Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    05/07/2024, 01:33 UTC

General

  • Target

    947ef875bd33912333be6b33291752cfc2c29393adbaa5ce78cdfa0b3aefc75d.exe

  • Size

    6.4MB

  • MD5

    1f4e76e35124c2fa6c41a96a30f6124a

  • SHA1

    843de82efbd8d17d96733251ce723540a2c05e59

  • SHA256

    947ef875bd33912333be6b33291752cfc2c29393adbaa5ce78cdfa0b3aefc75d

  • SHA512

    2151d0ea0dc0072797ac62aeee36063c73bf8fae7fb8c0c21729f5afb08a4d2cdd4e357d6f2f4abccb815d1a4c855e3a7ad8a025fbdd4c6c3e27e7310cb728ec

  • SSDEEP

    49152:0p0oLdmIlD/YsO/HessCMuFSYQSMN5vAjU4qfguFaWGS4NUBT+L12jO5E4hIIBWw:vEdmIlDqHeKFdPj5qfoLfEz6L/

Score
10/10

Malware Config

Signatures

  • Detect Poverty Stealer Payload 7 IoCs
  • Poverty Stealer

    Poverty Stealer is a crypto and infostealer written in C++.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\947ef875bd33912333be6b33291752cfc2c29393adbaa5ce78cdfa0b3aefc75d.exe
    "C:\Users\Admin\AppData\Local\Temp\947ef875bd33912333be6b33291752cfc2c29393adbaa5ce78cdfa0b3aefc75d.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2144
    • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
      C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
      2⤵
        PID:1896

    Network

      No results found
    • 146.70.169.164:2227
      BitLockerToGo.exe
      675.2kB
      16.4kB
      488
      378
    No results found

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1896-6-0x0000000000080000-0x000000000008A000-memory.dmp

      Filesize

      40KB

    • memory/1896-4-0x0000000000080000-0x000000000008A000-memory.dmp

      Filesize

      40KB

    • memory/1896-7-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/1896-10-0x0000000000080000-0x000000000008A000-memory.dmp

      Filesize

      40KB

    • memory/1896-11-0x0000000000080000-0x000000000008A000-memory.dmp

      Filesize

      40KB

    • memory/1896-12-0x0000000000080000-0x000000000008A000-memory.dmp

      Filesize

      40KB

    • memory/1896-15-0x0000000000080000-0x000000000008A000-memory.dmp

      Filesize

      40KB

    • memory/1896-14-0x0000000000090000-0x0000000000091000-memory.dmp

      Filesize

      4KB

    • memory/1896-16-0x0000000000080000-0x000000000008A000-memory.dmp

      Filesize

      40KB

    • memory/1896-17-0x0000000000080000-0x000000000008A000-memory.dmp

      Filesize

      40KB

    • memory/2144-8-0x000000013F480000-0x000000013FB45000-memory.dmp

      Filesize

      6.8MB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.