Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-04-2024 01:49
Static task
static1
Behavioral task
behavioral1
Sample
ac52db0c62fac74e6708635ac3db5f46_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ac52db0c62fac74e6708635ac3db5f46_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/lqwipxz.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/lqwipxz.dll
Resource
win10v2004-20240226-en
General
-
Target
$PLUGINSDIR/lqwipxz.dll
-
Size
17KB
-
MD5
148e2440033d4c9c35f68f4072ba5d1e
-
SHA1
480b6d0a378fa7e785e79de7e0f757dd7e8124e3
-
SHA256
47094fa8accf250c8df2021a0180140be6f1091415d44e9927e5ed6ba6c60bb4
-
SHA512
1a272ef57ad29b3481a1f18530168d1af7cc6a20bef32249412e0eadcc7dbd306157c3b8fca971ac21bde9cf7229370124cce29038bd3cc1ef93a03008c0367d
-
SSDEEP
384:mD4wra/y5RdIX0lcjIbqjC+/6ztBp9+JTjL:K4wrNp60lC8+C+/OpuTj
Malware Config
Extracted
matiex
https://api.telegram.org/bot1395392888:AAFrJovDdZICOFB0gX0eGWrAUzEKCRpv8xo/sendMessage?chat_id=1300181783
Signatures
-
Matiex Main payload 7 IoCs
resource yara_rule behavioral3/memory/2704-3-0x0000000000400000-0x0000000000484000-memory.dmp family_matiex behavioral3/memory/2704-6-0x0000000000400000-0x0000000000484000-memory.dmp family_matiex behavioral3/memory/2704-8-0x0000000000400000-0x0000000000484000-memory.dmp family_matiex behavioral3/memory/2704-10-0x0000000000B30000-0x0000000000BA6000-memory.dmp family_matiex behavioral3/memory/2704-12-0x0000000002280000-0x00000000022C0000-memory.dmp family_matiex behavioral3/memory/2704-15-0x0000000002280000-0x00000000022C0000-memory.dmp family_matiex behavioral3/memory/2704-16-0x0000000002280000-0x00000000022C0000-memory.dmp family_matiex -
Blocklisted process makes network request 3 IoCs
flow pid Process 5 2704 rundll32.exe 9 2704 rundll32.exe 11 2704 rundll32.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 checkip.dyndns.org 8 freegeoip.app 9 freegeoip.app -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2516 set thread context of 2704 2516 rundll32.exe 29 -
Program crash 1 IoCs
pid pid_target Process procid_target 2440 2704 WerFault.exe 29 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2704 rundll32.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1900 wrote to memory of 2516 1900 rundll32.exe 28 PID 1900 wrote to memory of 2516 1900 rundll32.exe 28 PID 1900 wrote to memory of 2516 1900 rundll32.exe 28 PID 1900 wrote to memory of 2516 1900 rundll32.exe 28 PID 1900 wrote to memory of 2516 1900 rundll32.exe 28 PID 1900 wrote to memory of 2516 1900 rundll32.exe 28 PID 1900 wrote to memory of 2516 1900 rundll32.exe 28 PID 2516 wrote to memory of 2704 2516 rundll32.exe 29 PID 2516 wrote to memory of 2704 2516 rundll32.exe 29 PID 2516 wrote to memory of 2704 2516 rundll32.exe 29 PID 2516 wrote to memory of 2704 2516 rundll32.exe 29 PID 2516 wrote to memory of 2704 2516 rundll32.exe 29 PID 2516 wrote to memory of 2704 2516 rundll32.exe 29 PID 2516 wrote to memory of 2704 2516 rundll32.exe 29 PID 2516 wrote to memory of 2704 2516 rundll32.exe 29 PID 2516 wrote to memory of 2704 2516 rundll32.exe 29 PID 2516 wrote to memory of 2704 2516 rundll32.exe 29 PID 2516 wrote to memory of 2704 2516 rundll32.exe 29 PID 2516 wrote to memory of 2704 2516 rundll32.exe 29 PID 2516 wrote to memory of 2704 2516 rundll32.exe 29 PID 2516 wrote to memory of 2704 2516 rundll32.exe 29 PID 2704 wrote to memory of 2440 2704 rundll32.exe 31 PID 2704 wrote to memory of 2440 2704 rundll32.exe 31 PID 2704 wrote to memory of 2440 2704 rundll32.exe 31 PID 2704 wrote to memory of 2440 2704 rundll32.exe 31 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\lqwipxz.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\lqwipxz.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\lqwipxz.dll,#13⤵
- Blocklisted process makes network request
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:2704 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 18004⤵
- Program crash
PID:2440
-
-
-