Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 11:43
Static task
static1
Behavioral task
behavioral1
Sample
Inv.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Inv.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
New Order.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
New Order.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Quotation.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Quotation.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
pictures and logo.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
pictures and logo.exe
Resource
win10v2004-20240802-en
General
-
Target
pictures and logo.exe
-
Size
669KB
-
MD5
4fa42a8beb305337e28cede06ceefa62
-
SHA1
1ad401dc70385788123ae837eea020a9c1d9e9d9
-
SHA256
c38b853587846014052d5b2206e8764dac66f7de9479ec3080e1872938bd7ceb
-
SHA512
81dc56b84e3e95169de458d5842c50347455365388b96155aa25a7fea27dc756d20180265ee2b796b2d6ebc2d04d622a6fa9259877f371e956e1458415046807
-
SSDEEP
12288:mEcQS8zfwkDWsWUZT3HVCuNhzmSEuH/KVTXr2tb:Fcn8zfw+WUZT3HVCuNhqWfKFXr2t
Malware Config
Extracted
matiex
Protocol: smtp- Host:
smtp.privateemail.com - Port:
587 - Username:
[email protected] - Password:
MARYolanmauluogwo@ever
Signatures
-
Matiex Main payload 5 IoCs
resource yara_rule behavioral7/memory/2344-24-0x0000000000400000-0x0000000000476000-memory.dmp family_matiex behavioral7/memory/2344-22-0x0000000000400000-0x0000000000476000-memory.dmp family_matiex behavioral7/memory/2344-20-0x0000000000400000-0x0000000000476000-memory.dmp family_matiex behavioral7/memory/2344-17-0x0000000000400000-0x0000000000476000-memory.dmp family_matiex behavioral7/memory/2344-16-0x0000000000400000-0x0000000000476000-memory.dmp family_matiex -
Beds Protector Packer 1 IoCs
Detects Beds Protector packer used to load .NET malware.
resource yara_rule behavioral7/memory/2656-3-0x00000000020E0000-0x0000000002186000-memory.dmp beds_protector -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe Powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe Powershell.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 pictures and logo.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 pictures and logo.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 pictures and logo.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 checkip.dyndns.org 4 freegeoip.app 5 freegeoip.app -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2656 set thread context of 2344 2656 pictures and logo.exe 34 -
pid Process 2652 Powershell.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1108 2344 WerFault.exe 34 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pictures and logo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pictures and logo.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2652 Powershell.exe 2656 pictures and logo.exe 2656 pictures and logo.exe 2656 pictures and logo.exe 2656 pictures and logo.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2652 Powershell.exe Token: SeDebugPrivilege 2656 pictures and logo.exe Token: SeDebugPrivilege 2344 pictures and logo.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2656 wrote to memory of 2652 2656 pictures and logo.exe 30 PID 2656 wrote to memory of 2652 2656 pictures and logo.exe 30 PID 2656 wrote to memory of 2652 2656 pictures and logo.exe 30 PID 2656 wrote to memory of 2652 2656 pictures and logo.exe 30 PID 2656 wrote to memory of 2636 2656 pictures and logo.exe 32 PID 2656 wrote to memory of 2636 2656 pictures and logo.exe 32 PID 2656 wrote to memory of 2636 2656 pictures and logo.exe 32 PID 2656 wrote to memory of 2636 2656 pictures and logo.exe 32 PID 2656 wrote to memory of 2572 2656 pictures and logo.exe 33 PID 2656 wrote to memory of 2572 2656 pictures and logo.exe 33 PID 2656 wrote to memory of 2572 2656 pictures and logo.exe 33 PID 2656 wrote to memory of 2572 2656 pictures and logo.exe 33 PID 2656 wrote to memory of 2344 2656 pictures and logo.exe 34 PID 2656 wrote to memory of 2344 2656 pictures and logo.exe 34 PID 2656 wrote to memory of 2344 2656 pictures and logo.exe 34 PID 2656 wrote to memory of 2344 2656 pictures and logo.exe 34 PID 2656 wrote to memory of 2344 2656 pictures and logo.exe 34 PID 2656 wrote to memory of 2344 2656 pictures and logo.exe 34 PID 2656 wrote to memory of 2344 2656 pictures and logo.exe 34 PID 2656 wrote to memory of 2344 2656 pictures and logo.exe 34 PID 2656 wrote to memory of 2344 2656 pictures and logo.exe 34 PID 2344 wrote to memory of 1108 2344 pictures and logo.exe 36 PID 2344 wrote to memory of 1108 2344 pictures and logo.exe 36 PID 2344 wrote to memory of 1108 2344 pictures and logo.exe 36 PID 2344 wrote to memory of 1108 2344 pictures and logo.exe 36 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 pictures and logo.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 pictures and logo.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\pictures and logo.exe"C:\Users\Admin\AppData\Local\Temp\pictures and logo.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe"Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\Admin\AppData\Local\Temp\pictures and logo.exe' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe'2⤵
- Drops startup file
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2652
-
-
C:\Users\Admin\AppData\Local\Temp\pictures and logo.exe"C:\Users\Admin\AppData\Local\Temp\pictures and logo.exe"2⤵PID:2636
-
-
C:\Users\Admin\AppData\Local\Temp\pictures and logo.exe"C:\Users\Admin\AppData\Local\Temp\pictures and logo.exe"2⤵PID:2572
-
-
C:\Users\Admin\AppData\Local\Temp\pictures and logo.exe"C:\Users\Admin\AppData\Local\Temp\pictures and logo.exe"2⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:2344 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2344 -s 11803⤵
- Program crash
PID:1108
-
-