Analysis

  • max time kernel
    140s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-04-2024 01:49

General

  • Target

    $PLUGINSDIR/lqwipxz.dll

  • Size

    17KB

  • MD5

    148e2440033d4c9c35f68f4072ba5d1e

  • SHA1

    480b6d0a378fa7e785e79de7e0f757dd7e8124e3

  • SHA256

    47094fa8accf250c8df2021a0180140be6f1091415d44e9927e5ed6ba6c60bb4

  • SHA512

    1a272ef57ad29b3481a1f18530168d1af7cc6a20bef32249412e0eadcc7dbd306157c3b8fca971ac21bde9cf7229370124cce29038bd3cc1ef93a03008c0367d

  • SSDEEP

    384:mD4wra/y5RdIX0lcjIbqjC+/6ztBp9+JTjL:K4wrNp60lC8+C+/OpuTj

Malware Config

Extracted

Family

matiex

C2

https://api.telegram.org/bot1395392888:AAFrJovDdZICOFB0gX0eGWrAUzEKCRpv8xo/sendMessage?chat_id=1300181783

Signatures

  • Matiex

    Matiex is a keylogger and infostealer first seen in July 2020.

  • Matiex Main payload 6 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\lqwipxz.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4652
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\lqwipxz.dll,#1
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4408
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\lqwipxz.dll,#1
        3⤵
        • Blocklisted process makes network request
        • Accesses Microsoft Outlook profiles
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:1596
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1596 -s 1752
          4⤵
          • Program crash
          PID:2380
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 1596 -ip 1596
    1⤵
      PID:1004
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1416 --field-trial-handle=3240,i,13319578961094268484,16557498665191861597,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:1748

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Credential Access

      Unsecured Credentials

      2
      T1552

      Credentials In Files

      2
      T1552.001

      Collection

      Data from Local System

      2
      T1005

      Email Collection

      1
      T1114

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1596-8-0x0000000005210000-0x0000000005286000-memory.dmp
        Filesize

        472KB

      • memory/1596-13-0x0000000006290000-0x0000000006834000-memory.dmp
        Filesize

        5.6MB

      • memory/1596-9-0x0000000005320000-0x0000000005330000-memory.dmp
        Filesize

        64KB

      • memory/1596-3-0x0000000000400000-0x0000000000484000-memory.dmp
        Filesize

        528KB

      • memory/1596-4-0x0000000000400000-0x0000000000484000-memory.dmp
        Filesize

        528KB

      • memory/1596-17-0x0000000005320000-0x0000000005330000-memory.dmp
        Filesize

        64KB

      • memory/1596-6-0x00000000748A0000-0x0000000075050000-memory.dmp
        Filesize

        7.7MB

      • memory/1596-7-0x0000000005320000-0x0000000005330000-memory.dmp
        Filesize

        64KB

      • memory/1596-2-0x0000000000400000-0x0000000000484000-memory.dmp
        Filesize

        528KB

      • memory/1596-18-0x00000000748A0000-0x0000000075050000-memory.dmp
        Filesize

        7.7MB

      • memory/1596-11-0x00000000054E0000-0x0000000005546000-memory.dmp
        Filesize

        408KB

      • memory/1596-10-0x0000000005440000-0x00000000054DC000-memory.dmp
        Filesize

        624KB

      • memory/1596-12-0x0000000005320000-0x0000000005330000-memory.dmp
        Filesize

        64KB

      • memory/1596-1-0x0000000000400000-0x0000000000484000-memory.dmp
        Filesize

        528KB

      • memory/1596-14-0x00000000748A0000-0x0000000075050000-memory.dmp
        Filesize

        7.7MB

      • memory/1596-15-0x0000000005320000-0x0000000005330000-memory.dmp
        Filesize

        64KB

      • memory/1596-16-0x0000000005320000-0x0000000005330000-memory.dmp
        Filesize

        64KB

      • memory/4408-5-0x0000000010000000-0x0000000010008000-memory.dmp
        Filesize

        32KB

      • memory/4408-0-0x0000000010000000-0x0000000010008000-memory.dmp
        Filesize

        32KB