Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230621-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-07-2023 07:36

General

  • Target

    Trigonaexe.exe

  • Size

    1.1MB

  • MD5

    2c31a750240788f924ef64a2fb4fdf3b

  • SHA1

    c9c6a7f911d16b49d8b838dca3683357b72c9d6d

  • SHA256

    b49bf3a4baf637e067a8db7360051eba39713b7958519b49f8e236b6014c8477

  • SHA512

    1e36c96110b793bfea2e65f6ff4c0e59a0a6b8f86395d7be6497be264954ab9b7c61d0adfa85dcef5ce69afe4b200b3ece82cbf089264f7d648eaaa53acbd50d

  • SSDEEP

    12288:XRYqX7pdDWExBDmkYhiPJSA0IqOO2vBwRns2MqnuY/gtTyb7:hY6frxBDmkY+Jr0Iql2v4sx+uxtTyn

Malware Config

Signatures

  • Detects Trigona ransomware 14 IoCs
  • Trigona

    A ransomware first seen at the beginning of the 2022.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops desktop.ini file(s) 4 IoCs
  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Trigonaexe.exe
    "C:\Users\Admin\AppData\Local\Temp\Trigonaexe.exe"
    1⤵
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    PID:2148

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-508929744-1894537824-211734425-1000\desktop.ini

    Filesize

    2KB

    MD5

    e212f5cd7bd884561957c016eae78506

    SHA1

    43fce51d252a1dc4aa37fe09811d5b07d9c36039

    SHA256

    1c9e1696532588cafcf6836afdb98793da7a1b2606f9f47914921eefe58885c8

    SHA512

    3b8c5964294dce054debd1820024d4243a219018a292702adbc2c6a60d6507e9e62b1ba433fdc80ee21af83a79845f49b59fc070e3dd1f2233d1c3dc8f8e1233

  • C:\how_to_decrypt.hta

    Filesize

    11KB

    MD5

    a782c4101d022d920d36c875d67e7018

    SHA1

    817cdde2b577fbcb0ea50a2b49c8af1f9c14954a

    SHA256

    590e486a255dc458d6a403b885796ea125e4c26409d8b305cb0a5b3c98f4c358

    SHA512

    b3df396fe9568f8ab9075b3e9e1af222bb4cbe97034f6df746cb718f23259c0bba35f50e04d25be4ccfb012cdddc7852748006e54534539a7a6c3e71c31dde86

  • memory/2148-760-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/2148-908-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/2148-139-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/2148-146-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/2148-135-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/2148-134-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/2148-133-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/2148-137-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/2148-3944-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/2148-8060-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/2148-13202-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/2148-16431-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/2148-18559-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/2148-19303-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB