Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29-01-2024 17:03
Behavioral task
behavioral1
Sample
8061ee6597848dbaaeeeb5e2eeebb53e.exe
Resource
win7-20231215-en
windows7-x64
4 signatures
150 seconds
General
-
Target
8061ee6597848dbaaeeeb5e2eeebb53e.exe
-
Size
213KB
-
MD5
8061ee6597848dbaaeeeb5e2eeebb53e
-
SHA1
7eb6c7c1055dceee85200b9b7981c2380d39c6ba
-
SHA256
5abbe246e037e964cdf319ac0fa07b4f7c07efe09a8f69c175e575d12758ef42
-
SHA512
68b20f6a50322028bfee0604c00bbba2d1130562ef7390f751709f1839e40381cb993adb9e82dc56a394a87ed60240fba3b57bcfc9351f8965fb6b8fad240220
-
SSDEEP
3072:fJOJkaqXgsmNnUwbU4kvHeEp7687vKod0pKumsTmm55F663F3ovL5d5k8Fn7F7:ROmaqXgvseG7hCDPdmaF0LXn
Malware Config
Signatures
-
Poullight Stealer payload 2 IoCs
resource yara_rule behavioral1/memory/2368-0-0x0000000001390000-0x00000000013CC000-memory.dmp family_poullight behavioral1/memory/2368-2-0x0000000001100000-0x0000000001180000-memory.dmp family_poullight -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2368 8061ee6597848dbaaeeeb5e2eeebb53e.exe 2368 8061ee6597848dbaaeeeb5e2eeebb53e.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2368 8061ee6597848dbaaeeeb5e2eeebb53e.exe