Analysis

  • max time kernel
    43s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    25-06-2022 05:04

General

  • Target

    c4e8282ef48e91716ace408edc83347bbce4ed299abaeae7c4100a61402eaf68.exe

  • Size

    129KB

  • MD5

    67e323570213378a54e19b0ccdcf49f0

  • SHA1

    e95460434d6de33361167b935ce56c05b85250b9

  • SHA256

    c4e8282ef48e91716ace408edc83347bbce4ed299abaeae7c4100a61402eaf68

  • SHA512

    96e8dbe1fd75fac932a40bcf6fe4864596170317e37d0e93ce17877d61430e97ff9b32a7d7a178d463fcff421147e3817506d839041a067721991f3aebd3e7e4

Malware Config

Signatures

  • Poullight

    Poullight is an information stealer first seen in March 2020.

  • Poullight Stealer Payload 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c4e8282ef48e91716ace408edc83347bbce4ed299abaeae7c4100a61402eaf68.exe
    "C:\Users\Admin\AppData\Local\Temp\c4e8282ef48e91716ace408edc83347bbce4ed299abaeae7c4100a61402eaf68.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:532
    • C:\Users\Admin\AppData\Local\XLoader-ExLibs\ExportLibrarys.exe
      "C:\Users\Admin\AppData\Local\XLoader-ExLibs\ExportLibrarys.exe" xrun
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1980

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\XLoader-ExLibs\ExportLibrarys.exe

    Filesize

    129KB

    MD5

    67e323570213378a54e19b0ccdcf49f0

    SHA1

    e95460434d6de33361167b935ce56c05b85250b9

    SHA256

    c4e8282ef48e91716ace408edc83347bbce4ed299abaeae7c4100a61402eaf68

    SHA512

    96e8dbe1fd75fac932a40bcf6fe4864596170317e37d0e93ce17877d61430e97ff9b32a7d7a178d463fcff421147e3817506d839041a067721991f3aebd3e7e4

  • C:\Users\Admin\AppData\Local\XLoader-ExLibs\ExportLibrarys.exe

    Filesize

    129KB

    MD5

    67e323570213378a54e19b0ccdcf49f0

    SHA1

    e95460434d6de33361167b935ce56c05b85250b9

    SHA256

    c4e8282ef48e91716ace408edc83347bbce4ed299abaeae7c4100a61402eaf68

    SHA512

    96e8dbe1fd75fac932a40bcf6fe4864596170317e37d0e93ce17877d61430e97ff9b32a7d7a178d463fcff421147e3817506d839041a067721991f3aebd3e7e4

  • \Users\Admin\AppData\Local\ExLibPLL\MemVirtualFix.dll

    Filesize

    107KB

    MD5

    45b903a661341881d53c293b9c42b3c3

    SHA1

    7d8687d355c0bbf2bd31cdc1a2d7764c8699f5fd

    SHA256

    5ff1407140853c47611945bda5b035aee3936d3287a4450876dcb87c48acc642

    SHA512

    d7340329d7adce17e65e3383fef9ba3ea9cd116359ddfabb3f1a0a338de0ff564118086cbeb306d9df5bc1e9412083a6825e413431f4e367838797f9dff31a80

  • \Users\Admin\AppData\Local\XLoader-ExLibs\ExportLibrarys.exe

    Filesize

    129KB

    MD5

    67e323570213378a54e19b0ccdcf49f0

    SHA1

    e95460434d6de33361167b935ce56c05b85250b9

    SHA256

    c4e8282ef48e91716ace408edc83347bbce4ed299abaeae7c4100a61402eaf68

    SHA512

    96e8dbe1fd75fac932a40bcf6fe4864596170317e37d0e93ce17877d61430e97ff9b32a7d7a178d463fcff421147e3817506d839041a067721991f3aebd3e7e4

  • \Users\Admin\AppData\Local\XLoader-ExLibs\ExportLibrarys.exe

    Filesize

    129KB

    MD5

    67e323570213378a54e19b0ccdcf49f0

    SHA1

    e95460434d6de33361167b935ce56c05b85250b9

    SHA256

    c4e8282ef48e91716ace408edc83347bbce4ed299abaeae7c4100a61402eaf68

    SHA512

    96e8dbe1fd75fac932a40bcf6fe4864596170317e37d0e93ce17877d61430e97ff9b32a7d7a178d463fcff421147e3817506d839041a067721991f3aebd3e7e4

  • memory/532-54-0x0000000001100000-0x0000000001126000-memory.dmp

    Filesize

    152KB

  • memory/532-55-0x0000000075701000-0x0000000075703000-memory.dmp

    Filesize

    8KB

  • memory/1980-61-0x0000000000B80000-0x0000000000BA6000-memory.dmp

    Filesize

    152KB