Analysis
-
max time kernel
447s -
max time network
1171s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
22-02-2024 08:35
Static task
static1
Behavioral task
behavioral1
Sample
Installer.exe
Resource
win10v2004-20240221-en
12 signatures
1800 seconds
Behavioral task
behavioral2
Sample
Installer.exe
Resource
win11-20240221-en
5 signatures
1800 seconds
General
-
Target
Installer.exe
-
Size
199KB
-
MD5
c5bcb1322acea40d4e8a01ac3a205604
-
SHA1
664493247dd1d219b34e501078b47cba03e2d094
-
SHA256
a2cca73f263f0bd9e12f682a2ee3598e25403fa33a953a680062b78a52d7662c
-
SHA512
bb4f2dfa72e2ff3985c7f8f5b9115e47b3eb5c0967a04cb88c268510be566a2e45e51ff64738a732ff35a69e8b43c2b659094dc087f3ddbe38b78b7d54da1430
-
SSDEEP
3072:6DKW1FgppLRHMY0TBfJvjcTp5X73E4hm8gFTQuTGOGHcED:6DKW1Fgbdl0TBBvjc/CC9Zt
Score
10/10
Malware Config
Signatures
-
Detect Poverty Stealer Payload 9 IoCs
resource yara_rule behavioral2/memory/1888-9-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral2/memory/1888-13-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral2/memory/1888-16-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral2/memory/1800-15-0x0000000002670000-0x0000000004670000-memory.dmp family_povertystealer behavioral2/memory/1888-18-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral2/memory/1888-19-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral2/memory/1888-21-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral2/memory/1888-22-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral2/memory/1800-23-0x0000000002670000-0x0000000004670000-memory.dmp family_povertystealer -
Poverty Stealer
Poverty Stealer is a crypto and infostealer written in C++.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1800 set thread context of 1888 1800 Installer.exe 79 -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1800 wrote to memory of 1888 1800 Installer.exe 79 PID 1800 wrote to memory of 1888 1800 Installer.exe 79 PID 1800 wrote to memory of 1888 1800 Installer.exe 79 PID 1800 wrote to memory of 1888 1800 Installer.exe 79 PID 1800 wrote to memory of 1888 1800 Installer.exe 79 PID 1800 wrote to memory of 1888 1800 Installer.exe 79 PID 1800 wrote to memory of 1888 1800 Installer.exe 79 PID 1800 wrote to memory of 1888 1800 Installer.exe 79 PID 1800 wrote to memory of 1888 1800 Installer.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\Installer.exe"C:\Users\Admin\AppData\Local\Temp\Installer.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:1888
-