Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2025, 13:06
Static task
static1
Behavioral task
behavioral1
Sample
xeFOiPg.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
xeFOiPg.exe
Resource
win10v2004-20250217-en
General
-
Target
xeFOiPg.exe
-
Size
250KB
-
MD5
5aff11719c4c103ff52a475590df5ef8
-
SHA1
003dbb830763a042f35a059fbe90d9dd250760ba
-
SHA256
c410086431e2227dafc6ab20710899af080d9fff4f2e58274709998c9af43e04
-
SHA512
d8c5986957c2d569d95183c4690d32f983297bc08362ae851d5170eb80b58b90b9c380d4e533b2042860cbda34c4d5b1f919b360f38472ef5feec79e51155c76
-
SSDEEP
6144:rMgYzCTvjBrWl2c0oK/rqf5S+oDfDAOjG33:wTCTvVrWlsW4+o/wH
Malware Config
Signatures
-
Detect Poverty Stealer Payload 1 IoCs
resource yara_rule behavioral2/memory/992-6-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer -
Poverty Stealer
Poverty Stealer is a crypto and infostealer written in C++.
-
Povertystealer family
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 8 bitbucket.org 10 bitbucket.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4192 set thread context of 992 4192 xeFOiPg.exe 88 -
Program crash 1 IoCs
pid pid_target Process procid_target 3120 992 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xeFOiPg.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 992 RegAsm.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4192 wrote to memory of 992 4192 xeFOiPg.exe 88 PID 4192 wrote to memory of 992 4192 xeFOiPg.exe 88 PID 4192 wrote to memory of 992 4192 xeFOiPg.exe 88 PID 4192 wrote to memory of 992 4192 xeFOiPg.exe 88 PID 4192 wrote to memory of 992 4192 xeFOiPg.exe 88 PID 4192 wrote to memory of 992 4192 xeFOiPg.exe 88 PID 4192 wrote to memory of 992 4192 xeFOiPg.exe 88 PID 4192 wrote to memory of 992 4192 xeFOiPg.exe 88 PID 4192 wrote to memory of 992 4192 xeFOiPg.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\xeFOiPg.exe"C:\Users\Admin\AppData\Local\Temp\xeFOiPg.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious use of UnmapMainImage
PID:992 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 992 -s 123⤵
- Program crash
PID:3120
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 992 -ip 9921⤵PID:4328