Analysis

  • max time kernel
    184s
  • max time network
    190s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    08-05-2022 06:15

General

  • Target

    edca2f8c36f24dc6520a168a499c477ff880a0fb679bf3e08b227afb42805309.exe

  • Size

    151KB

  • MD5

    9343386c659f66a4ddf860b64cf1fc55

  • SHA1

    9977986d2c647a9a51ec2a777d510d77f6006232

  • SHA256

    edca2f8c36f24dc6520a168a499c477ff880a0fb679bf3e08b227afb42805309

  • SHA512

    0a0a13acd2677fa5584dbc54bfe88358ffd8288002c6c23c9e3f7995d5b10c19fee588daf0df2a5030559af7c820d7a36b0f62aed6e514343769d0873256fd6b

Malware Config

Signatures

  • Poullight

    Poullight is an information stealer first seen in March 2020.

  • Poullight Stealer Payload 5 IoCs
  • suricata: ET MALWARE Likely Malware CnC Hosted on 000webhostapp - POST to gate.php

    suricata: ET MALWARE Likely Malware CnC Hosted on 000webhostapp - POST to gate.php

  • suricata: ET MALWARE Matrix Max Stealer Exfiltration Observed

    suricata: ET MALWARE Matrix Max Stealer Exfiltration Observed

  • suricata: ET MALWARE Trojan Generic - POST To gate.php with no accept headers

    suricata: ET MALWARE Trojan Generic - POST To gate.php with no accept headers

  • suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer

    suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer

  • suricata: ET MALWARE Win32/X-Files Stealer Activity

    suricata: ET MALWARE Win32/X-Files Stealer Activity

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\edca2f8c36f24dc6520a168a499c477ff880a0fb679bf3e08b227afb42805309.exe
    "C:\Users\Admin\AppData\Local\Temp\edca2f8c36f24dc6520a168a499c477ff880a0fb679bf3e08b227afb42805309.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1684
    • C:\Users\Admin\AppData\Local\Temp\Deobfusactor.exe
      "C:\Users\Admin\AppData\Local\Temp\Deobfusactor.exe"
      2⤵
      • Executes dropped EXE
      PID:2044
    • C:\Users\Admin\AppData\Local\Temp\webhost.exe
      "C:\Users\Admin\AppData\Local\Temp\webhost.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1584

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Deobfusactor.exe
    Filesize

    9KB

    MD5

    b95f17b473384cecf82f66c6a0e2e50c

    SHA1

    b232c45654c6cf7bc912c8f02cd86a31289ec2ab

    SHA256

    c38d762ec06d3fe74de40cbd46bab3989d14cfe2e83b8c63077a3602f8a7a3da

    SHA512

    29840efd18f7b3fe7702bb147e58a62193ae16f33dca206bf008dface5281a69a60a3c678b5748f2443362801b9334cb518aaba39f49f0880d5d7d525a6cf936

  • C:\Users\Admin\AppData\Local\Temp\Deobfusactor.exe
    Filesize

    9KB

    MD5

    b95f17b473384cecf82f66c6a0e2e50c

    SHA1

    b232c45654c6cf7bc912c8f02cd86a31289ec2ab

    SHA256

    c38d762ec06d3fe74de40cbd46bab3989d14cfe2e83b8c63077a3602f8a7a3da

    SHA512

    29840efd18f7b3fe7702bb147e58a62193ae16f33dca206bf008dface5281a69a60a3c678b5748f2443362801b9334cb518aaba39f49f0880d5d7d525a6cf936

  • C:\Users\Admin\AppData\Local\Temp\webhost.exe
    Filesize

    97KB

    MD5

    4813c32e67f6a4f67b995068c3fa7445

    SHA1

    e5e4a2d10c3ea17a3c75e54cd08cad97f40526aa

    SHA256

    0dce39e05706807ad8222360c440b8ef612198fd350bced53bd8ffe69f62cad8

    SHA512

    5d3b1707115511656178a684ffd680661983fef751f9bb4973a4dcb13439c0ff71203441b392dec7c7fec4a9392e3317f40aa76d333bf272c80d6b8966c3f4e1

  • C:\Users\Admin\AppData\Local\Temp\webhost.exe
    Filesize

    97KB

    MD5

    4813c32e67f6a4f67b995068c3fa7445

    SHA1

    e5e4a2d10c3ea17a3c75e54cd08cad97f40526aa

    SHA256

    0dce39e05706807ad8222360c440b8ef612198fd350bced53bd8ffe69f62cad8

    SHA512

    5d3b1707115511656178a684ffd680661983fef751f9bb4973a4dcb13439c0ff71203441b392dec7c7fec4a9392e3317f40aa76d333bf272c80d6b8966c3f4e1

  • \Users\Admin\AppData\Local\Temp\Deobfusactor.exe
    Filesize

    9KB

    MD5

    b95f17b473384cecf82f66c6a0e2e50c

    SHA1

    b232c45654c6cf7bc912c8f02cd86a31289ec2ab

    SHA256

    c38d762ec06d3fe74de40cbd46bab3989d14cfe2e83b8c63077a3602f8a7a3da

    SHA512

    29840efd18f7b3fe7702bb147e58a62193ae16f33dca206bf008dface5281a69a60a3c678b5748f2443362801b9334cb518aaba39f49f0880d5d7d525a6cf936

  • \Users\Admin\AppData\Local\Temp\webhost.exe
    Filesize

    97KB

    MD5

    4813c32e67f6a4f67b995068c3fa7445

    SHA1

    e5e4a2d10c3ea17a3c75e54cd08cad97f40526aa

    SHA256

    0dce39e05706807ad8222360c440b8ef612198fd350bced53bd8ffe69f62cad8

    SHA512

    5d3b1707115511656178a684ffd680661983fef751f9bb4973a4dcb13439c0ff71203441b392dec7c7fec4a9392e3317f40aa76d333bf272c80d6b8966c3f4e1

  • \Users\Admin\AppData\Local\Temp\webhost.exe
    Filesize

    97KB

    MD5

    4813c32e67f6a4f67b995068c3fa7445

    SHA1

    e5e4a2d10c3ea17a3c75e54cd08cad97f40526aa

    SHA256

    0dce39e05706807ad8222360c440b8ef612198fd350bced53bd8ffe69f62cad8

    SHA512

    5d3b1707115511656178a684ffd680661983fef751f9bb4973a4dcb13439c0ff71203441b392dec7c7fec4a9392e3317f40aa76d333bf272c80d6b8966c3f4e1

  • memory/1584-63-0x0000000000000000-mapping.dmp
  • memory/1584-67-0x0000000001040000-0x000000000105E000-memory.dmp
    Filesize

    120KB

  • memory/1684-54-0x0000000001180000-0x0000000001188000-memory.dmp
    Filesize

    32KB

  • memory/1684-55-0x0000000075DF1000-0x0000000075DF3000-memory.dmp
    Filesize

    8KB

  • memory/2044-60-0x0000000000FE0000-0x0000000000FE8000-memory.dmp
    Filesize

    32KB

  • memory/2044-57-0x0000000000000000-mapping.dmp