Resubmissions

21-01-2024 14:54

240121-r9xcjaddhq 10

17-03-2023 05:51

230317-gj57msed95 10

Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-03-2023 05:51

General

  • Target

    8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe

  • Size

    1.1MB

  • MD5

    1cd4ab809fb2a9eebb801ab9c9d4a545

  • SHA1

    ce4f4ba93ec1adf8b5c3bac8552fbafd8dcddf27

  • SHA256

    8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0

  • SHA512

    db0476d3193a89104c116805eb34be5ea46774d77745b1e1ecfe48ec5a573e96150e9e48fcd630384c9bb88847ef12b46bd124b4b8ef1a072be4c1b319a76264

  • SSDEEP

    12288:CU5s41o+T7VmjE2Tz23vxO3jWhn370VPWJFwBybD3Y5WrxqnuskDq4:t5swNmjEoujhn3wVPWJFwEQWV+u75

Malware Config

Signatures

  • Detects Trigona ransomware 14 IoCs
  • Trigona

    A ransomware first seen at the beginning of the 2022.

  • Drops startup file 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops desktop.ini file(s) 3 IoCs
  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe
    "C:\Users\Admin\AppData\Local\Temp\8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    PID:5060

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Network Service Scanning

1
T1046

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1013461898-3711306144-4198452673-1000\desktop.ini
    Filesize

    2KB

    MD5

    5409b462027ccb268bf25b0d8c32b057

    SHA1

    2c27ff19a0d0680553e9a365318ed7faece05bff

    SHA256

    c113d583b7a124148e8d66301b8ab92651c04d91d09f64bbd766979bd577be8c

    SHA512

    754d666c7e2da1070ce619db9d77ed26591564756af8a4b4437b327758fbcdcc287087378a5387f650dcc7e84d3ee3dc0c753dc7ea704e698738e2183d9aa144

  • C:\PerfLogs\how_to_decrypt.hta
    Filesize

    12KB

    MD5

    9bb46f029aaa97771f0778564edd17fa

    SHA1

    7b60ab91415986d46bbf901e1fdeed3d6d37600c

    SHA256

    851af907a272f5f7adeff2a27dc27bed13d056cd0ef95d52d88ac7d79cd92b02

    SHA512

    f64e4c2cc85fc4a0a7de2980b1ae3e9d8c9c97f8b80ceca9bd98c30e4d46120b4123dfb9a507ce2c938109658fb8abdfc5ade8f97bbbd9ce7d38bc8d74126a08

  • memory/5060-4621-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/5060-4643-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/5060-135-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/5060-1325-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/5060-4286-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/5060-134-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/5060-133-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/5060-137-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/5060-8946-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/5060-14086-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/5060-17231-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/5060-17232-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/5060-17233-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/5060-17234-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB