Analysis
-
max time kernel
91s -
max time network
128s -
platform
windows11-21h2_x64 -
resource
win11-20250217-en -
resource tags
arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system -
submitted
11/03/2025, 11:16
Static task
static1
Behavioral task
behavioral1
Sample
TrnRv9y.exe
Resource
win11-20250217-en
8 signatures
150 seconds
General
-
Target
TrnRv9y.exe
-
Size
1.5MB
-
MD5
3be69ef62f3385d70dd119e77464cc4e
-
SHA1
97434913f4462e1f397253f79db671717a43818c
-
SHA256
c2a7c4875555a3e59ee7a77d022f2a65b3d2ac2899792f79c3a5d472d2e8db92
-
SHA512
93eb1bd8c97b711a88ef63ce16a2c0aab86bde081ae6a2737d4d7bdb6e5605b43ed2865e26353d4a1a2e9b7eed9f428b03e56ae79381fd06f41343f3e5b39bd9
-
SSDEEP
24576:YDn5tw2ABdWDp7g9aMU3zk5Q+Vtb94XClzoEVHBN:Yz8q+VtB4XPEVHBN
Score
10/10
Malware Config
Signatures
-
Detect Poverty Stealer Payload 1 IoCs
resource yara_rule behavioral1/memory/2912-8-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer -
Poverty Stealer
Poverty Stealer is a crypto and infostealer written in C++.
-
Povertystealer family
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 1 bitbucket.org 2 bitbucket.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4968 set thread context of 2912 4968 TrnRv9y.exe 79 -
Program crash 1 IoCs
pid pid_target Process procid_target 4268 2912 WerFault.exe 79 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TrnRv9y.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4968 wrote to memory of 2912 4968 TrnRv9y.exe 79 PID 4968 wrote to memory of 2912 4968 TrnRv9y.exe 79 PID 4968 wrote to memory of 2912 4968 TrnRv9y.exe 79 PID 4968 wrote to memory of 2912 4968 TrnRv9y.exe 79 PID 4968 wrote to memory of 2912 4968 TrnRv9y.exe 79 PID 4968 wrote to memory of 2912 4968 TrnRv9y.exe 79 PID 4968 wrote to memory of 2912 4968 TrnRv9y.exe 79 PID 4968 wrote to memory of 2912 4968 TrnRv9y.exe 79 PID 4968 wrote to memory of 2912 4968 TrnRv9y.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\TrnRv9y.exe"C:\Users\Admin\AppData\Local\Temp\TrnRv9y.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:2912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2912 -s 283⤵
- Program crash
PID:4268
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2912 -ip 29121⤵PID:2172