Analysis

  • max time kernel
    101s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-01-2024 03:40

General

  • Target

    3bcae8c41a076a0803c99fea75f2aa87.exe

  • Size

    1.1MB

  • MD5

    3bcae8c41a076a0803c99fea75f2aa87

  • SHA1

    f2c1b01afcc3a3af6d947b39419bb4531daa8945

  • SHA256

    42ff1648e53d0054bc7c4a5c8a5db648c2a3405415d441c7d5801e52f56bf7a7

  • SHA512

    220880b1422811db1d9cd79030ea8005a7921ecabb580a3ed537d68bb068005f98b14a87e1f90f796d0d506ccd37675c9153a84e2ea0096bc45d55534f5e4113

  • SSDEEP

    24576:5W5oaXpcB7mVSaccPuvcd5OGQT/1/0nS+7n4SYwqK4zf3RTsAHWAgqChJ+hu3A8K:giecrLh0oQRjeGAZ

Malware Config

Extracted

Family

matiex

Credentials

Signatures

  • Matiex

    Matiex is a keylogger and infostealer first seen in July 2020.

  • Matiex Main payload 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3bcae8c41a076a0803c99fea75f2aa87.exe
    "C:\Users\Admin\AppData\Local\Temp\3bcae8c41a076a0803c99fea75f2aa87.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1384
    • C:\Users\Admin\AppData\Local\Temp\3bcae8c41a076a0803c99fea75f2aa87.exe
      "C:\Users\Admin\AppData\Local\Temp\3bcae8c41a076a0803c99fea75f2aa87.exe"
      2⤵
        PID:3356
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3356 -s 1984
          3⤵
          • Program crash
          PID:3256
      • C:\Users\Admin\AppData\Local\Temp\3bcae8c41a076a0803c99fea75f2aa87.exe
        "C:\Users\Admin\AppData\Local\Temp\3bcae8c41a076a0803c99fea75f2aa87.exe"
        2⤵
          PID:4932
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3356 -ip 3356
        1⤵
          PID:4828

        Network

        MITRE ATT&CK Matrix ATT&CK v13

        Credential Access

        Unsecured Credentials

        1
        T1552

        Credentials In Files

        1
        T1552.001

        Collection

        Data from Local System

        1
        T1005

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\3bcae8c41a076a0803c99fea75f2aa87.exe.log
          Filesize

          1KB

          MD5

          17573558c4e714f606f997e5157afaac

          SHA1

          13e16e9415ceef429aaf124139671ebeca09ed23

          SHA256

          c18db6aecad2436da4a63ff26af4e3a337cca48f01c21b8db494fe5ccc60e553

          SHA512

          f4edf13f05a0d142e4dd42802098c8c44988ee8869621a62c2b565a77c9a95857f636583ff8d6d9baa366603d98b9bfbf1fc75bc6f9f8f83c80cb1215b2941cc

        • memory/1384-10-0x0000000006210000-0x0000000006246000-memory.dmp
          Filesize

          216KB

        • memory/1384-11-0x0000000009D60000-0x0000000009DEE000-memory.dmp
          Filesize

          568KB

        • memory/1384-4-0x0000000004C00000-0x0000000004C92000-memory.dmp
          Filesize

          584KB

        • memory/1384-5-0x0000000004D80000-0x0000000004D90000-memory.dmp
          Filesize

          64KB

        • memory/1384-7-0x0000000004CA0000-0x0000000004CF6000-memory.dmp
          Filesize

          344KB

        • memory/1384-6-0x0000000004B30000-0x0000000004B3A000-memory.dmp
          Filesize

          40KB

        • memory/1384-1-0x00000000000D0000-0x00000000001EC000-memory.dmp
          Filesize

          1.1MB

        • memory/1384-17-0x0000000074830000-0x0000000074FE0000-memory.dmp
          Filesize

          7.7MB

        • memory/1384-9-0x0000000004D80000-0x0000000004D90000-memory.dmp
          Filesize

          64KB

        • memory/1384-3-0x0000000005110000-0x00000000056B4000-memory.dmp
          Filesize

          5.6MB

        • memory/1384-8-0x0000000074830000-0x0000000074FE0000-memory.dmp
          Filesize

          7.7MB

        • memory/1384-12-0x0000000009E10000-0x0000000009E88000-memory.dmp
          Filesize

          480KB

        • memory/1384-2-0x0000000004A20000-0x0000000004ABC000-memory.dmp
          Filesize

          624KB

        • memory/1384-0-0x0000000074830000-0x0000000074FE0000-memory.dmp
          Filesize

          7.7MB

        • memory/3356-16-0x0000000074830000-0x0000000074FE0000-memory.dmp
          Filesize

          7.7MB

        • memory/3356-19-0x0000000005050000-0x0000000005060000-memory.dmp
          Filesize

          64KB

        • memory/3356-18-0x0000000004F60000-0x0000000004FC6000-memory.dmp
          Filesize

          408KB

        • memory/3356-13-0x0000000000400000-0x0000000000472000-memory.dmp
          Filesize

          456KB

        • memory/3356-20-0x0000000006800000-0x00000000069C2000-memory.dmp
          Filesize

          1.8MB

        • memory/3356-21-0x0000000074830000-0x0000000074FE0000-memory.dmp
          Filesize

          7.7MB