Resubmissions

12/09/2023, 00:30

230912-atyf8acb8w 10

29/08/2023, 04:47

230829-felf1ada7x 5

Analysis

  • max time kernel
    258s
  • max time network
    264s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230831-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/09/2023, 00:30

General

  • Target

    cc4486d3417745208f8e576ad7d37af7fc208ec1b39803b8fe81790354b43393.exe

  • Size

    1.9MB

  • MD5

    003c5ac9c36f5246b14f296a76665e9c

  • SHA1

    e56b0ad93e6f1779bd446fdc611878b4f267b924

  • SHA256

    cc4486d3417745208f8e576ad7d37af7fc208ec1b39803b8fe81790354b43393

  • SHA512

    047f3bba20bc8c7774e87c93216a26d9e40cfad188e728702e7da3d52e6e9237156de6186684a59024e4d23e917c9e203286d6fe7d476e08bb395861f1e56d87

  • SSDEEP

    24576:W64knz8loIpUgIgNvsW6hr6r+mMWfwrMFGOtDEn9aJfRYYD1R/dc0zFD2ShsrMvj:Xnz1gLvsWvrcutDaYD1ZdSSyrK7

Score
10/10

Malware Config

Signatures

  • Detect Poverty Stealer Payload 3 IoCs
  • Poverty Stealer

    Poverty Stealer is a crypto and infostealer written in C++.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cc4486d3417745208f8e576ad7d37af7fc208ec1b39803b8fe81790354b43393.exe
    "C:\Users\Admin\AppData\Local\Temp\cc4486d3417745208f8e576ad7d37af7fc208ec1b39803b8fe81790354b43393.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1344
    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ADelRCP.exe
      "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ADelRCP.exe"
      2⤵
        PID:4460

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1344-5-0x0000000000A90000-0x0000000000CAE000-memory.dmp

      Filesize

      2.1MB

    • memory/4460-0-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/4460-1-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/4460-2-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/4460-4-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB