Analysis

  • max time kernel
    151s
  • max time network
    179s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    20-05-2022 05:16

General

  • Target

    salikhack.exe

  • Size

    6.8MB

  • MD5

    92290d3c06e414319fb42fc0f7d981d0

  • SHA1

    6396501c4acd9e06a44f75f136528535e8003dce

  • SHA256

    3d10fcb6f54d01863d35000decd99bc4234266b668263035c55597e09c885f43

  • SHA512

    2d59d0121b48e442ba2d2af2639afe928664238ef51e819a634c7c71aebfbaf87f3e8a033285111046d2f50c9a286b611143aac5c227a000ec5d4be65e5bc294

Malware Config

Signatures

  • Poullight

    Poullight is an information stealer first seen in March 2020.

  • Poullight Stealer Payload 5 IoCs
  • suricata: ET MALWARE Likely Malware CnC Hosted on 000webhostapp - POST to gate.php

    suricata: ET MALWARE Likely Malware CnC Hosted on 000webhostapp - POST to gate.php

  • suricata: ET MALWARE Trojan Generic - POST To gate.php with no accept headers

    suricata: ET MALWARE Trojan Generic - POST To gate.php with no accept headers

  • suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer

    suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 13 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\salikhack.exe
    "C:\Users\Admin\AppData\Local\Temp\salikhack.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1712
    • C:\Users\Admin\AppData\Local\Temp\build.exe
      "C:\Users\Admin\AppData\Local\Temp\build.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1280
    • C:\Users\Admin\AppData\Local\Temp\sakl.exe
      "C:\Users\Admin\AppData\Local\Temp\sakl.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2044
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" https://jq.qq.com/?_wv=1027&k=57Cts1S
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2012
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2012 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1612
      • C:\Users\Admin\AppData\Local\Temp\asx0.dll
        "C:\Users\Admin\AppData\Local\Temp\asx0.dll"
        3⤵
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Enumerates system info in registry
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1624
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1624 -s 276
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:1724

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    1a9a3c63f46e8fa044dd60e3b5aed264

    SHA1

    e605690c86bb2d0705b8b859d50e2a81b4bd415a

    SHA256

    85a2963e7b1ba7a67a1b4d722c6859fad2f7702cb8d61b42cf68b5b6b421cf4a

    SHA512

    a51ea1d6a92971c62b9b9de447a29398d47c73a9a866053ee35e26246bf421b1b7df755da50b25e77df8ba5eba505e91279f76332cfbca03c952d041c321a8bf

  • C:\Users\Admin\AppData\Local\Temp\asx0.dll
    Filesize

    5.9MB

    MD5

    8d7cfce5a4716b167952e569a04ad5dc

    SHA1

    def4fa116d274403626ba33edc2604137689842f

    SHA256

    87979231d7f6bc01754071903035f784ffcb0a246a926b1d0b1e10493241907e

    SHA512

    d27123dacedca9933b484fcb432a411bb66ae5073fc6b3e2e178a5f554b69d84cf069bdddf35b83921670506bc2c0764e60310c6ca64adc89dd68e9fa90be26e

  • C:\Users\Admin\AppData\Local\Temp\asx0.dll
    Filesize

    5.9MB

    MD5

    8d7cfce5a4716b167952e569a04ad5dc

    SHA1

    def4fa116d274403626ba33edc2604137689842f

    SHA256

    87979231d7f6bc01754071903035f784ffcb0a246a926b1d0b1e10493241907e

    SHA512

    d27123dacedca9933b484fcb432a411bb66ae5073fc6b3e2e178a5f554b69d84cf069bdddf35b83921670506bc2c0764e60310c6ca64adc89dd68e9fa90be26e

  • C:\Users\Admin\AppData\Local\Temp\build.exe
    Filesize

    100KB

    MD5

    446afe801f9738ee2bfcb6791bdcf801

    SHA1

    fc43f35cd105e8954d77d8f7a48234e2576fe98e

    SHA256

    ba098b19bb32b3224c759d7853f4e0ebd5751f8cf5615bcdca3d52440fa07ccc

    SHA512

    f7748de18d35523aab05879944c1bfdda9a78c0b49e9b82c96b78f2e9dc8902848706857771c29cd769288d6ab98fb4b2398a92c240eca09e8dd27f297ebe92b

  • C:\Users\Admin\AppData\Local\Temp\build.exe
    Filesize

    100KB

    MD5

    446afe801f9738ee2bfcb6791bdcf801

    SHA1

    fc43f35cd105e8954d77d8f7a48234e2576fe98e

    SHA256

    ba098b19bb32b3224c759d7853f4e0ebd5751f8cf5615bcdca3d52440fa07ccc

    SHA512

    f7748de18d35523aab05879944c1bfdda9a78c0b49e9b82c96b78f2e9dc8902848706857771c29cd769288d6ab98fb4b2398a92c240eca09e8dd27f297ebe92b

  • C:\Users\Admin\AppData\Local\Temp\sakl.exe
    Filesize

    6.7MB

    MD5

    06dcffb60e21650a7853af9a88b9a04e

    SHA1

    0021f7ae05f12f54ba5edfb2fb0c957f12fb5f4f

    SHA256

    f60632e252f6fae33c0f9b4cbff4a646d35d1504d1ed0c32cb03884bd900befe

    SHA512

    2b9e599c5e6fd498d7120e5c17cf70f79b7d15c27f820305ea0a17b1612a6aee72a07d7a85a8ec35c8a9f9eeedc3e829cea6d6d7c9dcb86f58aa76137a4a17c6

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\Q81QKVZE.txt
    Filesize

    604B

    MD5

    57f9d47916ffb55890f415396fb71405

    SHA1

    47f7f74e4ae052aa87e186b0389851de3f90aabd

    SHA256

    c438178bbe4afcc998005f141eeb288017ba0f985464177c694e6b005e2d7140

    SHA512

    348a428aa07b87681a1e1ced4d2f6e81c7f71c3daf53045c0c31395df9d8c0929467ccf0ec746ee1dc9368ac584f5572acdbf7ce98949c76e01f6d19720023ca

  • \Users\Admin\AppData\Local\Temp\asx0.dll
    Filesize

    5.9MB

    MD5

    8d7cfce5a4716b167952e569a04ad5dc

    SHA1

    def4fa116d274403626ba33edc2604137689842f

    SHA256

    87979231d7f6bc01754071903035f784ffcb0a246a926b1d0b1e10493241907e

    SHA512

    d27123dacedca9933b484fcb432a411bb66ae5073fc6b3e2e178a5f554b69d84cf069bdddf35b83921670506bc2c0764e60310c6ca64adc89dd68e9fa90be26e

  • \Users\Admin\AppData\Local\Temp\asx0.dll
    Filesize

    5.9MB

    MD5

    8d7cfce5a4716b167952e569a04ad5dc

    SHA1

    def4fa116d274403626ba33edc2604137689842f

    SHA256

    87979231d7f6bc01754071903035f784ffcb0a246a926b1d0b1e10493241907e

    SHA512

    d27123dacedca9933b484fcb432a411bb66ae5073fc6b3e2e178a5f554b69d84cf069bdddf35b83921670506bc2c0764e60310c6ca64adc89dd68e9fa90be26e

  • \Users\Admin\AppData\Local\Temp\asx0.dll
    Filesize

    5.9MB

    MD5

    8d7cfce5a4716b167952e569a04ad5dc

    SHA1

    def4fa116d274403626ba33edc2604137689842f

    SHA256

    87979231d7f6bc01754071903035f784ffcb0a246a926b1d0b1e10493241907e

    SHA512

    d27123dacedca9933b484fcb432a411bb66ae5073fc6b3e2e178a5f554b69d84cf069bdddf35b83921670506bc2c0764e60310c6ca64adc89dd68e9fa90be26e

  • \Users\Admin\AppData\Local\Temp\asx0.dll
    Filesize

    5.9MB

    MD5

    8d7cfce5a4716b167952e569a04ad5dc

    SHA1

    def4fa116d274403626ba33edc2604137689842f

    SHA256

    87979231d7f6bc01754071903035f784ffcb0a246a926b1d0b1e10493241907e

    SHA512

    d27123dacedca9933b484fcb432a411bb66ae5073fc6b3e2e178a5f554b69d84cf069bdddf35b83921670506bc2c0764e60310c6ca64adc89dd68e9fa90be26e

  • \Users\Admin\AppData\Local\Temp\asx0.dll
    Filesize

    5.9MB

    MD5

    8d7cfce5a4716b167952e569a04ad5dc

    SHA1

    def4fa116d274403626ba33edc2604137689842f

    SHA256

    87979231d7f6bc01754071903035f784ffcb0a246a926b1d0b1e10493241907e

    SHA512

    d27123dacedca9933b484fcb432a411bb66ae5073fc6b3e2e178a5f554b69d84cf069bdddf35b83921670506bc2c0764e60310c6ca64adc89dd68e9fa90be26e

  • \Users\Admin\AppData\Local\Temp\asx0.dll
    Filesize

    5.9MB

    MD5

    8d7cfce5a4716b167952e569a04ad5dc

    SHA1

    def4fa116d274403626ba33edc2604137689842f

    SHA256

    87979231d7f6bc01754071903035f784ffcb0a246a926b1d0b1e10493241907e

    SHA512

    d27123dacedca9933b484fcb432a411bb66ae5073fc6b3e2e178a5f554b69d84cf069bdddf35b83921670506bc2c0764e60310c6ca64adc89dd68e9fa90be26e

  • \Users\Admin\AppData\Local\Temp\asx0.dll
    Filesize

    5.9MB

    MD5

    8d7cfce5a4716b167952e569a04ad5dc

    SHA1

    def4fa116d274403626ba33edc2604137689842f

    SHA256

    87979231d7f6bc01754071903035f784ffcb0a246a926b1d0b1e10493241907e

    SHA512

    d27123dacedca9933b484fcb432a411bb66ae5073fc6b3e2e178a5f554b69d84cf069bdddf35b83921670506bc2c0764e60310c6ca64adc89dd68e9fa90be26e

  • \Users\Admin\AppData\Local\Temp\asx0.dll
    Filesize

    5.9MB

    MD5

    8d7cfce5a4716b167952e569a04ad5dc

    SHA1

    def4fa116d274403626ba33edc2604137689842f

    SHA256

    87979231d7f6bc01754071903035f784ffcb0a246a926b1d0b1e10493241907e

    SHA512

    d27123dacedca9933b484fcb432a411bb66ae5073fc6b3e2e178a5f554b69d84cf069bdddf35b83921670506bc2c0764e60310c6ca64adc89dd68e9fa90be26e

  • \Users\Admin\AppData\Local\Temp\asx0.dll
    Filesize

    5.9MB

    MD5

    8d7cfce5a4716b167952e569a04ad5dc

    SHA1

    def4fa116d274403626ba33edc2604137689842f

    SHA256

    87979231d7f6bc01754071903035f784ffcb0a246a926b1d0b1e10493241907e

    SHA512

    d27123dacedca9933b484fcb432a411bb66ae5073fc6b3e2e178a5f554b69d84cf069bdddf35b83921670506bc2c0764e60310c6ca64adc89dd68e9fa90be26e

  • \Users\Admin\AppData\Local\Temp\build.exe
    Filesize

    100KB

    MD5

    446afe801f9738ee2bfcb6791bdcf801

    SHA1

    fc43f35cd105e8954d77d8f7a48234e2576fe98e

    SHA256

    ba098b19bb32b3224c759d7853f4e0ebd5751f8cf5615bcdca3d52440fa07ccc

    SHA512

    f7748de18d35523aab05879944c1bfdda9a78c0b49e9b82c96b78f2e9dc8902848706857771c29cd769288d6ab98fb4b2398a92c240eca09e8dd27f297ebe92b

  • \Users\Admin\AppData\Local\Temp\build.exe
    Filesize

    100KB

    MD5

    446afe801f9738ee2bfcb6791bdcf801

    SHA1

    fc43f35cd105e8954d77d8f7a48234e2576fe98e

    SHA256

    ba098b19bb32b3224c759d7853f4e0ebd5751f8cf5615bcdca3d52440fa07ccc

    SHA512

    f7748de18d35523aab05879944c1bfdda9a78c0b49e9b82c96b78f2e9dc8902848706857771c29cd769288d6ab98fb4b2398a92c240eca09e8dd27f297ebe92b

  • \Users\Admin\AppData\Local\Temp\sakl.exe
    Filesize

    6.7MB

    MD5

    06dcffb60e21650a7853af9a88b9a04e

    SHA1

    0021f7ae05f12f54ba5edfb2fb0c957f12fb5f4f

    SHA256

    f60632e252f6fae33c0f9b4cbff4a646d35d1504d1ed0c32cb03884bd900befe

    SHA512

    2b9e599c5e6fd498d7120e5c17cf70f79b7d15c27f820305ea0a17b1612a6aee72a07d7a85a8ec35c8a9f9eeedc3e829cea6d6d7c9dcb86f58aa76137a4a17c6

  • \Users\Admin\AppData\Local\Temp\sakl.exe
    Filesize

    6.7MB

    MD5

    06dcffb60e21650a7853af9a88b9a04e

    SHA1

    0021f7ae05f12f54ba5edfb2fb0c957f12fb5f4f

    SHA256

    f60632e252f6fae33c0f9b4cbff4a646d35d1504d1ed0c32cb03884bd900befe

    SHA512

    2b9e599c5e6fd498d7120e5c17cf70f79b7d15c27f820305ea0a17b1612a6aee72a07d7a85a8ec35c8a9f9eeedc3e829cea6d6d7c9dcb86f58aa76137a4a17c6

  • memory/1280-66-0x0000000000330000-0x0000000000350000-memory.dmp
    Filesize

    128KB

  • memory/1280-57-0x0000000000000000-mapping.dmp
  • memory/1624-510-0x0000000002740000-0x0000000002851000-memory.dmp
    Filesize

    1.1MB

  • memory/1624-518-0x0000000002740000-0x0000000002851000-memory.dmp
    Filesize

    1.1MB

  • memory/1624-486-0x0000000002740000-0x0000000002851000-memory.dmp
    Filesize

    1.1MB

  • memory/1624-488-0x0000000002740000-0x0000000002851000-memory.dmp
    Filesize

    1.1MB

  • memory/1624-487-0x0000000002740000-0x0000000002851000-memory.dmp
    Filesize

    1.1MB

  • memory/1624-489-0x0000000002740000-0x0000000002851000-memory.dmp
    Filesize

    1.1MB

  • memory/1624-490-0x0000000002740000-0x0000000002851000-memory.dmp
    Filesize

    1.1MB

  • memory/1624-491-0x0000000002740000-0x0000000002851000-memory.dmp
    Filesize

    1.1MB

  • memory/1624-492-0x0000000002740000-0x0000000002851000-memory.dmp
    Filesize

    1.1MB

  • memory/1624-493-0x0000000002740000-0x0000000002851000-memory.dmp
    Filesize

    1.1MB

  • memory/1624-494-0x0000000002740000-0x0000000002851000-memory.dmp
    Filesize

    1.1MB

  • memory/1624-495-0x0000000002740000-0x0000000002851000-memory.dmp
    Filesize

    1.1MB

  • memory/1624-496-0x0000000002740000-0x0000000002851000-memory.dmp
    Filesize

    1.1MB

  • memory/1624-497-0x0000000002740000-0x0000000002851000-memory.dmp
    Filesize

    1.1MB

  • memory/1624-498-0x0000000002740000-0x0000000002851000-memory.dmp
    Filesize

    1.1MB

  • memory/1624-499-0x0000000002740000-0x0000000002851000-memory.dmp
    Filesize

    1.1MB

  • memory/1624-500-0x0000000002740000-0x0000000002851000-memory.dmp
    Filesize

    1.1MB

  • memory/1624-502-0x0000000002740000-0x0000000002851000-memory.dmp
    Filesize

    1.1MB

  • memory/1624-504-0x0000000002740000-0x0000000002851000-memory.dmp
    Filesize

    1.1MB

  • memory/1624-503-0x0000000002740000-0x0000000002851000-memory.dmp
    Filesize

    1.1MB

  • memory/1624-505-0x0000000002740000-0x0000000002851000-memory.dmp
    Filesize

    1.1MB

  • memory/1624-509-0x0000000002740000-0x0000000002851000-memory.dmp
    Filesize

    1.1MB

  • memory/1624-485-0x0000000002740000-0x0000000002851000-memory.dmp
    Filesize

    1.1MB

  • memory/1624-508-0x0000000002740000-0x0000000002851000-memory.dmp
    Filesize

    1.1MB

  • memory/1624-511-0x0000000002740000-0x0000000002851000-memory.dmp
    Filesize

    1.1MB

  • memory/1624-507-0x0000000002740000-0x0000000002851000-memory.dmp
    Filesize

    1.1MB

  • memory/1624-513-0x0000000002740000-0x0000000002851000-memory.dmp
    Filesize

    1.1MB

  • memory/1624-514-0x0000000002740000-0x0000000002851000-memory.dmp
    Filesize

    1.1MB

  • memory/1624-512-0x0000000002740000-0x0000000002851000-memory.dmp
    Filesize

    1.1MB

  • memory/1624-515-0x0000000002740000-0x0000000002851000-memory.dmp
    Filesize

    1.1MB

  • memory/1624-516-0x0000000002740000-0x0000000002851000-memory.dmp
    Filesize

    1.1MB

  • memory/1624-506-0x0000000002740000-0x0000000002851000-memory.dmp
    Filesize

    1.1MB

  • memory/1624-517-0x0000000002740000-0x0000000002851000-memory.dmp
    Filesize

    1.1MB

  • memory/1624-482-0x0000000002740000-0x0000000002851000-memory.dmp
    Filesize

    1.1MB

  • memory/1624-501-0x0000000002740000-0x0000000002851000-memory.dmp
    Filesize

    1.1MB

  • memory/1624-519-0x0000000002740000-0x0000000002851000-memory.dmp
    Filesize

    1.1MB

  • memory/1624-520-0x0000000002740000-0x0000000002851000-memory.dmp
    Filesize

    1.1MB

  • memory/1624-521-0x0000000002740000-0x0000000002851000-memory.dmp
    Filesize

    1.1MB

  • memory/1624-522-0x0000000002740000-0x0000000002851000-memory.dmp
    Filesize

    1.1MB

  • memory/1624-524-0x0000000002740000-0x0000000002851000-memory.dmp
    Filesize

    1.1MB

  • memory/1624-525-0x0000000002740000-0x0000000002851000-memory.dmp
    Filesize

    1.1MB

  • memory/1624-526-0x0000000002740000-0x0000000002851000-memory.dmp
    Filesize

    1.1MB

  • memory/1624-527-0x0000000002740000-0x0000000002851000-memory.dmp
    Filesize

    1.1MB

  • memory/1624-523-0x0000000002740000-0x0000000002851000-memory.dmp
    Filesize

    1.1MB

  • memory/1624-529-0x0000000002740000-0x0000000002851000-memory.dmp
    Filesize

    1.1MB

  • memory/1624-528-0x0000000002740000-0x0000000002851000-memory.dmp
    Filesize

    1.1MB

  • memory/1624-531-0x0000000002740000-0x0000000002851000-memory.dmp
    Filesize

    1.1MB

  • memory/1624-532-0x0000000002740000-0x0000000002851000-memory.dmp
    Filesize

    1.1MB

  • memory/1624-533-0x0000000002740000-0x0000000002851000-memory.dmp
    Filesize

    1.1MB

  • memory/1624-530-0x0000000002740000-0x0000000002851000-memory.dmp
    Filesize

    1.1MB

  • memory/1624-534-0x0000000002740000-0x0000000002851000-memory.dmp
    Filesize

    1.1MB

  • memory/1624-536-0x0000000002740000-0x0000000002851000-memory.dmp
    Filesize

    1.1MB

  • memory/1624-537-0x0000000002740000-0x0000000002851000-memory.dmp
    Filesize

    1.1MB

  • memory/1624-538-0x0000000002740000-0x0000000002851000-memory.dmp
    Filesize

    1.1MB

  • memory/1624-535-0x0000000002740000-0x0000000002851000-memory.dmp
    Filesize

    1.1MB

  • memory/1624-484-0x0000000002740000-0x0000000002851000-memory.dmp
    Filesize

    1.1MB

  • memory/1624-483-0x0000000002740000-0x0000000002851000-memory.dmp
    Filesize

    1.1MB

  • memory/1624-481-0x0000000002740000-0x0000000002851000-memory.dmp
    Filesize

    1.1MB

  • memory/1624-69-0x0000000000000000-mapping.dmp
  • memory/1624-480-0x0000000002740000-0x0000000002851000-memory.dmp
    Filesize

    1.1MB

  • memory/1624-479-0x0000000002740000-0x0000000002851000-memory.dmp
    Filesize

    1.1MB

  • memory/1624-73-0x0000000076150000-0x0000000076197000-memory.dmp
    Filesize

    284KB

  • memory/1712-54-0x0000000075501000-0x0000000075503000-memory.dmp
    Filesize

    8KB

  • memory/1724-4831-0x0000000000000000-mapping.dmp
  • memory/2044-65-0x0000000002320000-0x000000000242D000-memory.dmp
    Filesize

    1.1MB

  • memory/2044-62-0x0000000000000000-mapping.dmp