Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26-09-2024 19:01
Static task
static1
Behavioral task
behavioral1
Sample
f9061b35c7ed637323aac46c5d15d002_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f9061b35c7ed637323aac46c5d15d002_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f9061b35c7ed637323aac46c5d15d002_JaffaCakes118.exe
-
Size
579KB
-
MD5
f9061b35c7ed637323aac46c5d15d002
-
SHA1
797b13720bbc9ae30134fb421941e02ba73d7bd4
-
SHA256
f9bf4cfd9b01450f92f9b0e1e329fdf4b31b234f60607b626a258aa6cbf40782
-
SHA512
da07e25ae000328dce3ae94e1e8ef7737813767975d400bfceabcc0fb63c75582b274cc07724295e1ff675d9f69c69885946dc276ebd4c8554b4819ce54f2408
-
SSDEEP
6144:+Kflh63Z4wCX7ybhkPZP85tHvrXzlgIDG0KPlcnXLfn+jey82tp8e2n:3f/6KpX7+kPZU5tHDpP5XLfkB7
Malware Config
Extracted
matiex
Protocol: smtp- Host:
smtp.porkbun.com - Port:
587 - Username:
[email protected] - Password:
godisable147
Signatures
-
Matiex Main payload 7 IoCs
resource yara_rule behavioral1/files/0x0008000000018708-4.dat family_matiex behavioral1/memory/2572-10-0x0000000000320000-0x0000000000390000-memory.dmp family_matiex behavioral1/memory/2704-21-0x0000000000400000-0x0000000000470000-memory.dmp family_matiex behavioral1/memory/2704-24-0x0000000000400000-0x0000000000470000-memory.dmp family_matiex behavioral1/memory/2704-26-0x0000000000400000-0x0000000000470000-memory.dmp family_matiex behavioral1/memory/2704-19-0x0000000000400000-0x0000000000470000-memory.dmp family_matiex behavioral1/memory/2704-18-0x0000000000400000-0x0000000000470000-memory.dmp family_matiex -
Executes dropped EXE 2 IoCs
pid Process 2572 tmp.exe 2704 svhost.exe -
Loads dropped DLL 3 IoCs
pid Process 2316 f9061b35c7ed637323aac46c5d15d002_JaffaCakes118.exe 2316 f9061b35c7ed637323aac46c5d15d002_JaffaCakes118.exe 2316 f9061b35c7ed637323aac46c5d15d002_JaffaCakes118.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 tmp.exe Key opened \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 svhost.exe Key opened \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 svhost.exe Key opened \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 svhost.exe Key opened \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 tmp.exe Key opened \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 tmp.exe -
Looks up external IP address via web service 5 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 14 freegeoip.app 17 freegeoip.app 5 checkip.dyndns.org 6 checkip.dyndns.org 13 freegeoip.app -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2316 set thread context of 2704 2316 f9061b35c7ed637323aac46c5d15d002_JaffaCakes118.exe 32 -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe:Zone.Identifier cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f9061b35c7ed637323aac46c5d15d002_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe:Zone.Identifier cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2316 f9061b35c7ed637323aac46c5d15d002_JaffaCakes118.exe 2316 f9061b35c7ed637323aac46c5d15d002_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2316 f9061b35c7ed637323aac46c5d15d002_JaffaCakes118.exe Token: SeDebugPrivilege 2704 svhost.exe Token: SeDebugPrivilege 2572 tmp.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2572 2316 f9061b35c7ed637323aac46c5d15d002_JaffaCakes118.exe 31 PID 2316 wrote to memory of 2572 2316 f9061b35c7ed637323aac46c5d15d002_JaffaCakes118.exe 31 PID 2316 wrote to memory of 2572 2316 f9061b35c7ed637323aac46c5d15d002_JaffaCakes118.exe 31 PID 2316 wrote to memory of 2572 2316 f9061b35c7ed637323aac46c5d15d002_JaffaCakes118.exe 31 PID 2316 wrote to memory of 2704 2316 f9061b35c7ed637323aac46c5d15d002_JaffaCakes118.exe 32 PID 2316 wrote to memory of 2704 2316 f9061b35c7ed637323aac46c5d15d002_JaffaCakes118.exe 32 PID 2316 wrote to memory of 2704 2316 f9061b35c7ed637323aac46c5d15d002_JaffaCakes118.exe 32 PID 2316 wrote to memory of 2704 2316 f9061b35c7ed637323aac46c5d15d002_JaffaCakes118.exe 32 PID 2316 wrote to memory of 2704 2316 f9061b35c7ed637323aac46c5d15d002_JaffaCakes118.exe 32 PID 2316 wrote to memory of 2704 2316 f9061b35c7ed637323aac46c5d15d002_JaffaCakes118.exe 32 PID 2316 wrote to memory of 2704 2316 f9061b35c7ed637323aac46c5d15d002_JaffaCakes118.exe 32 PID 2316 wrote to memory of 2704 2316 f9061b35c7ed637323aac46c5d15d002_JaffaCakes118.exe 32 PID 2316 wrote to memory of 2704 2316 f9061b35c7ed637323aac46c5d15d002_JaffaCakes118.exe 32 PID 2316 wrote to memory of 2852 2316 f9061b35c7ed637323aac46c5d15d002_JaffaCakes118.exe 34 PID 2316 wrote to memory of 2852 2316 f9061b35c7ed637323aac46c5d15d002_JaffaCakes118.exe 34 PID 2316 wrote to memory of 2852 2316 f9061b35c7ed637323aac46c5d15d002_JaffaCakes118.exe 34 PID 2316 wrote to memory of 2852 2316 f9061b35c7ed637323aac46c5d15d002_JaffaCakes118.exe 34 PID 2316 wrote to memory of 2684 2316 f9061b35c7ed637323aac46c5d15d002_JaffaCakes118.exe 36 PID 2316 wrote to memory of 2684 2316 f9061b35c7ed637323aac46c5d15d002_JaffaCakes118.exe 36 PID 2316 wrote to memory of 2684 2316 f9061b35c7ed637323aac46c5d15d002_JaffaCakes118.exe 36 PID 2316 wrote to memory of 2684 2316 f9061b35c7ed637323aac46c5d15d002_JaffaCakes118.exe 36 PID 2684 wrote to memory of 1160 2684 cmd.exe 38 PID 2684 wrote to memory of 1160 2684 cmd.exe 38 PID 2684 wrote to memory of 1160 2684 cmd.exe 38 PID 2684 wrote to memory of 1160 2684 cmd.exe 38 PID 2316 wrote to memory of 2344 2316 f9061b35c7ed637323aac46c5d15d002_JaffaCakes118.exe 39 PID 2316 wrote to memory of 2344 2316 f9061b35c7ed637323aac46c5d15d002_JaffaCakes118.exe 39 PID 2316 wrote to memory of 2344 2316 f9061b35c7ed637323aac46c5d15d002_JaffaCakes118.exe 39 PID 2316 wrote to memory of 2344 2316 f9061b35c7ed637323aac46c5d15d002_JaffaCakes118.exe 39 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 svhost.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 svhost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9061b35c7ed637323aac46c5d15d002_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f9061b35c7ed637323aac46c5d15d002_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2572
-
-
C:\Users\Admin\AppData\Local\Temp\svhost.exe"C:\Users\Admin\AppData\Local\Temp\svhost.exe"2⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2704
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:/Users/Admin/AppData/Local/Temp/f9061b35c7ed637323aac46c5d15d002_JaffaCakes118.exe" "%temp%\FolderN\name.exe" /Y2⤵
- System Location Discovery: System Language Discovery
PID:2852
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "%temp%\FolderN\name.exe.lnk" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe.lnk" /f3⤵
- System Location Discovery: System Language Discovery
PID:1160
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo [zoneTransfer]ZoneID = 2 > %temp%\FolderN\name.exe:Zone.Identifier2⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:2344
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
579KB
MD5f9061b35c7ed637323aac46c5d15d002
SHA1797b13720bbc9ae30134fb421941e02ba73d7bd4
SHA256f9bf4cfd9b01450f92f9b0e1e329fdf4b31b234f60607b626a258aa6cbf40782
SHA512da07e25ae000328dce3ae94e1e8ef7737813767975d400bfceabcc0fb63c75582b274cc07724295e1ff675d9f69c69885946dc276ebd4c8554b4819ce54f2408
-
Filesize
255KB
MD59af17c8393f0970ee5136bd3ffa27001
SHA14b285b72c1a11285a25f31f2597e090da6bbc049
SHA25671d6a7a3fe5f8dc878cd5bdeca0e09177efb85c01e9a8a10a95262cabefaa019
SHA512b90f7de7d5ce72dccb264c7ba609e173c529b9d99ed9a63f88632bc58b1a994bbb727365f519c73b979f8918bd6de3c39a9f0347eb3a4bccdce4b2772a6516a3
-
Filesize
425KB
MD534e884a790a7ef67f7c61108e2b9a177
SHA16ad5021f86a6d361a9771001a506ff8b8bf1930a
SHA2565f1ce1d8e909e4fc999dd5a1fea71103cff35e075750117c8d9e3ec5045f09f0
SHA51279e5fcd411321f1b09b67cc36a2dbeaf88731bd1ebf41cf53d21ed4d7f476b7193c40c33dcc652d707240ec45818b730732465c2a4a329c8ea7dd4d020aea2e8