Analysis
-
max time kernel
47s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
24-05-2022 18:36
Static task
static1
Behavioral task
behavioral1
Sample
fe75c6dd720394044ce6f42835d73af170ee8a0c4dc937781c0bcb1abe823571.exe
Resource
win7-20220414-en
General
-
Target
fe75c6dd720394044ce6f42835d73af170ee8a0c4dc937781c0bcb1abe823571.exe
-
Size
100KB
-
MD5
9afb72148ccd26b39a6627ce80881f52
-
SHA1
edaf644e5115a920909ed2c40b38f7aafeb22d9f
-
SHA256
fe75c6dd720394044ce6f42835d73af170ee8a0c4dc937781c0bcb1abe823571
-
SHA512
806ad09c08bdd9646ca2165a2f18282840403e4c46462735dbe20442e762b4974896d508cec0e863e95bc3a4fe743f5921e0d676fa72a443619fab652aec3106
Malware Config
Signatures
-
Poullight Stealer Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1932-54-0x0000000000A70000-0x0000000000A90000-memory.dmp family_poullight -
suricata: ET MALWARE Trojan Generic - POST To gate.php with no accept headers
suricata: ET MALWARE Trojan Generic - POST To gate.php with no accept headers
-
suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer
suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
fe75c6dd720394044ce6f42835d73af170ee8a0c4dc937781c0bcb1abe823571.exepid process 1932 fe75c6dd720394044ce6f42835d73af170ee8a0c4dc937781c0bcb1abe823571.exe 1932 fe75c6dd720394044ce6f42835d73af170ee8a0c4dc937781c0bcb1abe823571.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
fe75c6dd720394044ce6f42835d73af170ee8a0c4dc937781c0bcb1abe823571.exedescription pid process Token: SeDebugPrivilege 1932 fe75c6dd720394044ce6f42835d73af170ee8a0c4dc937781c0bcb1abe823571.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe75c6dd720394044ce6f42835d73af170ee8a0c4dc937781c0bcb1abe823571.exe"C:\Users\Admin\AppData\Local\Temp\fe75c6dd720394044ce6f42835d73af170ee8a0c4dc937781c0bcb1abe823571.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1932-54-0x0000000000A70000-0x0000000000A90000-memory.dmpFilesize
128KB