Analysis
-
max time kernel
144s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/01/2023, 16:41
Static task
static1
Behavioral task
behavioral1
Sample
cbca0165be6129d1c63d35a084780d748bbfde3bc0a8983bb7ff1ee884efc0e3.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
cbca0165be6129d1c63d35a084780d748bbfde3bc0a8983bb7ff1ee884efc0e3.exe
Resource
win10v2004-20220812-en
General
-
Target
cbca0165be6129d1c63d35a084780d748bbfde3bc0a8983bb7ff1ee884efc0e3.exe
-
Size
1.0MB
-
MD5
9bd15f32f41faad427d75292516aab16
-
SHA1
5d06e38f80ffea74a4f90988df62b1404be63736
-
SHA256
cbca0165be6129d1c63d35a084780d748bbfde3bc0a8983bb7ff1ee884efc0e3
-
SHA512
8d44d609556e41137f1b4f16384c47b8694fdd8aefd73e8d9468c85c013bcdf1ce1bef600cdf1122afb74abce5e2306e2a0edade5cdd013bc526641618472ae7
-
SSDEEP
12288:B8wkEsI0mhyUQU8Uj0Gb05a/N5c4SeAjKPDKXXhzfNwa:PkmdbQPu00YKPDSzf
Malware Config
Signatures
-
TriumphLoader
TriumphLoader is a c++ loader based on the open source AbsentLoader.
-
TriumphLoader payload 3 IoCs
resource yara_rule behavioral2/memory/928-135-0x0000000000400000-0x0000000000508000-memory.dmp family_triumphloader behavioral2/memory/928-136-0x0000000000400000-0x0000000000508000-memory.dmp family_triumphloader behavioral2/memory/928-139-0x0000000000400000-0x0000000000508000-memory.dmp family_triumphloader -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation cbca0165be6129d1c63d35a084780d748bbfde3bc0a8983bb7ff1ee884efc0e3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4556 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4204 timeout.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 928 wrote to memory of 5048 928 cbca0165be6129d1c63d35a084780d748bbfde3bc0a8983bb7ff1ee884efc0e3.exe 86 PID 928 wrote to memory of 5048 928 cbca0165be6129d1c63d35a084780d748bbfde3bc0a8983bb7ff1ee884efc0e3.exe 86 PID 928 wrote to memory of 5048 928 cbca0165be6129d1c63d35a084780d748bbfde3bc0a8983bb7ff1ee884efc0e3.exe 86 PID 928 wrote to memory of 1344 928 cbca0165be6129d1c63d35a084780d748bbfde3bc0a8983bb7ff1ee884efc0e3.exe 88 PID 928 wrote to memory of 1344 928 cbca0165be6129d1c63d35a084780d748bbfde3bc0a8983bb7ff1ee884efc0e3.exe 88 PID 928 wrote to memory of 1344 928 cbca0165be6129d1c63d35a084780d748bbfde3bc0a8983bb7ff1ee884efc0e3.exe 88 PID 1344 wrote to memory of 4204 1344 cmd.exe 90 PID 1344 wrote to memory of 4204 1344 cmd.exe 90 PID 1344 wrote to memory of 4204 1344 cmd.exe 90 PID 5048 wrote to memory of 964 5048 cmd.exe 91 PID 5048 wrote to memory of 964 5048 cmd.exe 91 PID 5048 wrote to memory of 964 5048 cmd.exe 91 PID 1344 wrote to memory of 4556 1344 cmd.exe 92 PID 1344 wrote to memory of 4556 1344 cmd.exe 92 PID 1344 wrote to memory of 4556 1344 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\cbca0165be6129d1c63d35a084780d748bbfde3bc0a8983bb7ff1ee884efc0e3.exe"C:\Users\Admin\AppData\Local\Temp\cbca0165be6129d1c63d35a084780d748bbfde3bc0a8983bb7ff1ee884efc0e3.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C reg add "HKEY_CURRENT_USER\Software\NetHelper" /v path /t REG_SZ /d C:\ProgramData\NetHelper\Cache\ZhAFnsRbXZgZdUYzGVjm /f2⤵
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\NetHelper" /v path /t REG_SZ /d C:\ProgramData\NetHelper\Cache\ZhAFnsRbXZgZdUYzGVjm /f3⤵PID:964
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C timeout /t 60 && SCHTASKS /Create /SC MINUTE /MO 1 /TN "Service for windows Network Helper updates" /TR C:\ProgramData\NetHelper\Cache\ZhAFnsRbXZgZdUYzGVjm\xônethelper.exe /F2⤵
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\SysWOW64\timeout.exetimeout /t 603⤵
- Delays execution with timeout.exe
PID:4204
-
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /Create /SC MINUTE /MO 1 /TN "Service for windows Network Helper updates" /TR C:\ProgramData\NetHelper\Cache\ZhAFnsRbXZgZdUYzGVjm\xônethelper.exe /F3⤵
- Creates scheduled task(s)
PID:4556
-
-