Analysis

  • max time kernel
    15s
  • max time network
    153s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    07-08-2021 22:17

General

  • Target

    bb5f523d4b4d9a8bfb0f0e89eff3559d228451476467b7b193e7686031398d3d.exe

  • Size

    100KB

  • MD5

    87e5df4b2d1ad17687a506394018aeb8

  • SHA1

    bfd775b8fc73d85f4127eaa4c3fb91123c5c78ff

  • SHA256

    bb5f523d4b4d9a8bfb0f0e89eff3559d228451476467b7b193e7686031398d3d

  • SHA512

    b6c8d4f334d3dcee4b6380b332beb12574c35ac355211e2454dd1e91899d8de578804e1293239a5a5ca5d723b42ddf5455803dd292447f874fdde137934e65fa

Malware Config

Signatures

  • Poullight

    Poullight is an information stealer first seen in March 2020.

  • Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
  • suricata: ET MALWARE Likely Malware CnC Hosted on 000webhostapp - POST to gate.php

    suricata: ET MALWARE Likely Malware CnC Hosted on 000webhostapp - POST to gate.php

  • suricata: ET MALWARE Trojan Generic - POST To gate.php with no accept headers

    suricata: ET MALWARE Trojan Generic - POST To gate.php with no accept headers

  • suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer

    suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 17 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bb5f523d4b4d9a8bfb0f0e89eff3559d228451476467b7b193e7686031398d3d.exe
    "C:\Users\Admin\AppData\Local\Temp\bb5f523d4b4d9a8bfb0f0e89eff3559d228451476467b7b193e7686031398d3d.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3984
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 3984 -s 1644
      2⤵
      • Suspicious use of NtCreateProcessExOtherParentProcess
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1548

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3984-114-0x0000022768FF0000-0x0000022768FF1000-memory.dmp
    Filesize

    4KB

  • memory/3984-116-0x000002276B5A0000-0x000002276B5A2000-memory.dmp
    Filesize

    8KB

  • memory/3984-117-0x00000227693F0000-0x00000227693F1000-memory.dmp
    Filesize

    4KB

  • memory/3984-118-0x000002276AC10000-0x000002276AC11000-memory.dmp
    Filesize

    4KB