Analysis
-
max time kernel
140s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2024 11:07
Behavioral task
behavioral1
Sample
matrix loder.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
matrix loder.exe
Resource
win10v2004-20241007-en
General
-
Target
matrix loder.exe
-
Size
55KB
-
MD5
9a282dfc7b4208af4e6404a9f3286afb
-
SHA1
2bc2dc49c846a80f92024e3f999a7d3e576fa03b
-
SHA256
6d58a49e876e1a2b53c0314e17306eff78819064b44618ae23029ffe0a5ba79f
-
SHA512
4a40417a223f79b250347c4afd1c578f6bc42ce7bdee70d5494a20a09ff40c96237eb0a376c9c49c4d48cb5484b2eca8a7c26b732460ff0c9a94d7dfcabdf7be
-
SSDEEP
1536:MRksDnHNwZ8Cam8LDdwsNMD2XExI3pmJm:DsDn6SKiDdwsNMD2XExI3pm
Malware Config
Signatures
-
Njrat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation matrix loder.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ba504e39d49d09ba3f0b71067d651692.exe matrix loder.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ba504e39d49d09ba3f0b71067d651692.exe matrix loder.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ba504e39d49d09ba3f0b71067d651692 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\matrix loder.exe\" .." matrix loder.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ba504e39d49d09ba3f0b71067d651692 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\matrix loder.exe\" .." matrix loder.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language matrix loder.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe 3116 matrix loder.exe -
Suspicious use of AdjustPrivilegeToken 33 IoCs
description pid Process Token: SeDebugPrivilege 3116 matrix loder.exe Token: 33 3116 matrix loder.exe Token: SeIncBasePriorityPrivilege 3116 matrix loder.exe Token: 33 3116 matrix loder.exe Token: SeIncBasePriorityPrivilege 3116 matrix loder.exe Token: 33 3116 matrix loder.exe Token: SeIncBasePriorityPrivilege 3116 matrix loder.exe Token: 33 3116 matrix loder.exe Token: SeIncBasePriorityPrivilege 3116 matrix loder.exe Token: 33 3116 matrix loder.exe Token: SeIncBasePriorityPrivilege 3116 matrix loder.exe Token: 33 3116 matrix loder.exe Token: SeIncBasePriorityPrivilege 3116 matrix loder.exe Token: 33 3116 matrix loder.exe Token: SeIncBasePriorityPrivilege 3116 matrix loder.exe Token: 33 3116 matrix loder.exe Token: SeIncBasePriorityPrivilege 3116 matrix loder.exe Token: 33 3116 matrix loder.exe Token: SeIncBasePriorityPrivilege 3116 matrix loder.exe Token: 33 3116 matrix loder.exe Token: SeIncBasePriorityPrivilege 3116 matrix loder.exe Token: 33 3116 matrix loder.exe Token: SeIncBasePriorityPrivilege 3116 matrix loder.exe Token: 33 3116 matrix loder.exe Token: SeIncBasePriorityPrivilege 3116 matrix loder.exe Token: 33 3116 matrix loder.exe Token: SeIncBasePriorityPrivilege 3116 matrix loder.exe Token: 33 3116 matrix loder.exe Token: SeIncBasePriorityPrivilege 3116 matrix loder.exe Token: 33 3116 matrix loder.exe Token: SeIncBasePriorityPrivilege 3116 matrix loder.exe Token: 33 3116 matrix loder.exe Token: SeIncBasePriorityPrivilege 3116 matrix loder.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3116 matrix loder.exe 3116 matrix loder.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\matrix loder.exe"C:\Users\Admin\AppData\Local\Temp\matrix loder.exe"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3116 -
C:\Users\Admin\AppData\Local\Temp\eb6c0665199b471191a006b7de4a93c6.exe"C:\Users\Admin\AppData\Local\Temp\eb6c0665199b471191a006b7de4a93c6.exe"2⤵PID:3852
-
-
C:\Users\Admin\AppData\Local\Temp\05598784cea345b7bf00754949e8d22c.exe"C:\Users\Admin\AppData\Local\Temp\05598784cea345b7bf00754949e8d22c.exe"2⤵PID:4472
-
-
C:\Users\Admin\AppData\Local\Temp\5a4dfeeea87f4ff989112d05e79405ea.exe"C:\Users\Admin\AppData\Local\Temp\5a4dfeeea87f4ff989112d05e79405ea.exe"2⤵PID:1716
-
-
C:\Users\Admin\AppData\Local\Temp\dc1bdf1f7dd347b59f957361a763722e.exe"C:\Users\Admin\AppData\Local\Temp\dc1bdf1f7dd347b59f957361a763722e.exe"2⤵PID:2240
-
-
C:\Users\Admin\AppData\Local\Temp\38df3daf9da9424bba5b40bdb215b412.exe"C:\Users\Admin\AppData\Local\Temp\38df3daf9da9424bba5b40bdb215b412.exe"2⤵PID:3964
-
-
C:\Users\Admin\AppData\Local\Temp\c63e0715022141e59e6dcc2689c1b614.exe"C:\Users\Admin\AppData\Local\Temp\c63e0715022141e59e6dcc2689c1b614.exe"2⤵PID:2144
-
-
C:\Users\Admin\AppData\Local\Temp\86bf581528ff4495b5c7a30c145f04a1.exe"C:\Users\Admin\AppData\Local\Temp\86bf581528ff4495b5c7a30c145f04a1.exe"2⤵PID:4616
-
-
C:\Users\Admin\AppData\Local\Temp\d3b065d259d34263b16763109fd9d50c.exe"C:\Users\Admin\AppData\Local\Temp\d3b065d259d34263b16763109fd9d50c.exe"2⤵PID:3352
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x478 0x37c1⤵PID:3664
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
997KB
MD528aaac578be4ce06cb695e4f927b4302
SHA1880ab0560b81e05e920f9ec1d6c0ecf5e04eaa7e
SHA2568929d3b749ff91527b8e407eff6bde4bb0bb27739313b5c0db0434cbf700dbfc
SHA512068698bda0543c773b36830f6760456e40e9046d9d20089ad88cb646ef5c7bd6c6716c6d59cfc7abd5bffb9129f5a7076e2f9c9b321795f224923f00b7b91374
-
Filesize
961KB
MD54723c3c04794c09bbcb6e03f48440f15
SHA1a5ef69c9dc9eacc2099d9c239146a0e360f1837f
SHA2560d635f035cdb2fd3afda768cd631481ff980957b614a3cf3fca6c592c6c06470
SHA5125b68e1cd3d6bb85b5f449014cc288423faea76ff0ecf8834047dac1ed6e84c4d858a7ed23abe3625d781391f636893736bf5c00474ad0995e75611c1557c5c4a
-
Filesize
345KB
MD58efb7339fe13cf8cea9f6445776655c0
SHA1081afd73c757c83825cf1e8ed4a4eab259d23b97
SHA256c1badbacd2abe44fe4e8685c8eee7e983bf8b6780cfca03ae31f8fcebc98b1fb
SHA5122a37e74aeff17b4f435d02a30019a017a4ff4fa29fc898229f6195876f53b38154c063cf052deebcc06785650f875d67eeb0de372a76df3c4e71bd4fc0392956