Analysis

  • max time kernel
    99s
  • max time network
    106s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    24-11-2022 11:36

General

  • Target

    Trigon Evo 2_XH-7z91.exe

  • Size

    2.6MB

  • MD5

    174444da2c90ae775cccae2ec9e938a3

  • SHA1

    d8aa73d11f3f111ed528d8010f00cc9014169b66

  • SHA256

    b587860551197fa81a095d121c595d08cbf8f3938f04a6d40a841b8b1a67c826

  • SHA512

    920f2aaa1ee3c84e932e71364c340561a513264393eceadc6eda19796b0f6b9c6e2f387f23f52755d42cdc716498f21e80833b2f90cb6e39a1b882d4636b3c77

  • SSDEEP

    49152:+qe3f6aWzD7+H98AHaCfu6DHCL+WuTmuKwEx:vSi/D7E9vBumHCK5NKXx

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 3 IoCs
  • Drops file in Windows directory 2 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Trigon Evo 2_XH-7z91.exe
    "C:\Users\Admin\AppData\Local\Temp\Trigon Evo 2_XH-7z91.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2692
    • C:\Users\Admin\AppData\Local\Temp\is-PSKQR.tmp\Trigon Evo 2_XH-7z91.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-PSKQR.tmp\Trigon Evo 2_XH-7z91.tmp" /SL5="$701D4,1785071,899584,C:\Users\Admin\AppData\Local\Temp\Trigon Evo 2_XH-7z91.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Loads dropped DLL
      • Checks processor information in registry
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:4488
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:3412
  • C:\Windows\system32\browser_broker.exe
    C:\Windows\system32\browser_broker.exe -Embedding
    1⤵
    • Modifies Internet Explorer settings
    PID:2240
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    PID:3192

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-PSKQR.tmp\Trigon Evo 2_XH-7z91.tmp

    Filesize

    3.0MB

    MD5

    74fad5c6cd2d3af1fa257b5e9531993a

    SHA1

    ab701031918456195cf9a12a8b33f9417a9f6496

    SHA256

    8dc40627fa4c09f7fd6df78e3ad03d7db3767010e15418dba24e63754dcbc59b

    SHA512

    05b107537675cfa43f3cc744c3de9164069816401af9fdb7a82dcb1a021985b97f2ecc56e3ea17151a0dee97b0af175f0883b8fb4cf5c5f7d72a5479c5557edb

  • \Users\Admin\AppData\Local\Temp\is-F0PKC.tmp\botva2.dll

    Filesize

    37KB

    MD5

    67965a5957a61867d661f05ae1f4773e

    SHA1

    f14c0a4f154dc685bb7c65b2d804a02a0fb2360d

    SHA256

    450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105

    SHA512

    c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b

  • \Users\Admin\AppData\Local\Temp\is-F0PKC.tmp\botva2.dll

    Filesize

    37KB

    MD5

    67965a5957a61867d661f05ae1f4773e

    SHA1

    f14c0a4f154dc685bb7c65b2d804a02a0fb2360d

    SHA256

    450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105

    SHA512

    c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b

  • \Users\Admin\AppData\Local\Temp\is-F0PKC.tmp\zbShieldUtils.dll

    Filesize

    2.0MB

    MD5

    e1f18a22199c6f6aa5d87b24e5b39ef1

    SHA1

    0dcd8f90b575f6f1d10d6789fe769fa26daafd0e

    SHA256

    62c56c8cf2ac6521ce047b73aa99b6d3952ca53f11d34b00e98d17674a2fc10d

    SHA512

    5a10a2f096adce6e7db3a40bc3ea3fd44d602966e606706ee5a780703f211de7f77656c79c296390baee1e008dc3ce327eaaf5d78bbae20108670c5bc809a190

  • memory/2692-147-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-130-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-119-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-120-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-121-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-123-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-122-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-149-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-126-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-125-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-127-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-128-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-129-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-150-0x0000000000400000-0x00000000004E9000-memory.dmp

    Filesize

    932KB

  • memory/2692-132-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-131-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-133-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-152-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-135-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-136-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-137-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-138-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-139-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-140-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-141-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-143-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-142-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-144-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-145-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-146-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-117-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-148-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-124-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-118-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-134-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-153-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-154-0x0000000000400000-0x00000000004E9000-memory.dmp

    Filesize

    932KB

  • memory/2692-155-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-156-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/2692-201-0x0000000000400000-0x00000000004E9000-memory.dmp

    Filesize

    932KB

  • memory/2692-296-0x0000000000400000-0x00000000004E9000-memory.dmp

    Filesize

    932KB

  • memory/4488-183-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4488-161-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4488-179-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4488-173-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4488-163-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4488-164-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4488-165-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4488-166-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4488-168-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4488-167-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4488-169-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4488-157-0x0000000000000000-mapping.dmp

  • memory/4488-171-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4488-170-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4488-162-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4488-174-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4488-175-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4488-176-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4488-177-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4488-178-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4488-172-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4488-159-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4488-181-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4488-182-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4488-180-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4488-160-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB