Analysis

  • max time kernel
    47s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    24-05-2022 18:36

General

  • Target

    fe75c6dd720394044ce6f42835d73af170ee8a0c4dc937781c0bcb1abe823571.exe

  • Size

    100KB

  • MD5

    9afb72148ccd26b39a6627ce80881f52

  • SHA1

    edaf644e5115a920909ed2c40b38f7aafeb22d9f

  • SHA256

    fe75c6dd720394044ce6f42835d73af170ee8a0c4dc937781c0bcb1abe823571

  • SHA512

    806ad09c08bdd9646ca2165a2f18282840403e4c46462735dbe20442e762b4974896d508cec0e863e95bc3a4fe743f5921e0d676fa72a443619fab652aec3106

Malware Config

Signatures

  • Poullight

    Poullight is an information stealer first seen in March 2020.

  • Poullight Stealer Payload 1 IoCs
  • suricata: ET MALWARE Trojan Generic - POST To gate.php with no accept headers

    suricata: ET MALWARE Trojan Generic - POST To gate.php with no accept headers

  • suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer

    suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fe75c6dd720394044ce6f42835d73af170ee8a0c4dc937781c0bcb1abe823571.exe
    "C:\Users\Admin\AppData\Local\Temp\fe75c6dd720394044ce6f42835d73af170ee8a0c4dc937781c0bcb1abe823571.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1932

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1932-54-0x0000000000A70000-0x0000000000A90000-memory.dmp
    Filesize

    128KB