Analysis
-
max time kernel
135s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2023, 13:23
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230915-en
General
-
Target
file.exe
-
Size
268KB
-
MD5
412f2a790774bab54a808da285637606
-
SHA1
176df256acbaeae1d78076becaddbb9319d657ce
-
SHA256
42baf0d9105229ca324cb979bcd9fa893bd2585cb91a98c7406ef610b1e35291
-
SHA512
2e9cc7d784c02fd06487760913785c15c23988d6412aeef62ff2293c62016d3d8b60efa692f4ee31349fd36fca4481aa0861986991420d853dc7ce9b4f94b220
-
SSDEEP
6144:vcLzuEPl/CBpmpCdgTiemAOGCNvLz1aGGr:vszuGZC3vX4YvXw
Malware Config
Signatures
-
Detect Poverty Stealer Payload 8 IoCs
resource yara_rule behavioral2/memory/224-0-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral2/memory/224-2-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral2/memory/224-3-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral2/memory/224-4-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral2/memory/224-6-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral2/memory/224-10-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral2/memory/224-12-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral2/memory/224-13-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer -
Poverty Stealer
Poverty Stealer is a crypto and infostealer written in C++.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4520 set thread context of 224 4520 file.exe 85 -
Program crash 1 IoCs
pid pid_target Process procid_target 3964 4520 WerFault.exe 84 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 4644 svchost.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4520 wrote to memory of 224 4520 file.exe 85 PID 4520 wrote to memory of 224 4520 file.exe 85 PID 4520 wrote to memory of 224 4520 file.exe 85 PID 4520 wrote to memory of 224 4520 file.exe 85 PID 4520 wrote to memory of 224 4520 file.exe 85 PID 4520 wrote to memory of 224 4520 file.exe 85 PID 4520 wrote to memory of 224 4520 file.exe 85 PID 4520 wrote to memory of 224 4520 file.exe 85 PID 4520 wrote to memory of 224 4520 file.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4520 -s 3802⤵
- Program crash
PID:3964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4520 -ip 45201⤵PID:3600
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:4516
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4644
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD571c547a724bea43f6967e99672a3f904
SHA1444dad009daa8415539345a2f17b1f035352440b
SHA2567325df8de3558f89ae2a1393908002ba6a23d3b1394186ce9b53281cc08fddb4
SHA512a762156c33a99b5529bce62d1c094dcf625bfce55b72a54e8e095d499236a9b6e62996c959dd66db2074d56de925326bbf57a26030c1dc8fd10d788fc69c9364