Analysis

  • max time kernel
    181s
  • max time network
    200s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    21-05-2022 01:28

General

  • Target

    T.HALK BANKASI A.S. 31..07.2020 - 04.08.2020 Hesap Ekstresi.exe

  • Size

    1023KB

  • MD5

    e1f4f160517e085442d10fc35b0dfb23

  • SHA1

    bf32b3506630ee1865961febbd44ac6c8581e549

  • SHA256

    d1f8714f2ba5d192baddc1b4e254b49b538c8527419d2250b4d33730629d148e

  • SHA512

    a2843f01d9ff2f050b1b362122a9bdf822ce53396ba416ed057c7ae848f5a143d6f36c9cb6d8418b00ce751518aa41b1429fd46fdcb618ae195d3c935d724809

Malware Config

Extracted

Family

matiex

Credentials

  • Protocol:
    smtp
  • Host:
    srvc13.turhost.com
  • Port:
    587
  • Username:
    info@bilgitekdagitim.com
  • Password:
    italik2015

Signatures

  • Matiex

    Matiex is a keylogger and infostealer first seen in July 2020.

  • Matiex Main Payload 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\T.HALK BANKASI A.S. 31..07.2020 - 04.08.2020 Hesap Ekstresi.exe
    "C:\Users\Admin\AppData\Local\Temp\T.HALK BANKASI A.S. 31..07.2020 - 04.08.2020 Hesap Ekstresi.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1860
    • C:\Users\Admin\AppData\Local\Temp\T.HALK BANKASI A.S. 31..07.2020 - 04.08.2020 Hesap Ekstresi.exe
      "C:\Users\Admin\AppData\Local\Temp\T.HALK BANKASI A.S. 31..07.2020 - 04.08.2020 Hesap Ekstresi.exe"
      2⤵
      • Accesses Microsoft Outlook profiles
      • Suspicious use of AdjustPrivilegeToken
      • outlook_office_path
      • outlook_win_path
      PID:1748
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1748 -s 2020
        3⤵
        • Program crash
        PID:1764
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1748 -ip 1748
    1⤵
      PID:3628

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Credential Access

    Credentials in Files

    2
    T1081

    Collection

    Data from Local System

    2
    T1005

    Email Collection

    1
    T1114

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1748-136-0x0000000000000000-mapping.dmp
    • memory/1748-137-0x0000000000400000-0x0000000000472000-memory.dmp
      Filesize

      456KB

    • memory/1748-138-0x00000000054A0000-0x0000000005506000-memory.dmp
      Filesize

      408KB

    • memory/1860-130-0x0000000000D50000-0x0000000000E56000-memory.dmp
      Filesize

      1.0MB

    • memory/1860-131-0x0000000005790000-0x000000000582C000-memory.dmp
      Filesize

      624KB

    • memory/1860-132-0x0000000005E50000-0x00000000063F4000-memory.dmp
      Filesize

      5.6MB

    • memory/1860-133-0x0000000005940000-0x00000000059D2000-memory.dmp
      Filesize

      584KB

    • memory/1860-134-0x0000000005880000-0x000000000588A000-memory.dmp
      Filesize

      40KB

    • memory/1860-135-0x00000000059E0000-0x0000000005A36000-memory.dmp
      Filesize

      344KB