Analysis
-
max time kernel
93s -
max time network
124s -
platform
windows11-21h2_x64 -
resource
win11-20250217-uk -
resource tags
arch:x64arch:x86image:win11-20250217-uklocale:uk-uaos:windows11-21h2-x64systemwindows -
submitted
12/03/2025, 12:56
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
xeFOiPg.exe
Resource
win11-20250217-uk
8 signatures
150 seconds
General
-
Target
xeFOiPg.exe
-
Size
250KB
-
MD5
5aff11719c4c103ff52a475590df5ef8
-
SHA1
003dbb830763a042f35a059fbe90d9dd250760ba
-
SHA256
c410086431e2227dafc6ab20710899af080d9fff4f2e58274709998c9af43e04
-
SHA512
d8c5986957c2d569d95183c4690d32f983297bc08362ae851d5170eb80b58b90b9c380d4e533b2042860cbda34c4d5b1f919b360f38472ef5feec79e51155c76
-
SSDEEP
6144:rMgYzCTvjBrWl2c0oK/rqf5S+oDfDAOjG33:wTCTvVrWlsW4+o/wH
Score
10/10
Malware Config
Signatures
-
Detect Poverty Stealer Payload 1 IoCs
resource yara_rule behavioral1/memory/3980-8-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer -
Poverty Stealer
Poverty Stealer is a crypto and infostealer written in C++.
-
Povertystealer family
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 2 bitbucket.org 1 bitbucket.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2168 set thread context of 3980 2168 xeFOiPg.exe 77 -
Program crash 1 IoCs
pid pid_target Process procid_target 2788 3980 WerFault.exe 77 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xeFOiPg.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2168 wrote to memory of 3980 2168 xeFOiPg.exe 77 PID 2168 wrote to memory of 3980 2168 xeFOiPg.exe 77 PID 2168 wrote to memory of 3980 2168 xeFOiPg.exe 77 PID 2168 wrote to memory of 3980 2168 xeFOiPg.exe 77 PID 2168 wrote to memory of 3980 2168 xeFOiPg.exe 77 PID 2168 wrote to memory of 3980 2168 xeFOiPg.exe 77 PID 2168 wrote to memory of 3980 2168 xeFOiPg.exe 77 PID 2168 wrote to memory of 3980 2168 xeFOiPg.exe 77 PID 2168 wrote to memory of 3980 2168 xeFOiPg.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\xeFOiPg.exe"C:\Users\Admin\AppData\Local\Temp\xeFOiPg.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:3980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3980 -s 283⤵
- Program crash
PID:2788
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3980 -ip 39801⤵PID:1976