Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    22-07-2024 20:25

General

  • Target

    04eb5220f7d49967abd241b7d1305ed0N.exe

  • Size

    5.0MB

  • MD5

    04eb5220f7d49967abd241b7d1305ed0

  • SHA1

    765970e8fb9c7e306c9bbe20f816b8f143a1e232

  • SHA256

    6359aa408276731df5b47da14a98ebc3fd3d99b00f4386d9ee99787a622c41fc

  • SHA512

    4700b6b6ac13ceb0f11e8a76fd7c5a312839b5ce0ef5ed41db22c7358a653d7706110ca9455436890dd8eba39976a68b74b682e41c36ebb70744e46098a25fe6

  • SSDEEP

    98304:jgmjKDb77FQSsbxkrqa/sJ41vFpdvUdhsWBY42DCp78zH/e5:BbtFGrshF3oCpyH/

Malware Config

Signatures

  • Detect Poverty Stealer Payload 7 IoCs
  • Poverty Stealer

    Poverty Stealer is a crypto and infostealer written in C++.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\04eb5220f7d49967abd241b7d1305ed0N.exe
    "C:\Users\Admin\AppData\Local\Temp\04eb5220f7d49967abd241b7d1305ed0N.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2496
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2132
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:876
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
      2⤵
        PID:2640

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\CabA7E.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • memory/876-61-0x0000000000400000-0x00000000004B0000-memory.dmp

      Filesize

      704KB

    • memory/876-37-0x0000000000400000-0x00000000004B0000-memory.dmp

      Filesize

      704KB

    • memory/876-39-0x0000000000400000-0x00000000004B0000-memory.dmp

      Filesize

      704KB

    • memory/876-41-0x0000000000400000-0x00000000004B0000-memory.dmp

      Filesize

      704KB

    • memory/876-43-0x0000000000400000-0x00000000004B0000-memory.dmp

      Filesize

      704KB

    • memory/876-45-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/876-63-0x0000000000400000-0x00000000004B0000-memory.dmp

      Filesize

      704KB

    • memory/876-62-0x0000000000400000-0x00000000004B0000-memory.dmp

      Filesize

      704KB

    • memory/2132-9-0x0000000000400000-0x00000000004E8000-memory.dmp

      Filesize

      928KB

    • memory/2132-22-0x0000000000400000-0x00000000004E8000-memory.dmp

      Filesize

      928KB

    • memory/2132-12-0x0000000000400000-0x00000000004E8000-memory.dmp

      Filesize

      928KB

    • memory/2132-49-0x0000000074B60000-0x000000007524E000-memory.dmp

      Filesize

      6.9MB

    • memory/2132-48-0x0000000074B60000-0x000000007524E000-memory.dmp

      Filesize

      6.9MB

    • memory/2132-6-0x0000000000400000-0x00000000004E8000-memory.dmp

      Filesize

      928KB

    • memory/2132-18-0x0000000000400000-0x00000000004E8000-memory.dmp

      Filesize

      928KB

    • memory/2132-47-0x0000000074B60000-0x000000007524E000-memory.dmp

      Filesize

      6.9MB

    • memory/2132-20-0x0000000000400000-0x00000000004E8000-memory.dmp

      Filesize

      928KB

    • memory/2132-23-0x0000000074B60000-0x000000007524E000-memory.dmp

      Filesize

      6.9MB

    • memory/2132-24-0x0000000074B60000-0x000000007524E000-memory.dmp

      Filesize

      6.9MB

    • memory/2132-11-0x0000000000400000-0x00000000004E8000-memory.dmp

      Filesize

      928KB

    • memory/2132-64-0x0000000074B60000-0x000000007524E000-memory.dmp

      Filesize

      6.9MB

    • memory/2132-13-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2496-0-0x0000000074B6E000-0x0000000074B6F000-memory.dmp

      Filesize

      4KB

    • memory/2496-7-0x0000000074B60000-0x000000007524E000-memory.dmp

      Filesize

      6.9MB

    • memory/2496-58-0x0000000074B60000-0x000000007524E000-memory.dmp

      Filesize

      6.9MB

    • memory/2496-17-0x0000000074B60000-0x000000007524E000-memory.dmp

      Filesize

      6.9MB

    • memory/2496-5-0x00000000004D0000-0x00000000004D6000-memory.dmp

      Filesize

      24KB

    • memory/2496-4-0x0000000000470000-0x000000000048A000-memory.dmp

      Filesize

      104KB

    • memory/2496-3-0x0000000000400000-0x0000000000444000-memory.dmp

      Filesize

      272KB

    • memory/2496-2-0x0000000074B60000-0x000000007524E000-memory.dmp

      Filesize

      6.9MB

    • memory/2496-16-0x0000000074B60000-0x000000007524E000-memory.dmp

      Filesize

      6.9MB

    • memory/2496-15-0x0000000074B6E000-0x0000000074B6F000-memory.dmp

      Filesize

      4KB

    • memory/2496-1-0x0000000000AD0000-0x0000000000FCE000-memory.dmp

      Filesize

      5.0MB

    • memory/2640-29-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2640-55-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2640-56-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2640-57-0x0000000000080000-0x0000000000081000-memory.dmp

      Filesize

      4KB

    • memory/2640-52-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2640-60-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2640-50-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2640-25-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2640-27-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2640-31-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2640-33-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB