Analysis

  • max time kernel
    136s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-03-2024 01:03

General

  • Target

    loader.exe

  • Size

    81KB

  • MD5

    c02b4294e68a2e0afe18c6865ac3da1a

  • SHA1

    e28e58680ca93471f17532ff756713d7e886a0df

  • SHA256

    a56f3e567eaf4d5cf3b5924fec383de32cc14d7a808034b0282b95e06b4a4c55

  • SHA512

    53936f1f042a18bea303974415f296c85225479fcde6defeb861936a0010508fdba23f7e6756aead1b27cef80fd6674bfafe0e6df10a5c34976abacaa0403c0b

  • SSDEEP

    1536:giTGIFEPIIbVZWG4kOUzb+ydiRMkCdep37PxKYcz/:giT7FZkVZWG4kOy+lGZC3ED

Malware Config

Signatures

  • Detect Poverty Stealer Payload 8 IoCs
  • Poverty Stealer

    Poverty Stealer is a crypto and infostealer written in C++.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\loader.exe
    "C:\Users\Admin\AppData\Local\Temp\loader.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2728
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
        PID:2704
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1344 --field-trial-handle=2276,i,11674642242468042059,14711253743544118298,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:996

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2704-4-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/2704-10-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/2704-11-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/2704-13-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/2704-12-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/2704-17-0x00000000014D0000-0x00000000014D1000-memory.dmp

        Filesize

        4KB

      • memory/2704-18-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/2728-0-0x0000000074F00000-0x00000000756B0000-memory.dmp

        Filesize

        7.7MB

      • memory/2728-1-0x0000000000BE0000-0x0000000000BF6000-memory.dmp

        Filesize

        88KB

      • memory/2728-8-0x0000000003090000-0x0000000005090000-memory.dmp

        Filesize

        32.0MB

      • memory/2728-7-0x0000000074F00000-0x00000000756B0000-memory.dmp

        Filesize

        7.7MB

      • memory/2728-15-0x0000000003090000-0x0000000005090000-memory.dmp

        Filesize

        32.0MB