Analysis
-
max time kernel
103s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 10:29
Static task
static1
Behavioral task
behavioral1
Sample
Payment receipt.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Payment receipt.exe
Resource
win10v2004-20220414-en
General
-
Target
Payment receipt.exe
-
Size
128KB
-
MD5
497856229ec8ae87bda86469bf72ef64
-
SHA1
844329ce2db6a3a6929719f27766474f77c7d047
-
SHA256
b8888ca416fcb0b2fa48e131a3fbadf177ed9f26528d620ff1df804f17ea8c64
-
SHA512
6cadd85b8a3cdb42b202ff45d198b1ef7b73d1ba4a3d612066be3ee95999d49d46b699f6d073bb143cdd8b3f4d89144c3528b3ad7f788f74abeed846945e932f
Malware Config
Extracted
matiex
Protocol: smtp- Host:
SMTP.privateemail.com - Port:
587 - Username:
[email protected] - Password:
Aboki@1234
Signatures
-
Matiex Main Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3308-134-0x0000000000400000-0x0000000000470000-memory.dmp family_matiex -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
Payment receipt.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Payment receipt.exe\"" Payment receipt.exe -
Drops startup file 2 IoCs
Processes:
Payment receipt.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Payment receipt.exe Payment receipt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Payment receipt.exe Payment receipt.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
Payment receipt.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Payment receipt.exe Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Payment receipt.exe Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Payment receipt.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Payment receipt.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Payment receipt.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Payment receipt.exe" Payment receipt.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 13 checkip.dyndns.org 15 freegeoip.app -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Payment receipt.exedescription pid process target process PID 1092 set thread context of 3308 1092 Payment receipt.exe Payment receipt.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 772 3308 WerFault.exe Payment receipt.exe -
Suspicious behavior: EnumeratesProcesses 50 IoCs
Processes:
Payment receipt.exepid process 1092 Payment receipt.exe 1092 Payment receipt.exe 1092 Payment receipt.exe 1092 Payment receipt.exe 1092 Payment receipt.exe 1092 Payment receipt.exe 1092 Payment receipt.exe 1092 Payment receipt.exe 1092 Payment receipt.exe 1092 Payment receipt.exe 1092 Payment receipt.exe 1092 Payment receipt.exe 1092 Payment receipt.exe 1092 Payment receipt.exe 1092 Payment receipt.exe 1092 Payment receipt.exe 1092 Payment receipt.exe 1092 Payment receipt.exe 1092 Payment receipt.exe 1092 Payment receipt.exe 1092 Payment receipt.exe 1092 Payment receipt.exe 1092 Payment receipt.exe 1092 Payment receipt.exe 1092 Payment receipt.exe 1092 Payment receipt.exe 1092 Payment receipt.exe 1092 Payment receipt.exe 1092 Payment receipt.exe 1092 Payment receipt.exe 1092 Payment receipt.exe 1092 Payment receipt.exe 1092 Payment receipt.exe 1092 Payment receipt.exe 1092 Payment receipt.exe 1092 Payment receipt.exe 1092 Payment receipt.exe 1092 Payment receipt.exe 1092 Payment receipt.exe 1092 Payment receipt.exe 1092 Payment receipt.exe 1092 Payment receipt.exe 1092 Payment receipt.exe 1092 Payment receipt.exe 1092 Payment receipt.exe 1092 Payment receipt.exe 1092 Payment receipt.exe 1092 Payment receipt.exe 1092 Payment receipt.exe 1092 Payment receipt.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Payment receipt.exePayment receipt.exedescription pid process Token: SeDebugPrivilege 1092 Payment receipt.exe Token: SeDebugPrivilege 3308 Payment receipt.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
Payment receipt.exedescription pid process target process PID 1092 wrote to memory of 3308 1092 Payment receipt.exe Payment receipt.exe PID 1092 wrote to memory of 3308 1092 Payment receipt.exe Payment receipt.exe PID 1092 wrote to memory of 3308 1092 Payment receipt.exe Payment receipt.exe PID 1092 wrote to memory of 3308 1092 Payment receipt.exe Payment receipt.exe PID 1092 wrote to memory of 3308 1092 Payment receipt.exe Payment receipt.exe PID 1092 wrote to memory of 3308 1092 Payment receipt.exe Payment receipt.exe PID 1092 wrote to memory of 3308 1092 Payment receipt.exe Payment receipt.exe PID 1092 wrote to memory of 3308 1092 Payment receipt.exe Payment receipt.exe -
outlook_office_path 1 IoCs
Processes:
Payment receipt.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Payment receipt.exe -
outlook_win_path 1 IoCs
Processes:
Payment receipt.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Payment receipt.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payment receipt.exe"C:\Users\Admin\AppData\Local\Temp\Payment receipt.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\Payment receipt.exe"C:\Users\Admin\AppData\Local\Temp\Payment receipt.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:3308 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3308 -s 17163⤵
- Program crash
PID:772
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3308 -ip 33081⤵PID:980