Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/08/2024, 16:52
Static task
static1
Behavioral task
behavioral1
Sample
8f85ebeafa44681fc4b8e10342722499_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8f85ebeafa44681fc4b8e10342722499_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8f85ebeafa44681fc4b8e10342722499_JaffaCakes118.exe
-
Size
485KB
-
MD5
8f85ebeafa44681fc4b8e10342722499
-
SHA1
fbdb1a95913a752cbe80313cc80d4363b9bfc981
-
SHA256
1e3d43db0f7df4d61d57d9c867f9217ba69c61b58563a3893ea4fff75cf81a1e
-
SHA512
3959fb203d6c2bf6f445c026d36f7e7848271a84b8e9132a1e58d8b24c9903617dd2e34677e5422d75702faef1d6e0e775f8745202d3b4dd288fb319beae1900
-
SSDEEP
6144:GCrmIi+E4cu3O6Jgb2Wf3urb7+ubYihDwUWxid9ZKWw8Um5uukm8nz1lxWdF:7mIiR5u+6ebl3A+ubYK0Uy2ZKJnzRW
Malware Config
Signatures
-
TriumphLoader
TriumphLoader is a c++ loader based on the open source AbsentLoader.
-
TriumphLoader payload 5 IoCs
resource yara_rule behavioral2/memory/4892-2-0x0000000002CC0000-0x0000000002D3F000-memory.dmp family_triumphloader behavioral2/memory/4892-3-0x0000000000400000-0x0000000000482000-memory.dmp family_triumphloader behavioral2/memory/4892-6-0x0000000000400000-0x0000000000482000-memory.dmp family_triumphloader behavioral2/memory/4892-5-0x0000000002CC0000-0x0000000002D3F000-memory.dmp family_triumphloader behavioral2/memory/4892-4-0x0000000000400000-0x0000000002BF0000-memory.dmp family_triumphloader -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation 8f85ebeafa44681fc4b8e10342722499_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 8 IoCs
pid pid_target Process procid_target 2964 4892 WerFault.exe 83 1888 4892 WerFault.exe 83 2040 4892 WerFault.exe 83 1500 4892 WerFault.exe 83 3736 4892 WerFault.exe 83 1396 4892 WerFault.exe 83 676 4892 WerFault.exe 83 3340 4892 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8f85ebeafa44681fc4b8e10342722499_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2620 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2584 schtasks.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4892 wrote to memory of 1848 4892 8f85ebeafa44681fc4b8e10342722499_JaffaCakes118.exe 107 PID 4892 wrote to memory of 1848 4892 8f85ebeafa44681fc4b8e10342722499_JaffaCakes118.exe 107 PID 4892 wrote to memory of 1848 4892 8f85ebeafa44681fc4b8e10342722499_JaffaCakes118.exe 107 PID 4892 wrote to memory of 2844 4892 8f85ebeafa44681fc4b8e10342722499_JaffaCakes118.exe 109 PID 4892 wrote to memory of 2844 4892 8f85ebeafa44681fc4b8e10342722499_JaffaCakes118.exe 109 PID 4892 wrote to memory of 2844 4892 8f85ebeafa44681fc4b8e10342722499_JaffaCakes118.exe 109 PID 1848 wrote to memory of 744 1848 cmd.exe 111 PID 1848 wrote to memory of 744 1848 cmd.exe 111 PID 1848 wrote to memory of 744 1848 cmd.exe 111 PID 2844 wrote to memory of 2620 2844 cmd.exe 112 PID 2844 wrote to memory of 2620 2844 cmd.exe 112 PID 2844 wrote to memory of 2620 2844 cmd.exe 112 PID 2844 wrote to memory of 2584 2844 cmd.exe 122 PID 2844 wrote to memory of 2584 2844 cmd.exe 122 PID 2844 wrote to memory of 2584 2844 cmd.exe 122
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f85ebeafa44681fc4b8e10342722499_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8f85ebeafa44681fc4b8e10342722499_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 7362⤵
- Program crash
PID:2964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 7562⤵
- Program crash
PID:1888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 7562⤵
- Program crash
PID:2040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 8282⤵
- Program crash
PID:1500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 9002⤵
- Program crash
PID:3736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 11922⤵
- Program crash
PID:1396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 12122⤵
- Program crash
PID:676
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C reg add "HKEY_CURRENT_USER\Software\NetHelper" /v path /t REG_SZ /d C:\ProgramData\NetHelper\Cache\nvLKidcESojigVTWjBiX /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\NetHelper" /v path /t REG_SZ /d C:\ProgramData\NetHelper\Cache\nvLKidcESojigVTWjBiX /f3⤵
- System Location Discovery: System Language Discovery
PID:744
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C timeout /t 60 && SCHTASKS /Create /SC MINUTE /MO 1 /TN "Service for windows Network Helper updates" /TR C:\ProgramData\NetHelper\Cache\nvLKidcESojigVTWjBiX\œ×nethelper.exe /F2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\timeout.exetimeout /t 603⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2620
-
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /Create /SC MINUTE /MO 1 /TN "Service for windows Network Helper updates" /TR C:\ProgramData\NetHelper\Cache\nvLKidcESojigVTWjBiX\œ×nethelper.exe /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2584
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 14642⤵
- Program crash
PID:3340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4892 -ip 48921⤵PID:2536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4892 -ip 48921⤵PID:2364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 4892 -ip 48921⤵PID:4264
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4892 -ip 48921⤵PID:1228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 4892 -ip 48921⤵PID:2656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4892 -ip 48921⤵PID:760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4892 -ip 48921⤵PID:4068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4892 -ip 48921⤵PID:1004