Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/08/2024, 16:03
Static task
static1
Behavioral task
behavioral1
Sample
ed5c086f90c82e755393dd4d183d8323.exe
Resource
win10v2004-20240802-en
General
-
Target
ed5c086f90c82e755393dd4d183d8323.exe
-
Size
369KB
-
MD5
ed5c086f90c82e755393dd4d183d8323
-
SHA1
50900629dd2d2e39d67e8fa098e2460e2d899139
-
SHA256
c7af3849210fbedaa9447012d804ccb362d66a34e7d636ea1b97d0a8115f022c
-
SHA512
7345707c182898eb134250dd3de5870a36c45a522a363d7c9b06df72b9fe81785c4c448d8efb2a748a5b578783d6282ce499d03f2ce8d624e408f5bde18c328e
-
SSDEEP
6144:SP+ESgo6HYAkY4u1gXwztMaKjNBl/wO+tLL5A8ybLUxjwi:C+soU7kY4u1Mwz7KjYtLL5AVb
Malware Config
Signatures
-
Detects TriumphLoader 5 IoCs
Detects TriumphLoader.
resource yara_rule behavioral1/memory/5024-2-0x0000000000A00000-0x0000000000A7F000-memory.dmp TriumphLoader behavioral1/memory/5024-3-0x0000000000400000-0x0000000000482000-memory.dmp TriumphLoader behavioral1/memory/5024-6-0x0000000000400000-0x0000000000482000-memory.dmp TriumphLoader behavioral1/memory/5024-4-0x0000000000400000-0x0000000000856000-memory.dmp TriumphLoader behavioral1/memory/5024-5-0x0000000000A00000-0x0000000000A7F000-memory.dmp TriumphLoader -
TriumphLoader
TriumphLoader is a c++ loader based on the open source AbsentLoader.
-
TriumphLoader payload 5 IoCs
resource yara_rule behavioral1/memory/5024-2-0x0000000000A00000-0x0000000000A7F000-memory.dmp family_triumphloader behavioral1/memory/5024-3-0x0000000000400000-0x0000000000482000-memory.dmp family_triumphloader behavioral1/memory/5024-6-0x0000000000400000-0x0000000000482000-memory.dmp family_triumphloader behavioral1/memory/5024-4-0x0000000000400000-0x0000000000856000-memory.dmp family_triumphloader behavioral1/memory/5024-5-0x0000000000A00000-0x0000000000A7F000-memory.dmp family_triumphloader -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation ed5c086f90c82e755393dd4d183d8323.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 8 IoCs
pid pid_target Process procid_target 1188 5024 WerFault.exe 83 4492 5024 WerFault.exe 83 4856 5024 WerFault.exe 83 996 5024 WerFault.exe 83 4764 5024 WerFault.exe 83 2704 5024 WerFault.exe 83 4456 5024 WerFault.exe 83 1328 5024 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ed5c086f90c82e755393dd4d183d8323.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3192 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3244 schtasks.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 5024 wrote to memory of 2712 5024 ed5c086f90c82e755393dd4d183d8323.exe 103 PID 5024 wrote to memory of 2712 5024 ed5c086f90c82e755393dd4d183d8323.exe 103 PID 5024 wrote to memory of 2712 5024 ed5c086f90c82e755393dd4d183d8323.exe 103 PID 5024 wrote to memory of 4440 5024 ed5c086f90c82e755393dd4d183d8323.exe 105 PID 5024 wrote to memory of 4440 5024 ed5c086f90c82e755393dd4d183d8323.exe 105 PID 5024 wrote to memory of 4440 5024 ed5c086f90c82e755393dd4d183d8323.exe 105 PID 2712 wrote to memory of 2416 2712 cmd.exe 107 PID 2712 wrote to memory of 2416 2712 cmd.exe 107 PID 2712 wrote to memory of 2416 2712 cmd.exe 107 PID 4440 wrote to memory of 3192 4440 cmd.exe 108 PID 4440 wrote to memory of 3192 4440 cmd.exe 108 PID 4440 wrote to memory of 3192 4440 cmd.exe 108 PID 4440 wrote to memory of 3244 4440 cmd.exe 116 PID 4440 wrote to memory of 3244 4440 cmd.exe 116 PID 4440 wrote to memory of 3244 4440 cmd.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed5c086f90c82e755393dd4d183d8323.exe"C:\Users\Admin\AppData\Local\Temp\ed5c086f90c82e755393dd4d183d8323.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5024 -s 7362⤵
- Program crash
PID:1188
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5024 -s 7762⤵
- Program crash
PID:4492
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5024 -s 7762⤵
- Program crash
PID:4856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5024 -s 8322⤵
- Program crash
PID:996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5024 -s 9002⤵
- Program crash
PID:4764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5024 -s 11722⤵
- Program crash
PID:2704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5024 -s 12282⤵
- Program crash
PID:4456
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C reg add "HKEY_CURRENT_USER\Software\NetHelper" /v path /t REG_SZ /d C:\ProgramData\NetHelper\Cache\VYYxejkIAPrUGckLKKTt /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\NetHelper" /v path /t REG_SZ /d C:\ProgramData\NetHelper\Cache\VYYxejkIAPrUGckLKKTt /f3⤵
- System Location Discovery: System Language Discovery
PID:2416
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C timeout /t 60 && SCHTASKS /Create /SC MINUTE /MO 1 /TN "Service for windows Network Helper updates" /TR C:\ProgramData\NetHelper\Cache\VYYxejkIAPrUGckLKKTt\œÛnethelper.exe /F2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\SysWOW64\timeout.exetimeout /t 603⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3192
-
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /Create /SC MINUTE /MO 1 /TN "Service for windows Network Helper updates" /TR C:\ProgramData\NetHelper\Cache\VYYxejkIAPrUGckLKKTt\œÛnethelper.exe /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3244
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5024 -s 15882⤵
- Program crash
PID:1328
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 372 -p 5024 -ip 50241⤵PID:4832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 5024 -ip 50241⤵PID:4748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 5024 -ip 50241⤵PID:3828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 5024 -ip 50241⤵PID:1340
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 5024 -ip 50241⤵PID:3608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 5024 -ip 50241⤵PID:4996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 5024 -ip 50241⤵PID:1172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 5024 -ip 50241⤵PID:1640