Analysis
-
max time kernel
33s -
max time network
45s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
26/09/2023, 22:40
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20230831-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win10v2004-20230915-en
5 signatures
150 seconds
General
-
Target
Setup.exe
-
Size
921.0MB
-
MD5
1b5fafdd3c1b5ba348700f0a058d19d6
-
SHA1
d2d8e91570ae707ea5e9fcb9373a907a8449e4dc
-
SHA256
9e46f65189f183ab9c6bf4c4945ce920abff946a192eb35a076c570b63466aaa
-
SHA512
eac56683c63085cec8da3252aad092bbccfb753f0024b1642baa6c472a9dca0731636f99abf25b9b814cb20ffe686078a8d1173f06d8a6f0c30c91502f03457a
-
SSDEEP
49152:4/bdruJkO3aXXgx7OFvT/bdruJkO3aXXgx7OFv:4DdaJkOrx7OFrDdaJkOrx7OF
Score
10/10
Malware Config
Signatures
-
Detect Poverty Stealer Payload 9 IoCs
resource yara_rule behavioral2/memory/3196-32-0x0000000000400000-0x0000000000411000-memory.dmp family_povertystealer behavioral2/memory/3196-35-0x0000000000400000-0x0000000000411000-memory.dmp family_povertystealer behavioral2/memory/3196-36-0x0000000000400000-0x0000000000411000-memory.dmp family_povertystealer behavioral2/memory/3196-37-0x0000000000400000-0x0000000000411000-memory.dmp family_povertystealer behavioral2/memory/3196-39-0x0000000000400000-0x0000000000411000-memory.dmp family_povertystealer behavioral2/memory/3196-41-0x0000000000400000-0x0000000000411000-memory.dmp family_povertystealer behavioral2/memory/3196-42-0x0000000000400000-0x0000000000411000-memory.dmp family_povertystealer behavioral2/memory/3196-44-0x0000000000400000-0x0000000000411000-memory.dmp family_povertystealer behavioral2/memory/3196-45-0x0000000000400000-0x0000000000411000-memory.dmp family_povertystealer -
Poverty Stealer
Poverty Stealer is a crypto and infostealer written in C++.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1064 set thread context of 3196 1064 Setup.exe 92 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1064 Setup.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1064 wrote to memory of 3196 1064 Setup.exe 92 PID 1064 wrote to memory of 3196 1064 Setup.exe 92 PID 1064 wrote to memory of 3196 1064 Setup.exe 92 PID 1064 wrote to memory of 3196 1064 Setup.exe 92 PID 1064 wrote to memory of 3196 1064 Setup.exe 92 PID 1064 wrote to memory of 3196 1064 Setup.exe 92 PID 1064 wrote to memory of 3196 1064 Setup.exe 92 PID 1064 wrote to memory of 3196 1064 Setup.exe 92 PID 1064 wrote to memory of 3196 1064 Setup.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:3196
-