profiles
      • Suspicious use of AdjustPrivilegeToken
      • outlook_office_path
      • outlook_win_path
      PID:4720
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c copy "C:/Users/Admin/AppData/Local/Temp/f9bf4cfd9b01450f92f9b0e1e329fdf4b31b234f60607b626a258aa6cbf40782.exe" "%temp%\FolderN\name.exe" /Y
      2⤵
        PID:2296
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "%temp%\FolderN\name.exe.lnk" /f
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2316
        • C:\Windows\SysWOW64\reg.exe
          reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe.lnk" /f
          3⤵
            PID:3696
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c echo [zoneTransfer]ZoneID = 2 > %temp%\FolderN\name.exe:Zone.Identifier
          2⤵
          • NTFS ADS
          PID:2476

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      System Information Discovery

      2
      T1082

      Collection

      Data from Local System

      2
      T1005

      Email Collection

      1
      T1114

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe
        Filesize

        579KB

        MD5

        f9061b35c7ed637323aac46c5d15d002

        SHA1

        797b13720bbc9ae30134fb421941e02ba73d7bd4

        SHA256

        f9bf4cfd9b01450f92f9b0e1e329fdf4b31b234f60607b626a258aa6cbf40782

        SHA512

        da07e25ae000328dce3ae94e1e8ef7737813767975d400bfceabcc0fb63c75582b274cc07724295e1ff675d9f69c69885946dc276ebd4c8554b4819ce54f2408

      • C:\Users\Admin\AppData\Local\Temp\svhost.exe
        Filesize

        256KB

        MD5

        8fdf47e0ff70c40ed3a17014aeea4232

        SHA1

        e6256a0159688f0560b015da4d967f41cbf8c9bd

        SHA256

        ed9884bac608c06b7057037cc91d90e4ae5f74dd2dbce2af476699c6d4492d82

        SHA512

        bd69d092ed4f9c5e1f24eaf5ec79fb316469d53849dc798fae0fcba5e90869b77ee924c23cc6f692198ff25827ab60ad47bb46cadd6e0aadde7731cbafb013be

      • C:\Users\Admin\AppData\Local\Temp\svhost.exe
        Filesize

        256KB

        MD5

        8fdf47e0ff70c40ed3a17014aeea4232

        SHA1

        e6256a0159688f0560b015da4d967f41cbf8c9bd

        SHA256

        ed9884bac608c06b7057037cc91d90e4ae5f74dd2dbce2af476699c6d4492d82

        SHA512

        bd69d092ed4f9c5e1f24eaf5ec79fb316469d53849dc798fae0fcba5e90869b77ee924c23cc6f692198ff25827ab60ad47bb46cadd6e0aadde7731cbafb013be

      • C:\Users\Admin\AppData\Local\Temp\tmp.exe
        Filesize

        425KB

        MD5

        34e884a790a7ef67f7c61108e2b9a177

        SHA1

        6ad5021f86a6d361a9771001a506ff8b8bf1930a

        SHA256

        5f1ce1d8e909e4fc999dd5a1fea71103cff35e075750117c8d9e3ec5045f09f0

        SHA512

        79e5fcd411321f1b09b67cc36a2dbeaf88731bd1ebf41cf53d21ed4d7f476b7193c40c33dcc652d707240ec45818b730732465c2a4a329c8ea7dd4d020aea2e8

      • C:\Users\Admin\AppData\Local\Temp\tmp.exe
        Filesize

        425KB

        MD5

        34e884a790a7ef67f7c61108e2b9a177

        SHA1

        6ad5021f86a6d361a9771001a506ff8b8bf1930a

        SHA256

        5f1ce1d8e909e4fc999dd5a1fea71103cff35e075750117c8d9e3ec5045f09f0

        SHA512

        79e5fcd411321f1b09b67cc36a2dbeaf88731bd1ebf41cf53d21ed4d7f476b7193c40c33dcc652d707240ec45818b730732465c2a4a329c8ea7dd4d020aea2e8

      • memory/2296-143-0x0000000000000000-mapping.dmp
      • memory/2316-144-0x0000000000000000-mapping.dmp
      • memory/2476-147-0x0000000000000000-mapping.dmp
      • memory/3696-145-0x0000000000000000-mapping.dmp
      • memory/4352-130-0x00000000006A0000-0x0000000000736000-memory.dmp
        Filesize

        600KB

      • memory/4352-133-0x00000000051E0000-0x0000000005272000-memory.dmp
        Filesize

        584KB

      • memory/4352-132-0x0000000005880000-0x0000000005E24000-memory.dmp
        Filesize

        5.6MB

      • memory/4352-131-0x00000000050A0000-0x000000000513C000-memory.dmp
        Filesize

        624KB

      • memory/4356-134-0x0000000000000000-mapping.dmp
      • memory/4356-138-0x0000000004C30000-0x0000000004C96000-memory.dmp
        Filesize

        408KB

      • memory/4356-137-0x0000000000160000-0x00000000001D0000-memory.dmp
        Filesize

        448KB

      • memory/4356-148-0x0000000006350000-0x0000000006512000-memory.dmp
        Filesize

        1.8MB

      • memory/4356-149-0x0000000006210000-0x000000000621A000-memory.dmp
        Filesize

        40KB

      • memory/4720-139-0x0000000000000000-mapping.dmp