Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
16-02-2024 00:22
Static task
static1
Behavioral task
behavioral1
Sample
9ef4e0f2ee00f17614f4eb5d39686051.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9ef4e0f2ee00f17614f4eb5d39686051.exe
Resource
win10v2004-20231222-en
General
-
Target
9ef4e0f2ee00f17614f4eb5d39686051.exe
-
Size
880KB
-
MD5
9ef4e0f2ee00f17614f4eb5d39686051
-
SHA1
f1c0a8539699522b0f29a01ee99334d823e9d356
-
SHA256
5995d49dd8ebd718b0232c7eb37a8f81996be3f9d76b5c76bdcd2dbf09302648
-
SHA512
56b8c58c99bfe73944ff144faaae2a8dc6bb44c6cad4e4c5d82447f1d7085d5b78739111d387a08f6f6c4f5b8677f7ede4697816aee2b894d6029a1050ea12ed
-
SSDEEP
12288:u6csGI/cgDF5gHMm6oAuUSzdnyTLfhiWBB9zI8WuZGH/0yr63km62EObbo:uKLgsrZQxnynfhiQn4zrS2
Malware Config
Extracted
matiex
Protocol: smtp- Host:
mail.thts.vn - Port:
25 - Username:
[email protected] - Password:
123luongngan1989 - Email To:
[email protected]
Signatures
-
Matiex Main payload 1 IoCs
resource yara_rule behavioral2/memory/4740-13-0x0000000000400000-0x0000000000474000-memory.dmp family_matiex -
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 vbc.exe Key opened \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 vbc.exe Key opened \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 vbc.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 46 checkip.dyndns.org 48 freegeoip.app 49 freegeoip.app -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4696 set thread context of 4740 4696 9ef4e0f2ee00f17614f4eb5d39686051.exe 93 -
Program crash 1 IoCs
pid pid_target Process procid_target 1028 4740 WerFault.exe 93 -
Modifies registry class 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000_Classes\ms-settings\shell\open\command\ vbc.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000_Classes\ms-settings\shell\open\command vbc.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000_Classes\ms-settings vbc.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000_Classes\ms-settings\shell vbc.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000_Classes\ms-settings\shell\open vbc.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4696 9ef4e0f2ee00f17614f4eb5d39686051.exe 4696 9ef4e0f2ee00f17614f4eb5d39686051.exe 4740 vbc.exe 4740 vbc.exe 4740 vbc.exe 4740 vbc.exe 4740 vbc.exe 4740 vbc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4696 9ef4e0f2ee00f17614f4eb5d39686051.exe Token: SeDebugPrivilege 4740 vbc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4696 wrote to memory of 2528 4696 9ef4e0f2ee00f17614f4eb5d39686051.exe 92 PID 4696 wrote to memory of 2528 4696 9ef4e0f2ee00f17614f4eb5d39686051.exe 92 PID 4696 wrote to memory of 2528 4696 9ef4e0f2ee00f17614f4eb5d39686051.exe 92 PID 4696 wrote to memory of 4740 4696 9ef4e0f2ee00f17614f4eb5d39686051.exe 93 PID 4696 wrote to memory of 4740 4696 9ef4e0f2ee00f17614f4eb5d39686051.exe 93 PID 4696 wrote to memory of 4740 4696 9ef4e0f2ee00f17614f4eb5d39686051.exe 93 PID 4696 wrote to memory of 4740 4696 9ef4e0f2ee00f17614f4eb5d39686051.exe 93 PID 4696 wrote to memory of 4740 4696 9ef4e0f2ee00f17614f4eb5d39686051.exe 93 PID 4696 wrote to memory of 4740 4696 9ef4e0f2ee00f17614f4eb5d39686051.exe 93 PID 4696 wrote to memory of 4740 4696 9ef4e0f2ee00f17614f4eb5d39686051.exe 93 PID 4696 wrote to memory of 4740 4696 9ef4e0f2ee00f17614f4eb5d39686051.exe 93 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 vbc.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9ef4e0f2ee00f17614f4eb5d39686051.exe"C:\Users\Admin\AppData\Local\Temp\9ef4e0f2ee00f17614f4eb5d39686051.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵PID:2528
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Accesses Microsoft Outlook profiles
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4740 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4740 -s 20123⤵
- Program crash
PID:1028
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4740 -ip 47401⤵PID:1168