Analysis
-
max time kernel
155s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/01/2023, 16:14
Static task
static1
Behavioral task
behavioral1
Sample
ae41b8ae516ade3e495b0c7ef8dc370d7cb3351376f06129415ee75b0b6fae08.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ae41b8ae516ade3e495b0c7ef8dc370d7cb3351376f06129415ee75b0b6fae08.exe
Resource
win10v2004-20220812-en
General
-
Target
ae41b8ae516ade3e495b0c7ef8dc370d7cb3351376f06129415ee75b0b6fae08.exe
-
Size
921KB
-
MD5
5d4d925ff7857ca92adafa83d2f830d2
-
SHA1
60f5feadebc55c64d2678f19c9604d12e2389a66
-
SHA256
ae41b8ae516ade3e495b0c7ef8dc370d7cb3351376f06129415ee75b0b6fae08
-
SHA512
c086024a799be0a6ea21988cba2dc5387a24e5fb5737a9a5824154ddab6f13e39cfd1b68813b179a6ac67d65f8d18d9a975c69cae8dccc5323b6d59a75f10ae4
-
SSDEEP
12288:zRW05a/N5c4SeAjKPDKXXhzfNwaW8wkEsI0mhyUQU8Uj0G0/:z800YKPDSzfAkmdbQP3/
Malware Config
Signatures
-
TriumphLoader
TriumphLoader is a c++ loader based on the open source AbsentLoader.
-
TriumphLoader payload 4 IoCs
resource yara_rule behavioral2/memory/4948-134-0x0000000000400000-0x0000000000B33000-memory.dmp family_triumphloader behavioral2/memory/4948-135-0x0000000000400000-0x0000000000B33000-memory.dmp family_triumphloader behavioral2/memory/4948-137-0x0000000000400000-0x0000000000B33000-memory.dmp family_triumphloader behavioral2/memory/4948-142-0x0000000000400000-0x0000000000B33000-memory.dmp family_triumphloader -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation ae41b8ae516ade3e495b0c7ef8dc370d7cb3351376f06129415ee75b0b6fae08.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1780 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4764 timeout.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4948 wrote to memory of 1608 4948 ae41b8ae516ade3e495b0c7ef8dc370d7cb3351376f06129415ee75b0b6fae08.exe 81 PID 4948 wrote to memory of 1608 4948 ae41b8ae516ade3e495b0c7ef8dc370d7cb3351376f06129415ee75b0b6fae08.exe 81 PID 4948 wrote to memory of 1608 4948 ae41b8ae516ade3e495b0c7ef8dc370d7cb3351376f06129415ee75b0b6fae08.exe 81 PID 4948 wrote to memory of 1180 4948 ae41b8ae516ade3e495b0c7ef8dc370d7cb3351376f06129415ee75b0b6fae08.exe 83 PID 4948 wrote to memory of 1180 4948 ae41b8ae516ade3e495b0c7ef8dc370d7cb3351376f06129415ee75b0b6fae08.exe 83 PID 4948 wrote to memory of 1180 4948 ae41b8ae516ade3e495b0c7ef8dc370d7cb3351376f06129415ee75b0b6fae08.exe 83 PID 1608 wrote to memory of 3176 1608 cmd.exe 85 PID 1608 wrote to memory of 3176 1608 cmd.exe 85 PID 1608 wrote to memory of 3176 1608 cmd.exe 85 PID 1180 wrote to memory of 4764 1180 cmd.exe 86 PID 1180 wrote to memory of 4764 1180 cmd.exe 86 PID 1180 wrote to memory of 4764 1180 cmd.exe 86 PID 1180 wrote to memory of 1780 1180 cmd.exe 87 PID 1180 wrote to memory of 1780 1180 cmd.exe 87 PID 1180 wrote to memory of 1780 1180 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae41b8ae516ade3e495b0c7ef8dc370d7cb3351376f06129415ee75b0b6fae08.exe"C:\Users\Admin\AppData\Local\Temp\ae41b8ae516ade3e495b0c7ef8dc370d7cb3351376f06129415ee75b0b6fae08.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C reg add "HKEY_CURRENT_USER\Software\NetHelper" /v path /t REG_SZ /d C:\ProgramData\NetHelper\Cache\fmNHAJEIvuXLeYgbGtmT /f2⤵
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\NetHelper" /v path /t REG_SZ /d C:\ProgramData\NetHelper\Cache\fmNHAJEIvuXLeYgbGtmT /f3⤵PID:3176
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C timeout /t 60 && SCHTASKS /Create /SC MINUTE /MO 1 /TN "Service for windows Network Helper updates" /TR C:\ProgramData\NetHelper\Cache\fmNHAJEIvuXLeYgbGtmT\xônethelper.exe /F2⤵
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\SysWOW64\timeout.exetimeout /t 603⤵
- Delays execution with timeout.exe
PID:4764
-
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /Create /SC MINUTE /MO 1 /TN "Service for windows Network Helper updates" /TR C:\ProgramData\NetHelper\Cache\fmNHAJEIvuXLeYgbGtmT\xônethelper.exe /F3⤵
- Creates scheduled task(s)
PID:1780
-
-