Analysis

  • max time kernel
    138s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-05-2023 14:58

General

  • Target

    044685b4ab7d6662478a46d8f991da88a69bb8b73c66ce12e48a4570c3a5050f.exe

  • Size

    5.0MB

  • MD5

    733e0f199b91424bb6f4d3baeaea3688

  • SHA1

    84d6360deed9dbd97f1001fe7e4f152bebbcb32c

  • SHA256

    044685b4ab7d6662478a46d8f991da88a69bb8b73c66ce12e48a4570c3a5050f

  • SHA512

    3a9d4d81b0f4a7c859830162f96344b133052fc36896215891cd6a3b94b18faaba239b4b2b878a2e1e1453ed4aba97d4e05ca634fde776e2e4d6822ec18f72dc

  • SSDEEP

    49152:XGbf5gfKJu0zf4R+oUN+edPTPR5Y0Pf/deh/1XwshSLGI/trdxblHK:8FlRm01+j0BA

Malware Config

Signatures

  • Matiex

    Matiex is a keylogger and infostealer first seen in July 2020.

  • Matiex Main payload 1 IoCs
  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger payload 1 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\044685b4ab7d6662478a46d8f991da88a69bb8b73c66ce12e48a4570c3a5050f.exe
    "C:\Users\Admin\AppData\Local\Temp\044685b4ab7d6662478a46d8f991da88a69bb8b73c66ce12e48a4570c3a5050f.exe"
    1⤵
      PID:644

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/644-133-0x0000000000F60000-0x00000000014601E0-memory.dmp

      Filesize

      5.0MB