Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-02-2024 12:57
Static task
static1
Behavioral task
behavioral1
Sample
a2cca73f263f0bd9e12f682a2ee3598e25403fa33a953a680062b78a52d7662c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a2cca73f263f0bd9e12f682a2ee3598e25403fa33a953a680062b78a52d7662c.exe
Resource
win10v2004-20240221-en
General
-
Target
a2cca73f263f0bd9e12f682a2ee3598e25403fa33a953a680062b78a52d7662c.exe
-
Size
199KB
-
MD5
c5bcb1322acea40d4e8a01ac3a205604
-
SHA1
664493247dd1d219b34e501078b47cba03e2d094
-
SHA256
a2cca73f263f0bd9e12f682a2ee3598e25403fa33a953a680062b78a52d7662c
-
SHA512
bb4f2dfa72e2ff3985c7f8f5b9115e47b3eb5c0967a04cb88c268510be566a2e45e51ff64738a732ff35a69e8b43c2b659094dc087f3ddbe38b78b7d54da1430
-
SSDEEP
3072:6DKW1FgppLRHMY0TBfJvjcTp5X73E4hm8gFTQuTGOGHcED:6DKW1Fgbdl0TBBvjc/CC9Zt
Malware Config
Signatures
-
Detect Poverty Stealer Payload 1 IoCs
resource yara_rule behavioral1/memory/1544-6-0x0000000002210000-0x0000000004210000-memory.dmp family_povertystealer -
Poverty Stealer
Poverty Stealer is a crypto and infostealer written in C++.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2788 1544 WerFault.exe 27 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1544 wrote to memory of 2788 1544 a2cca73f263f0bd9e12f682a2ee3598e25403fa33a953a680062b78a52d7662c.exe 29 PID 1544 wrote to memory of 2788 1544 a2cca73f263f0bd9e12f682a2ee3598e25403fa33a953a680062b78a52d7662c.exe 29 PID 1544 wrote to memory of 2788 1544 a2cca73f263f0bd9e12f682a2ee3598e25403fa33a953a680062b78a52d7662c.exe 29 PID 1544 wrote to memory of 2788 1544 a2cca73f263f0bd9e12f682a2ee3598e25403fa33a953a680062b78a52d7662c.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2cca73f263f0bd9e12f682a2ee3598e25403fa33a953a680062b78a52d7662c.exe"C:\Users\Admin\AppData\Local\Temp\a2cca73f263f0bd9e12f682a2ee3598e25403fa33a953a680062b78a52d7662c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1544 -s 5282⤵
- Program crash
PID:2788
-