Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/12/2023, 16:41

General

  • Target

    eb5c3f8a581a2bbe778a586697a9b341.exe

  • Size

    870KB

  • MD5

    eb5c3f8a581a2bbe778a586697a9b341

  • SHA1

    4d54306bc2410cece081f1db159665962df9a8da

  • SHA256

    4c65f92cd878c051338bda2ff251c8714d6b7ae2bcea06e73bc954661e993571

  • SHA512

    2878804b5beb838661d983dd7e4ccf48a872a512b4d6260159b3de2fd85d00149869d30a26677500b51b13af6485180441acbdba0a0c7a981c8efb07d4752fc0

  • SSDEEP

    12288:fhv7hZb9YMbf50NQVB2ON9sDJoyVIyeichX/7NDBV9ghPwFy2ewne0:Jtl9fR0eDRsDW/XRNw4FBXe

Malware Config

Extracted

Family

matiex

Credentials

Signatures

  • Matiex

    Matiex is a keylogger and infostealer first seen in July 2020.

  • Matiex Main payload 1 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eb5c3f8a581a2bbe778a586697a9b341.exe
    "C:\Users\Admin\AppData\Local\Temp\eb5c3f8a581a2bbe778a586697a9b341.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1572
    • C:\Users\Admin\AppData\Local\Temp\eb5c3f8a581a2bbe778a586697a9b341.exe
      "C:\Users\Admin\AppData\Local\Temp\eb5c3f8a581a2bbe778a586697a9b341.exe"
      2⤵
        PID:1500
      • C:\Users\Admin\AppData\Local\Temp\eb5c3f8a581a2bbe778a586697a9b341.exe
        "C:\Users\Admin\AppData\Local\Temp\eb5c3f8a581a2bbe778a586697a9b341.exe"
        2⤵
          PID:540
        • C:\Users\Admin\AppData\Local\Temp\eb5c3f8a581a2bbe778a586697a9b341.exe
          "C:\Users\Admin\AppData\Local\Temp\eb5c3f8a581a2bbe778a586697a9b341.exe"
          2⤵
            PID:1984
          • C:\Users\Admin\AppData\Local\Temp\eb5c3f8a581a2bbe778a586697a9b341.exe
            "C:\Users\Admin\AppData\Local\Temp\eb5c3f8a581a2bbe778a586697a9b341.exe"
            2⤵
            • Accesses Microsoft Outlook profiles
            • Suspicious use of AdjustPrivilegeToken
            • outlook_office_path
            • outlook_win_path
            PID:4384
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4384 -s 1652
              3⤵
              • Program crash
              PID:2948
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4384 -ip 4384
          1⤵
            PID:2936

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\eb5c3f8a581a2bbe778a586697a9b341.exe.log

            Filesize

            1KB

            MD5

            8ec831f3e3a3f77e4a7b9cd32b48384c

            SHA1

            d83f09fd87c5bd86e045873c231c14836e76a05c

            SHA256

            7667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982

            SHA512

            26bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3

          • memory/1572-4-0x0000000005200000-0x0000000005210000-memory.dmp

            Filesize

            64KB

          • memory/1572-16-0x0000000074880000-0x0000000075030000-memory.dmp

            Filesize

            7.7MB

          • memory/1572-3-0x0000000005030000-0x00000000050C2000-memory.dmp

            Filesize

            584KB

          • memory/1572-0-0x0000000000680000-0x0000000000760000-memory.dmp

            Filesize

            896KB

          • memory/1572-5-0x00000000051C0000-0x00000000051CA000-memory.dmp

            Filesize

            40KB

          • memory/1572-6-0x0000000005520000-0x0000000005538000-memory.dmp

            Filesize

            96KB

          • memory/1572-7-0x0000000074880000-0x0000000075030000-memory.dmp

            Filesize

            7.7MB

          • memory/1572-8-0x0000000005200000-0x0000000005210000-memory.dmp

            Filesize

            64KB

          • memory/1572-2-0x0000000005540000-0x0000000005AE4000-memory.dmp

            Filesize

            5.6MB

          • memory/1572-9-0x00000000079C0000-0x0000000007A5C000-memory.dmp

            Filesize

            624KB

          • memory/1572-10-0x0000000007BC0000-0x0000000007C7A000-memory.dmp

            Filesize

            744KB

          • memory/1572-1-0x0000000074880000-0x0000000075030000-memory.dmp

            Filesize

            7.7MB

          • memory/4384-11-0x0000000000400000-0x0000000000472000-memory.dmp

            Filesize

            456KB

          • memory/4384-15-0x00000000056E0000-0x0000000005746000-memory.dmp

            Filesize

            408KB

          • memory/4384-17-0x0000000005600000-0x0000000005610000-memory.dmp

            Filesize

            64KB

          • memory/4384-14-0x0000000074880000-0x0000000075030000-memory.dmp

            Filesize

            7.7MB

          • memory/4384-18-0x0000000006F70000-0x0000000007132000-memory.dmp

            Filesize

            1.8MB

          • memory/4384-19-0x0000000074880000-0x0000000075030000-memory.dmp

            Filesize

            7.7MB