Analysis
-
max time kernel
93s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2025, 11:26
Static task
static1
Behavioral task
behavioral1
Sample
TrnRv9y.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
TrnRv9y.exe
Resource
win10v2004-20250217-en
General
-
Target
TrnRv9y.exe
-
Size
1.5MB
-
MD5
3be69ef62f3385d70dd119e77464cc4e
-
SHA1
97434913f4462e1f397253f79db671717a43818c
-
SHA256
c2a7c4875555a3e59ee7a77d022f2a65b3d2ac2899792f79c3a5d472d2e8db92
-
SHA512
93eb1bd8c97b711a88ef63ce16a2c0aab86bde081ae6a2737d4d7bdb6e5605b43ed2865e26353d4a1a2e9b7eed9f428b03e56ae79381fd06f41343f3e5b39bd9
-
SSDEEP
24576:YDn5tw2ABdWDp7g9aMU3zk5Q+Vtb94XClzoEVHBN:Yz8q+VtB4XPEVHBN
Malware Config
Signatures
-
Detect Poverty Stealer Payload 1 IoCs
resource yara_rule behavioral2/memory/2516-6-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer -
Poverty Stealer
Poverty Stealer is a crypto and infostealer written in C++.
-
Povertystealer family
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 22 bitbucket.org 23 bitbucket.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2780 set thread context of 2516 2780 TrnRv9y.exe 89 -
Program crash 1 IoCs
pid pid_target Process procid_target 1152 2516 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TrnRv9y.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2516 RegAsm.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2780 wrote to memory of 2516 2780 TrnRv9y.exe 89 PID 2780 wrote to memory of 2516 2780 TrnRv9y.exe 89 PID 2780 wrote to memory of 2516 2780 TrnRv9y.exe 89 PID 2780 wrote to memory of 2516 2780 TrnRv9y.exe 89 PID 2780 wrote to memory of 2516 2780 TrnRv9y.exe 89 PID 2780 wrote to memory of 2516 2780 TrnRv9y.exe 89 PID 2780 wrote to memory of 2516 2780 TrnRv9y.exe 89 PID 2780 wrote to memory of 2516 2780 TrnRv9y.exe 89 PID 2780 wrote to memory of 2516 2780 TrnRv9y.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\TrnRv9y.exe"C:\Users\Admin\AppData\Local\Temp\TrnRv9y.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious use of UnmapMainImage
PID:2516 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2516 -s 123⤵
- Program crash
PID:1152
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2516 -ip 25161⤵PID:1912