Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2023 15:59
Static task
static1
Behavioral task
behavioral1
Sample
68e275d3c9a9ed2cb994b9e1600e50b0971c28f609f198bf7f2764cad0518e5a.exe
Resource
win7-20221111-en
General
-
Target
68e275d3c9a9ed2cb994b9e1600e50b0971c28f609f198bf7f2764cad0518e5a.exe
-
Size
520KB
-
MD5
5ba7d69bea5783cb7b6161fe55edfb02
-
SHA1
c443a1c1d861b436c2542f60746e2ce9e673b7f0
-
SHA256
68e275d3c9a9ed2cb994b9e1600e50b0971c28f609f198bf7f2764cad0518e5a
-
SHA512
a7a845353729ab178a2cbe52f980d14e4a00985225cc5de8f87a9efca17e89c86af63adb3764bb0089aa051e1b9e07ac31a69117c7a3d24e5eb1b2c121057652
-
SSDEEP
12288:aRZ+IoG/n9IQxW3OBsee2X+t4RbmbxbNUO+X1Y/eBHCqiQWAEd:U2G/nvxW3Ww0tmbXUHXHiw
Malware Config
Signatures
-
Poullight Stealer payload 3 IoCs
resource yara_rule behavioral2/files/0x0007000000023167-138.dat family_poullight behavioral2/files/0x0007000000023167-139.dat family_poullight behavioral2/memory/2176-140-0x000001A0C3980000-0x000001A0C39A0000-memory.dmp family_poullight -
Executes dropped EXE 2 IoCs
pid Process 448 Stealer.sfx.exe 2176 Stealer.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 68e275d3c9a9ed2cb994b9e1600e50b0971c28f609f198bf7f2764cad0518e5a.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation Stealer.sfx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2176 Stealer.exe 2176 Stealer.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2176 Stealer.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4948 wrote to memory of 4444 4948 68e275d3c9a9ed2cb994b9e1600e50b0971c28f609f198bf7f2764cad0518e5a.exe 81 PID 4948 wrote to memory of 4444 4948 68e275d3c9a9ed2cb994b9e1600e50b0971c28f609f198bf7f2764cad0518e5a.exe 81 PID 4948 wrote to memory of 4444 4948 68e275d3c9a9ed2cb994b9e1600e50b0971c28f609f198bf7f2764cad0518e5a.exe 81 PID 4444 wrote to memory of 448 4444 cmd.exe 84 PID 4444 wrote to memory of 448 4444 cmd.exe 84 PID 4444 wrote to memory of 448 4444 cmd.exe 84 PID 448 wrote to memory of 2176 448 Stealer.sfx.exe 85 PID 448 wrote to memory of 2176 448 Stealer.sfx.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\68e275d3c9a9ed2cb994b9e1600e50b0971c28f609f198bf7f2764cad0518e5a.exe"C:\Users\Admin\AppData\Local\Temp\68e275d3c9a9ed2cb994b9e1600e50b0971c28f609f198bf7f2764cad0518e5a.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\fud.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Stealer.sfx.exeStealer.sfx.exe -p123 -dC:\Users\Admin\AppData\Local\Temp3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\Stealer.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\Stealer.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2176
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
353KB
MD5c95fb0b77377c86900271823d1ab5fb3
SHA194e8bb91a3556e475d0bcca83008f78bec04d16c
SHA2561517919c4b3eaf5c1f15a764239cebaf030dff6762a488e48cad89914554aa64
SHA5127290e825f91cafc82097d38a04dcee720a01851280a776cf8a6259f03d347692090f76f9fc81a67d099d897c2c4c19edf084c385321d0913d431114d956a895f
-
Filesize
353KB
MD5c95fb0b77377c86900271823d1ab5fb3
SHA194e8bb91a3556e475d0bcca83008f78bec04d16c
SHA2561517919c4b3eaf5c1f15a764239cebaf030dff6762a488e48cad89914554aa64
SHA5127290e825f91cafc82097d38a04dcee720a01851280a776cf8a6259f03d347692090f76f9fc81a67d099d897c2c4c19edf084c385321d0913d431114d956a895f
-
Filesize
30B
MD5b63b38224c3907ee3df33fe2b5e6243a
SHA141a656aed88e0e659a12bd9fa2bc24ad3d8a617f
SHA256c7e9ae03a742323eb9aabef9ef86656106b479f3af10aa3ed1092044f5ffb6a2
SHA512ae8a0fe5496241e764d36b1e409f3c3432866b901f5d1e86e13e80ee279488d885702ae48066a4a2fc77f298f8e5cb43e1106dec33a77fd22b06e6c149bdba4f
-
Filesize
100KB
MD5bdc4abb8012df11d440f7864153c7f82
SHA1d1429a0bc97196edbac2a2beb40fc6c8270a0298
SHA2566865a25b4b98840bbc46fec0505348bb105a61f87bc203a04751490cc1109d03
SHA5127ce2255b0e9816b8fecba8bd120d8c9c870cb073473757845db9a254aca50c47223e3a11421b3d7b1435b7aa9c3bce8941c6a03a41210e19da32706e99aba889
-
Filesize
100KB
MD5bdc4abb8012df11d440f7864153c7f82
SHA1d1429a0bc97196edbac2a2beb40fc6c8270a0298
SHA2566865a25b4b98840bbc46fec0505348bb105a61f87bc203a04751490cc1109d03
SHA5127ce2255b0e9816b8fecba8bd120d8c9c870cb073473757845db9a254aca50c47223e3a11421b3d7b1435b7aa9c3bce8941c6a03a41210e19da32706e99aba889