Analysis
-
max time kernel
169s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
14-06-2022 19:28
Static task
static1
Behavioral task
behavioral1
Sample
2d6bdc4526934ff8ba05addc48061c18b6b4153f0d164f3a9fc88bcb63957334.exe
Resource
win7-20220414-en
General
-
Target
2d6bdc4526934ff8ba05addc48061c18b6b4153f0d164f3a9fc88bcb63957334.exe
-
Size
1.1MB
-
MD5
ef749ac5b73c61943d9447890bcb1ca6
-
SHA1
cf2336e5a6d51ee51c443c758c4dc1ce833dee85
-
SHA256
2d6bdc4526934ff8ba05addc48061c18b6b4153f0d164f3a9fc88bcb63957334
-
SHA512
ecaccbc11f257e81c4261b1397162b9ab6374eba2f1503183a554c6b71b1aa0cc56d948850fba234d9eafa981a2b27ac75e0eb157be720e9b0ec1cdab44f130e
Malware Config
Extracted
matiex
Protocol: smtp- Host:
mail.gschofield.com - Port:
587 - Username:
gschofield@gschofield.com - Password:
gaston1955 - Email To:
managerjames001@outlook.com
Signatures
-
Matiex Main Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2044-139-0x0000000000400000-0x0000000000476000-memory.dmp family_matiex -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
2d6bdc4526934ff8ba05addc48061c18b6b4153f0d164f3a9fc88bcb63957334.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation 2d6bdc4526934ff8ba05addc48061c18b6b4153f0d164f3a9fc88bcb63957334.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 34 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
2d6bdc4526934ff8ba05addc48061c18b6b4153f0d164f3a9fc88bcb63957334.exedescription pid process target process PID 968 set thread context of 2044 968 2d6bdc4526934ff8ba05addc48061c18b6b4153f0d164f3a9fc88bcb63957334.exe 2d6bdc4526934ff8ba05addc48061c18b6b4153f0d164f3a9fc88bcb63957334.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
2d6bdc4526934ff8ba05addc48061c18b6b4153f0d164f3a9fc88bcb63957334.exedescription pid process Token: SeDebugPrivilege 2044 2d6bdc4526934ff8ba05addc48061c18b6b4153f0d164f3a9fc88bcb63957334.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
2d6bdc4526934ff8ba05addc48061c18b6b4153f0d164f3a9fc88bcb63957334.exedescription pid process target process PID 968 wrote to memory of 4116 968 2d6bdc4526934ff8ba05addc48061c18b6b4153f0d164f3a9fc88bcb63957334.exe schtasks.exe PID 968 wrote to memory of 4116 968 2d6bdc4526934ff8ba05addc48061c18b6b4153f0d164f3a9fc88bcb63957334.exe schtasks.exe PID 968 wrote to memory of 4116 968 2d6bdc4526934ff8ba05addc48061c18b6b4153f0d164f3a9fc88bcb63957334.exe schtasks.exe PID 968 wrote to memory of 2044 968 2d6bdc4526934ff8ba05addc48061c18b6b4153f0d164f3a9fc88bcb63957334.exe 2d6bdc4526934ff8ba05addc48061c18b6b4153f0d164f3a9fc88bcb63957334.exe PID 968 wrote to memory of 2044 968 2d6bdc4526934ff8ba05addc48061c18b6b4153f0d164f3a9fc88bcb63957334.exe 2d6bdc4526934ff8ba05addc48061c18b6b4153f0d164f3a9fc88bcb63957334.exe PID 968 wrote to memory of 2044 968 2d6bdc4526934ff8ba05addc48061c18b6b4153f0d164f3a9fc88bcb63957334.exe 2d6bdc4526934ff8ba05addc48061c18b6b4153f0d164f3a9fc88bcb63957334.exe PID 968 wrote to memory of 2044 968 2d6bdc4526934ff8ba05addc48061c18b6b4153f0d164f3a9fc88bcb63957334.exe 2d6bdc4526934ff8ba05addc48061c18b6b4153f0d164f3a9fc88bcb63957334.exe PID 968 wrote to memory of 2044 968 2d6bdc4526934ff8ba05addc48061c18b6b4153f0d164f3a9fc88bcb63957334.exe 2d6bdc4526934ff8ba05addc48061c18b6b4153f0d164f3a9fc88bcb63957334.exe PID 968 wrote to memory of 2044 968 2d6bdc4526934ff8ba05addc48061c18b6b4153f0d164f3a9fc88bcb63957334.exe 2d6bdc4526934ff8ba05addc48061c18b6b4153f0d164f3a9fc88bcb63957334.exe PID 968 wrote to memory of 2044 968 2d6bdc4526934ff8ba05addc48061c18b6b4153f0d164f3a9fc88bcb63957334.exe 2d6bdc4526934ff8ba05addc48061c18b6b4153f0d164f3a9fc88bcb63957334.exe PID 968 wrote to memory of 2044 968 2d6bdc4526934ff8ba05addc48061c18b6b4153f0d164f3a9fc88bcb63957334.exe 2d6bdc4526934ff8ba05addc48061c18b6b4153f0d164f3a9fc88bcb63957334.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d6bdc4526934ff8ba05addc48061c18b6b4153f0d164f3a9fc88bcb63957334.exe"C:\Users\Admin\AppData\Local\Temp\2d6bdc4526934ff8ba05addc48061c18b6b4153f0d164f3a9fc88bcb63957334.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HvIsqP" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9EE.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\2d6bdc4526934ff8ba05addc48061c18b6b4153f0d164f3a9fc88bcb63957334.exe"C:\Users\Admin\AppData\Local\Temp\2d6bdc4526934ff8ba05addc48061c18b6b4153f0d164f3a9fc88bcb63957334.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp9EE.tmpFilesize
1KB
MD58e58de273b5bc03e2236bd7ca519f396
SHA186c3df481b2565a011dd6cee79f377dfff4fa199
SHA2560181513a460d178c4d89bd8cb5a8f45e274f5b1ba6575ddc92492a3da54ef40e
SHA5129ecca7732a76a3fb910143afde19c4c9e578c31b74b67614c90eebd105bbf4060825603a3f5b8f089fc5156cdd90570d4d85373ffd5abd755576fdedf23dda22
-
memory/968-130-0x00000000001E0000-0x0000000000306000-memory.dmpFilesize
1.1MB
-
memory/968-131-0x0000000004C70000-0x0000000004D0C000-memory.dmpFilesize
624KB
-
memory/968-132-0x0000000005360000-0x0000000005904000-memory.dmpFilesize
5.6MB
-
memory/968-133-0x0000000004E50000-0x0000000004EE2000-memory.dmpFilesize
584KB
-
memory/968-134-0x0000000004D40000-0x0000000004D4A000-memory.dmpFilesize
40KB
-
memory/968-135-0x0000000004FE0000-0x0000000005036000-memory.dmpFilesize
344KB
-
memory/2044-138-0x0000000000000000-mapping.dmp
-
memory/2044-139-0x0000000000400000-0x0000000000476000-memory.dmpFilesize
472KB
-
memory/2044-140-0x0000000005110000-0x0000000005176000-memory.dmpFilesize
408KB
-
memory/4116-136-0x0000000000000000-mapping.dmp