Analysis
-
max time kernel
141s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
01-07-2023 07:36
Behavioral task
behavioral1
Sample
Trigonaexe.exe
Resource
win7-20230621-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
Trigonaexe.exe
Resource
win10v2004-20230621-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
Trigonaexe.exe
-
Size
1.1MB
-
MD5
2c31a750240788f924ef64a2fb4fdf3b
-
SHA1
c9c6a7f911d16b49d8b838dca3683357b72c9d6d
-
SHA256
b49bf3a4baf637e067a8db7360051eba39713b7958519b49f8e236b6014c8477
-
SHA512
1e36c96110b793bfea2e65f6ff4c0e59a0a6b8f86395d7be6497be264954ab9b7c61d0adfa85dcef5ce69afe4b200b3ece82cbf089264f7d648eaaa53acbd50d
-
SSDEEP
12288:XRYqX7pdDWExBDmkYhiPJSA0IqOO2vBwRns2MqnuY/gtTyb7:hY6frxBDmkY+Jr0Iql2v4sx+uxtTyn
Score
10/10
Malware Config
Signatures
-
Detects Trigona ransomware 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1700-54-0x0000000000400000-0x0000000000526000-memory.dmp family_trigona behavioral1/memory/1700-55-0x0000000000400000-0x0000000000526000-memory.dmp family_trigona behavioral1/memory/1700-56-0x0000000000400000-0x0000000000526000-memory.dmp family_trigona -
Trigona
A ransomware first seen at the beginning of the 2022.