Resubmissions

21-01-2024 14:53

240121-r9a5asead2 10

30-06-2023 14:46

230630-r492faee4v 10

Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230621-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-06-2023 14:46

General

  • Target

    Trigona.exe

  • Size

    1.1MB

  • MD5

    2c31a750240788f924ef64a2fb4fdf3b

  • SHA1

    c9c6a7f911d16b49d8b838dca3683357b72c9d6d

  • SHA256

    b49bf3a4baf637e067a8db7360051eba39713b7958519b49f8e236b6014c8477

  • SHA512

    1e36c96110b793bfea2e65f6ff4c0e59a0a6b8f86395d7be6497be264954ab9b7c61d0adfa85dcef5ce69afe4b200b3ece82cbf089264f7d648eaaa53acbd50d

  • SSDEEP

    12288:XRYqX7pdDWExBDmkYhiPJSA0IqOO2vBwRns2MqnuY/gtTyb7:hY6frxBDmkY+Jr0Iql2v4sx+uxtTyn

Malware Config

Signatures

  • Detects Trigona ransomware 13 IoCs
  • Trigona

    A ransomware first seen at the beginning of the 2022.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops desktop.ini file(s) 4 IoCs
  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Trigona.exe
    "C:\Users\Admin\AppData\Local\Temp\Trigona.exe"
    1⤵
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    PID:1436

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4129409437-3162877118-52503038-1000\desktop.ini

    Filesize

    2KB

    MD5

    6a2c928d2824694fab6bc4f7276185cf

    SHA1

    1de95accd23014174daf5c6ad9b71dbff09f1998

    SHA256

    1c1663faed9b8ad4b412aa945ce3747c50f5e6de42b5166108ef21c06eebd260

    SHA512

    13a2e02cc99dd92a87b7bddd4149a4f4714d85618abf5bf2a2951aeadfd66d592b44aa72aa7ed0af52717cf5093bbb29f48c7bb3d8fe9a1283b3257b48a4f355

  • C:\how_to_decrypt.hta

    Filesize

    11KB

    MD5

    f5b3a9599a125aae946e2d87d4c82665

    SHA1

    4f7578fcb0ccb00f4d6f188dcd1b83a6e9529c6d

    SHA256

    ff0e1e4120a114018ff457d63d23668d73b01f138c8c43cb097dcc945349d02c

    SHA512

    35b815181a5bcc4218927d74efed64f66e79b2f87d6d7fca4c1c37d1b3074a6c6a69e9bd94c95f83ce6efcb9d3873190c9ef7b104163c1e426b11eaee352c662

  • memory/1436-138-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/1436-816-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/1436-133-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/1436-147-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/1436-148-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/1436-135-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/1436-134-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/1436-137-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/1436-1931-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/1436-6708-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/1436-9725-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/1436-11130-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/1436-14297-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/1436-16986-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB