Analysis
-
max time kernel
43s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25-06-2022 05:04
Static task
static1
Behavioral task
behavioral1
Sample
c4e8282ef48e91716ace408edc83347bbce4ed299abaeae7c4100a61402eaf68.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
c4e8282ef48e91716ace408edc83347bbce4ed299abaeae7c4100a61402eaf68.exe
Resource
win10v2004-20220414-en
General
-
Target
c4e8282ef48e91716ace408edc83347bbce4ed299abaeae7c4100a61402eaf68.exe
-
Size
129KB
-
MD5
67e323570213378a54e19b0ccdcf49f0
-
SHA1
e95460434d6de33361167b935ce56c05b85250b9
-
SHA256
c4e8282ef48e91716ace408edc83347bbce4ed299abaeae7c4100a61402eaf68
-
SHA512
96e8dbe1fd75fac932a40bcf6fe4864596170317e37d0e93ce17877d61430e97ff9b32a7d7a178d463fcff421147e3817506d839041a067721991f3aebd3e7e4
Malware Config
Signatures
-
Poullight Stealer Payload 1 IoCs
resource yara_rule behavioral1/files/0x0006000000014138-63.dat family_poullight -
Executes dropped EXE 1 IoCs
pid Process 1980 ExportLibrarys.exe -
Loads dropped DLL 3 IoCs
pid Process 532 c4e8282ef48e91716ace408edc83347bbce4ed299abaeae7c4100a61402eaf68.exe 532 c4e8282ef48e91716ace408edc83347bbce4ed299abaeae7c4100a61402eaf68.exe 1980 ExportLibrarys.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1980 ExportLibrarys.exe 1980 ExportLibrarys.exe 1980 ExportLibrarys.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1980 ExportLibrarys.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 532 wrote to memory of 1980 532 c4e8282ef48e91716ace408edc83347bbce4ed299abaeae7c4100a61402eaf68.exe 28 PID 532 wrote to memory of 1980 532 c4e8282ef48e91716ace408edc83347bbce4ed299abaeae7c4100a61402eaf68.exe 28 PID 532 wrote to memory of 1980 532 c4e8282ef48e91716ace408edc83347bbce4ed299abaeae7c4100a61402eaf68.exe 28 PID 532 wrote to memory of 1980 532 c4e8282ef48e91716ace408edc83347bbce4ed299abaeae7c4100a61402eaf68.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4e8282ef48e91716ace408edc83347bbce4ed299abaeae7c4100a61402eaf68.exe"C:\Users\Admin\AppData\Local\Temp\c4e8282ef48e91716ace408edc83347bbce4ed299abaeae7c4100a61402eaf68.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Users\Admin\AppData\Local\XLoader-ExLibs\ExportLibrarys.exe"C:\Users\Admin\AppData\Local\XLoader-ExLibs\ExportLibrarys.exe" xrun2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1980
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129KB
MD567e323570213378a54e19b0ccdcf49f0
SHA1e95460434d6de33361167b935ce56c05b85250b9
SHA256c4e8282ef48e91716ace408edc83347bbce4ed299abaeae7c4100a61402eaf68
SHA51296e8dbe1fd75fac932a40bcf6fe4864596170317e37d0e93ce17877d61430e97ff9b32a7d7a178d463fcff421147e3817506d839041a067721991f3aebd3e7e4
-
Filesize
129KB
MD567e323570213378a54e19b0ccdcf49f0
SHA1e95460434d6de33361167b935ce56c05b85250b9
SHA256c4e8282ef48e91716ace408edc83347bbce4ed299abaeae7c4100a61402eaf68
SHA51296e8dbe1fd75fac932a40bcf6fe4864596170317e37d0e93ce17877d61430e97ff9b32a7d7a178d463fcff421147e3817506d839041a067721991f3aebd3e7e4
-
Filesize
107KB
MD545b903a661341881d53c293b9c42b3c3
SHA17d8687d355c0bbf2bd31cdc1a2d7764c8699f5fd
SHA2565ff1407140853c47611945bda5b035aee3936d3287a4450876dcb87c48acc642
SHA512d7340329d7adce17e65e3383fef9ba3ea9cd116359ddfabb3f1a0a338de0ff564118086cbeb306d9df5bc1e9412083a6825e413431f4e367838797f9dff31a80
-
Filesize
129KB
MD567e323570213378a54e19b0ccdcf49f0
SHA1e95460434d6de33361167b935ce56c05b85250b9
SHA256c4e8282ef48e91716ace408edc83347bbce4ed299abaeae7c4100a61402eaf68
SHA51296e8dbe1fd75fac932a40bcf6fe4864596170317e37d0e93ce17877d61430e97ff9b32a7d7a178d463fcff421147e3817506d839041a067721991f3aebd3e7e4
-
Filesize
129KB
MD567e323570213378a54e19b0ccdcf49f0
SHA1e95460434d6de33361167b935ce56c05b85250b9
SHA256c4e8282ef48e91716ace408edc83347bbce4ed299abaeae7c4100a61402eaf68
SHA51296e8dbe1fd75fac932a40bcf6fe4864596170317e37d0e93ce17877d61430e97ff9b32a7d7a178d463fcff421147e3817506d839041a067721991f3aebd3e7e4