Analysis

  • max time kernel
    126s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 09:24

General

  • Target

    d256e544c1dbe5a7d111af512e899bf0f81208bc2cc8ca5fba8c701ac7691324.exe

  • Size

    269KB

  • MD5

    9496bc692308860f1808a6b141eb7df7

  • SHA1

    80b84b08547382757898af00968f34ff5bfec31b

  • SHA256

    d256e544c1dbe5a7d111af512e899bf0f81208bc2cc8ca5fba8c701ac7691324

  • SHA512

    731dbc22b4691de0d686598cea6ccdf1d1911d1f0349eda69a5627b4d709377a6669f3969f61ba5b75fcafb366d920d1dcac35ac722a2efb9eb1f9e241b5e004

  • SSDEEP

    6144:ibXGFYBiXBE1py3uDjvrTRQgy8xwm7DVK:bOBiXBIiuXvHigy8xwmPVK

Malware Config

Signatures

  • Matiex

    Matiex is a keylogger and infostealer first seen in July 2020.

  • Matiex Main payload 6 IoCs
  • Drops startup file 4 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d256e544c1dbe5a7d111af512e899bf0f81208bc2cc8ca5fba8c701ac7691324.exe
    "C:\Users\Admin\AppData\Local\Temp\d256e544c1dbe5a7d111af512e899bf0f81208bc2cc8ca5fba8c701ac7691324.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1012
    • C:\Users\Admin\AppData\Local\Temp\d256e544c1dbe5a7d111af512e899bf0f81208bc2cc8ca5fba8c701ac7691324.exe
      "C:\Users\Admin\AppData\Local\Temp\d256e544c1dbe5a7d111af512e899bf0f81208bc2cc8ca5fba8c701ac7691324.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1248
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe
        "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\Admin\AppData\Local\Temp\d256e544c1dbe5a7d111af512e899bf0f81208bc2cc8ca5fba8c701ac7691324.exe' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.exe'
        3⤵
        • Drops startup file
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:868
      • C:\Users\Admin\AppData\Local\Temp\d256e544c1dbe5a7d111af512e899bf0f81208bc2cc8ca5fba8c701ac7691324.exe
        "C:\Users\Admin\AppData\Local\Temp\d256e544c1dbe5a7d111af512e899bf0f81208bc2cc8ca5fba8c701ac7691324.exe"
        3⤵
          PID:1160
        • C:\Users\Admin\AppData\Local\Temp\d256e544c1dbe5a7d111af512e899bf0f81208bc2cc8ca5fba8c701ac7691324.exe
          "C:\Users\Admin\AppData\Local\Temp\d256e544c1dbe5a7d111af512e899bf0f81208bc2cc8ca5fba8c701ac7691324.exe"
          3⤵
          • Modifies system certificate store
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1064
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1064 -s 1736
            4⤵
            • Program crash
            PID:1612
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\pOwERsHeLl.exe
        "pOwERsHeLl.exe" Copy-Item 'C:\Users\Admin\AppData\Local\Temp\d256e544c1dbe5a7d111af512e899bf0f81208bc2cc8ca5fba8c701ac7691324.exe' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Sym.exe'
        2⤵
        • Drops startup file
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1532

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Install Root Certificate

    1
    T1130

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
      Filesize

      7KB

      MD5

      609200470595a65a890bf7bc89e1bcfc

      SHA1

      88bfc9b16a867bdbde1efbb79e04c6f07858a054

      SHA256

      4ce573e900485a8910b54f28d149cf231254b80658c5b3f502264d07d9d7fd15

      SHA512

      bb2040b7e1e45297548d0467ed2345ef1f20b4007541b0dcdadbb217e79794d64773e1f066f50b5b99fa1bc5ee074eb33217c8843325805772ee1fc3c7b2234e

    • memory/868-78-0x000000006FFC0000-0x000000007056B000-memory.dmp
      Filesize

      5.7MB

    • memory/868-75-0x0000000000000000-mapping.dmp
    • memory/1012-71-0x0000000000645000-0x0000000000656000-memory.dmp
      Filesize

      68KB

    • memory/1012-55-0x00000000763F1000-0x00000000763F3000-memory.dmp
      Filesize

      8KB

    • memory/1012-56-0x0000000000470000-0x0000000000486000-memory.dmp
      Filesize

      88KB

    • memory/1012-54-0x00000000002A0000-0x00000000002EA000-memory.dmp
      Filesize

      296KB

    • memory/1012-62-0x0000000000645000-0x0000000000656000-memory.dmp
      Filesize

      68KB

    • memory/1064-81-0x0000000000400000-0x0000000000426000-memory.dmp
      Filesize

      152KB

    • memory/1064-80-0x0000000000400000-0x0000000000426000-memory.dmp
      Filesize

      152KB

    • memory/1064-90-0x0000000000400000-0x0000000000426000-memory.dmp
      Filesize

      152KB

    • memory/1064-88-0x0000000000400000-0x0000000000426000-memory.dmp
      Filesize

      152KB

    • memory/1064-86-0x00000000004219FA-mapping.dmp
    • memory/1064-85-0x0000000000400000-0x0000000000426000-memory.dmp
      Filesize

      152KB

    • memory/1064-84-0x0000000000400000-0x0000000000426000-memory.dmp
      Filesize

      152KB

    • memory/1064-83-0x0000000000400000-0x0000000000426000-memory.dmp
      Filesize

      152KB

    • memory/1248-79-0x00000000003C0000-0x00000000003D4000-memory.dmp
      Filesize

      80KB

    • memory/1248-60-0x0000000000400000-0x0000000000436000-memory.dmp
      Filesize

      216KB

    • memory/1248-58-0x0000000000400000-0x0000000000436000-memory.dmp
      Filesize

      216KB

    • memory/1248-64-0x0000000000430E4E-mapping.dmp
    • memory/1248-61-0x0000000000400000-0x0000000000436000-memory.dmp
      Filesize

      216KB

    • memory/1248-57-0x0000000000400000-0x0000000000436000-memory.dmp
      Filesize

      216KB

    • memory/1248-63-0x0000000000400000-0x0000000000436000-memory.dmp
      Filesize

      216KB

    • memory/1248-66-0x0000000000400000-0x0000000000436000-memory.dmp
      Filesize

      216KB

    • memory/1248-69-0x0000000000400000-0x0000000000436000-memory.dmp
      Filesize

      216KB

    • memory/1532-73-0x0000000070570000-0x0000000070B1B000-memory.dmp
      Filesize

      5.7MB

    • memory/1532-72-0x0000000070570000-0x0000000070B1B000-memory.dmp
      Filesize

      5.7MB

    • memory/1532-68-0x0000000000000000-mapping.dmp
    • memory/1612-92-0x0000000000000000-mapping.dmp