Analysis

  • max time kernel
    497s
  • max time network
    486s
  • platform
    windows11-21h2_x64
  • resource
    win11-20231222-en
  • resource tags

    arch:x64arch:x86image:win11-20231222-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    13-01-2024 23:59

General

  • Target

    TrigonLauncher_v2.exe

  • Size

    61KB

  • MD5

    1b328279c8a726d9d9d6586e77aa3b32

  • SHA1

    d57ce4073c49ab05ad7fd1a7cb1f7923d7f52270

  • SHA256

    5f6f6df95e496e43e5de0248d8199238b6d6bd62e2a44be048f3b27173ada55d

  • SHA512

    e954caae52fb20d7a7b996d1d24b93474858e9cd56ec1418fd20cff9708f397b3f09abb81e1f150d80cb0a44335215eb269f5dcdba2a170ff024aaef10682958

  • SSDEEP

    1536:xyWz5IbsXdgAgzrJeTf925L7j2YaYesnClQTL1Ylxp0Lc:cbsNgAgzrJKf925LJTaJ

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\TrigonLauncher_v2.exe
    "C:\Users\Admin\AppData\Local\Temp\TrigonLauncher_v2.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:236

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Trigon\bin\ace\worker-html.js

    Filesize

    329KB

    MD5

    9b72ecdeddb846d5647a815c13516e8a

    SHA1

    20d5c8dbd11c71497bf675a518f0b370df6d71d3

    SHA256

    875094b00677b6d9c4b68bd2a8123348ed20965fd55b7d9226cc996e588e4de7

    SHA512

    83e0cc90195b353d523a708576def71aaf650436538ec6515e58cbc12fb4ea1c143ff1f29fad644a949f1cefe261ddbd482329f2998415f667e89740380ac288

  • memory/236-0-0x0000000074780000-0x0000000074F31000-memory.dmp

    Filesize

    7.7MB

  • memory/236-1-0x0000000000760000-0x0000000000776000-memory.dmp

    Filesize

    88KB

  • memory/236-2-0x0000000002A30000-0x0000000002A40000-memory.dmp

    Filesize

    64KB

  • memory/236-3-0x0000000074780000-0x0000000074F31000-memory.dmp

    Filesize

    7.7MB

  • memory/236-4-0x0000000002A30000-0x0000000002A40000-memory.dmp

    Filesize

    64KB

  • memory/236-6-0x0000000002930000-0x000000000293A000-memory.dmp

    Filesize

    40KB

  • memory/236-7-0x00000000063E0000-0x00000000063F2000-memory.dmp

    Filesize

    72KB