Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 03:33
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Microfy.exe
Resource
win7-20230831-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
Microfy.exe
Resource
win10v2004-20230915-en
4 signatures
150 seconds
General
-
Target
Microfy.exe
-
Size
231KB
-
MD5
c91247e075f4e6fca603f8338427f9c5
-
SHA1
0434f0e193696cdeaef270876e9f5b272331f4ca
-
SHA256
0ed6a0b8cd30d1be2a7539e9634b8c94853cfc8bd52bee3c966171223b939b8d
-
SHA512
9bb8fa9725cc673b2942471f6e944d5b7adaf2a21aed904f87fa805c5ee64623f95268a2ea928ab06a1128f81b1f7fa49e9dd40087262f436a9dce4bd5d44ebd
-
SSDEEP
6144:3GYiKL/yfYb5B+BO99c0s0ZVtAO0gB6FTzOE9:2Y//yfYb5BIQZVt2dTzX9
Score
10/10
Malware Config
Signatures
-
Detect Poverty Stealer Payload 9 IoCs
resource yara_rule behavioral2/memory/4924-0-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral2/memory/4924-2-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral2/memory/4924-3-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral2/memory/4924-4-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral2/memory/4924-6-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral2/memory/4924-10-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral2/memory/4924-12-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral2/memory/4924-13-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral2/memory/4924-14-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer -
Poverty Stealer
Poverty Stealer is a crypto and infostealer written in C++.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1080 set thread context of 4924 1080 Microfy.exe 88 -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1080 wrote to memory of 4924 1080 Microfy.exe 88 PID 1080 wrote to memory of 4924 1080 Microfy.exe 88 PID 1080 wrote to memory of 4924 1080 Microfy.exe 88 PID 1080 wrote to memory of 4924 1080 Microfy.exe 88 PID 1080 wrote to memory of 4924 1080 Microfy.exe 88 PID 1080 wrote to memory of 4924 1080 Microfy.exe 88 PID 1080 wrote to memory of 4924 1080 Microfy.exe 88 PID 1080 wrote to memory of 4924 1080 Microfy.exe 88 PID 1080 wrote to memory of 4924 1080 Microfy.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\Microfy.exe"C:\Users\Admin\AppData\Local\Temp\Microfy.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:4924
-