Analysis
-
max time kernel
122s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
13-12-2023 04:10
Static task
static1
Behavioral task
behavioral1
Sample
RElectron/Electron.exe
Resource
win7-20231130-en
Behavioral task
behavioral2
Sample
RElectron/Electron.exe
Resource
win10v2004-20231127-en
Behavioral task
behavioral3
Sample
RElectron/Method 2/loader.exe
Resource
win7-20231023-en
Behavioral task
behavioral4
Sample
RElectron/Method 2/loader.exe
Resource
win10v2004-20231127-en
General
-
Target
RElectron/Method 2/loader.exe
-
Size
207KB
-
MD5
f2050174398836cfb7893fbf6f175ea0
-
SHA1
cecc845f830643b597edb33a114fc24ceff83448
-
SHA256
d492ed6acb7ea997d74cd8628f7ea68258e299f47d9e81f331055da08617bb29
-
SHA512
ad3f57b51a4b378e8685e5150cb3ff1b26d004131c788e4f914059daabaf87c0076d47c54a00fc06ba87c6766bfa35f06ca2f86e4c711e0f89d427850a04835b
-
SSDEEP
3072:pAPT9JyoBZMl7Urfm9pMySretPr67ybnThJhOzQHOAg0Fuj/8svRihLIBblB7UxV:povBOMOMySrQbnTh0AOLvZmIBRB7UxV
Malware Config
Signatures
-
Detect Poverty Stealer Payload 5 IoCs
resource yara_rule behavioral3/memory/1684-3-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral3/memory/1684-4-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral3/memory/1684-6-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral3/memory/1684-8-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral3/memory/1684-10-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer -
Poverty Stealer
Poverty Stealer is a crypto and infostealer written in C++.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1680 set thread context of 1684 1680 loader.exe 28 -
Program crash 1 IoCs
pid pid_target Process procid_target 2756 1684 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1680 wrote to memory of 1684 1680 loader.exe 28 PID 1680 wrote to memory of 1684 1680 loader.exe 28 PID 1680 wrote to memory of 1684 1680 loader.exe 28 PID 1680 wrote to memory of 1684 1680 loader.exe 28 PID 1680 wrote to memory of 1684 1680 loader.exe 28 PID 1680 wrote to memory of 1684 1680 loader.exe 28 PID 1680 wrote to memory of 1684 1680 loader.exe 28 PID 1680 wrote to memory of 1684 1680 loader.exe 28 PID 1680 wrote to memory of 1684 1680 loader.exe 28 PID 1680 wrote to memory of 1684 1680 loader.exe 28 PID 1680 wrote to memory of 1684 1680 loader.exe 28 PID 1680 wrote to memory of 1684 1680 loader.exe 28 PID 1680 wrote to memory of 1684 1680 loader.exe 28 PID 1684 wrote to memory of 2756 1684 AppLaunch.exe 29 PID 1684 wrote to memory of 2756 1684 AppLaunch.exe 29 PID 1684 wrote to memory of 2756 1684 AppLaunch.exe 29 PID 1684 wrote to memory of 2756 1684 AppLaunch.exe 29 PID 1684 wrote to memory of 2756 1684 AppLaunch.exe 29 PID 1684 wrote to memory of 2756 1684 AppLaunch.exe 29 PID 1684 wrote to memory of 2756 1684 AppLaunch.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\RElectron\Method 2\loader.exe"C:\Users\Admin\AppData\Local\Temp\RElectron\Method 2\loader.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1684 -s 2083⤵
- Program crash
PID:2756
-
-