Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 23:35
Behavioral task
behavioral1
Sample
439442042b8f97837925b5a858b7fb3e.exe
Resource
win7-20231215-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
439442042b8f97837925b5a858b7fb3e.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
0 signatures
150 seconds
General
-
Target
439442042b8f97837925b5a858b7fb3e.exe
-
Size
213KB
-
MD5
439442042b8f97837925b5a858b7fb3e
-
SHA1
0a524b97d4e1e1b0407a1348c154877964470de2
-
SHA256
f27893a397e299561cd5aae7d4598aa2623fedb3155f6003c111126599887bb4
-
SHA512
fd0297f321b3b35a9eabd0dda667fe65ff07a800baf9109c1aeb3443ee210bb22b4c6e9ff5106ff4b720f51138e0240a8a9baf176053954c6c6715a0ac10d525
-
SSDEEP
6144:FOmaqXgRvpbQda7JumO8U7UFyiEf4DFXXfARSLZVn:FpQnJuJh7UFIf4RLZ
Malware Config
Signatures
-
Poullight Stealer payload 1 IoCs
resource yara_rule behavioral1/memory/1932-0-0x0000000001070000-0x00000000010AC000-memory.dmp family_poullight -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1932 439442042b8f97837925b5a858b7fb3e.exe 1932 439442042b8f97837925b5a858b7fb3e.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1932 439442042b8f97837925b5a858b7fb3e.exe