Analysis
-
max time kernel
122s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 13:07
Static task
static1
Behavioral task
behavioral1
Sample
37472a1bfa5be3fac348e24e3d2e92e4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
37472a1bfa5be3fac348e24e3d2e92e4.exe
Resource
win10v2004-20231215-en
General
-
Target
37472a1bfa5be3fac348e24e3d2e92e4.exe
-
Size
658KB
-
MD5
37472a1bfa5be3fac348e24e3d2e92e4
-
SHA1
0f61f0ab618017cd6122948628d2ff36d274ec27
-
SHA256
18c491931287787e01064c705c8ae6b7befd908f32989155f6d2f1ee660ed2a6
-
SHA512
18947f98a6019f34c63e5d8b414184c468bc148989e3c633435550a5db2a46d1c6d4b36b15ac67549085ebe0a05f0f28947995dcdeae23c3a980b88dda2779f8
-
SSDEEP
6144:B9QA4vedjV+gzjCtJO4BlZixpv+B7/Lr4Jb9pNDRzfdP/1qWADh:LQA8YjV+gPuJDZiV+B7DrwlDRxY5D
Malware Config
Extracted
matiex
Protocol: smtp- Host:
mail.thts.vn - Port:
25 - Username:
[email protected] - Password:
123luongngan1989 - Email To:
[email protected]
Signatures
-
Matiex Main payload 2 IoCs
resource yara_rule behavioral1/memory/2824-17-0x0000000000400000-0x0000000000472000-memory.dmp family_matiex behavioral1/memory/2824-15-0x0000000000400000-0x0000000000472000-memory.dmp family_matiex -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1644 schtasks.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2724 wrote to memory of 1644 2724 37472a1bfa5be3fac348e24e3d2e92e4.exe 30 PID 2724 wrote to memory of 1644 2724 37472a1bfa5be3fac348e24e3d2e92e4.exe 30 PID 2724 wrote to memory of 1644 2724 37472a1bfa5be3fac348e24e3d2e92e4.exe 30 PID 2724 wrote to memory of 1644 2724 37472a1bfa5be3fac348e24e3d2e92e4.exe 30 PID 2724 wrote to memory of 2824 2724 37472a1bfa5be3fac348e24e3d2e92e4.exe 32 PID 2724 wrote to memory of 2824 2724 37472a1bfa5be3fac348e24e3d2e92e4.exe 32 PID 2724 wrote to memory of 2824 2724 37472a1bfa5be3fac348e24e3d2e92e4.exe 32 PID 2724 wrote to memory of 2824 2724 37472a1bfa5be3fac348e24e3d2e92e4.exe 32 PID 2724 wrote to memory of 2824 2724 37472a1bfa5be3fac348e24e3d2e92e4.exe 32 PID 2724 wrote to memory of 2824 2724 37472a1bfa5be3fac348e24e3d2e92e4.exe 32 PID 2724 wrote to memory of 2824 2724 37472a1bfa5be3fac348e24e3d2e92e4.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\37472a1bfa5be3fac348e24e3d2e92e4.exe"C:\Users\Admin\AppData\Local\Temp\37472a1bfa5be3fac348e24e3d2e92e4.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\sVzAYXoSuQ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8F64.tmp"2⤵
- Creates scheduled task(s)
PID:1644
-
-
C:\Users\Admin\AppData\Local\Temp\37472a1bfa5be3fac348e24e3d2e92e4.exe"C:\Users\Admin\AppData\Local\Temp\37472a1bfa5be3fac348e24e3d2e92e4.exe"2⤵PID:2824
-