Resubmissions

21-01-2024 14:53

240121-r9tawaddhp 10

17-03-2023 06:39

230317-helswaef33 10

Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-03-2023 06:39

General

  • Target

    f64211b0a49589bb53523dfb88eb9937ab88c8fcea98e2aabcbee90f1828e94e.exe

  • Size

    1.1MB

  • MD5

    e248e214c121845e69bbf266cc9e2853

  • SHA1

    683a1a845f0c2d0f358d62a450f710f960190f2f

  • SHA256

    f64211b0a49589bb53523dfb88eb9937ab88c8fcea98e2aabcbee90f1828e94e

  • SHA512

    d5a5968b079b2a561f2adeaa1cff9ba8e2faac242ef362894dde0b8f72ec725780da651950d06e2b019369f34dbbaf31a497440b4aabe7f8357f789bbdab9031

  • SSDEEP

    24576:KYxvmwliqDHWHVjdzuM7Br+e5rh+u7z7k:Zvmw3UjnrP9gQY

Malware Config

Signatures

  • Trigona

    A ransomware first seen at the beginning of the 2022.

  • Modifies extensions of user files 9 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops startup file 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops desktop.ini file(s) 32 IoCs
  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f64211b0a49589bb53523dfb88eb9937ab88c8fcea98e2aabcbee90f1828e94e.exe
    "C:\Users\Admin\AppData\Local\Temp\f64211b0a49589bb53523dfb88eb9937ab88c8fcea98e2aabcbee90f1828e94e.exe"
    1⤵
    • Modifies extensions of user files
    • Drops startup file
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    PID:4540

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1675742406-747946869-1029867430-1000\desktop.ini

    Filesize

    910B

    MD5

    7a41e2fea0592ae660d12cce31d8c6a2

    SHA1

    fa95136e6a211c33c7bd89903a525493e8a6dc41

    SHA256

    f0daffb30f94f7e9f88e9d3b7b70398c64f36eb3edc17be9671c7c3eff44daa1

    SHA512

    da5310a3a3e8fd7fc086496f63726c98fc61c7e0b245bfc5a10694e626003f2e2bf70cdb3080b8dcf5d29b16acd7b1967853aa5e1624a1bd1c181d137f10c0e8

  • C:\ProgramData\Microsoft\ClickToRun\MachineData\Catalog\Packages\{9AC08E99-230B-47E8-9721-4577B7F124EA}\{1A8308C7-90D1-4200-B16E-646F163A08E8}\Manifest.xml

    Filesize

    3.3MB

    MD5

    daa6a3f611d8d7507b173af96ffa8110

    SHA1

    88f697457e732f541a0026c971ea5213ee50b763

    SHA256

    8ac15c9e3107feeb44abfd5deb24194038a8ead129f7af27217c9215441b8823

    SHA512

    91a5eb08761bececc44588459cd37064b26f770dad4c817e8644971e3e40d66a6a6ba1b23888cf3c237b0c7d48cfc21577e4385965a64352846c350d1c790e3e

  • C:\odt\how_to_decrypt.hta

    Filesize

    10KB

    MD5

    73b6a3e526f2f1887ddcd1f7de12d8f7

    SHA1

    9b030bdb860edca3b315886988fd0fc99fa7efd2

    SHA256

    0a44c5b1b1edfaff7af27d17280cbcf1c06679820cd05e5efdea26966bf6ad78

    SHA512

    e1708aa47f427d29cce4083628fb39fac6d8a89fb86b33d9b3630fecb94cc20a7ff67f6101d8e125a37399a5c09972cd59af878bdbd1bb962b03405536c64d75

  • memory/4540-10060-0x0000000000400000-0x0000000000522000-memory.dmp

    Filesize

    1.1MB

  • memory/4540-15329-0x0000000000400000-0x0000000000522000-memory.dmp

    Filesize

    1.1MB

  • memory/4540-135-0x0000000000400000-0x0000000000522000-memory.dmp

    Filesize

    1.1MB

  • memory/4540-1490-0x0000000000400000-0x0000000000522000-memory.dmp

    Filesize

    1.1MB

  • memory/4540-5485-0x0000000000400000-0x0000000000522000-memory.dmp

    Filesize

    1.1MB

  • memory/4540-133-0x0000000000400000-0x0000000000522000-memory.dmp

    Filesize

    1.1MB

  • memory/4540-12894-0x0000000000400000-0x0000000000522000-memory.dmp

    Filesize

    1.1MB

  • memory/4540-137-0x0000000000400000-0x0000000000522000-memory.dmp

    Filesize

    1.1MB

  • memory/4540-18462-0x0000000000400000-0x0000000000522000-memory.dmp

    Filesize

    1.1MB

  • memory/4540-23622-0x0000000000400000-0x0000000000522000-memory.dmp

    Filesize

    1.1MB

  • memory/4540-29093-0x0000000000400000-0x0000000000522000-memory.dmp

    Filesize

    1.1MB

  • memory/4540-32069-0x0000000000400000-0x0000000000522000-memory.dmp

    Filesize

    1.1MB

  • memory/4540-134-0x0000000000400000-0x0000000000522000-memory.dmp

    Filesize

    1.1MB

  • memory/4540-36372-0x0000000000400000-0x0000000000522000-memory.dmp

    Filesize

    1.1MB