Resubmissions

21-01-2024 14:53

240121-r9a5asead2 10

30-06-2023 14:46

230630-r492faee4v 10

Analysis

  • max time kernel
    150s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    21-01-2024 14:53

General

  • Target

    Trigona.exe

  • Size

    1.1MB

  • MD5

    2c31a750240788f924ef64a2fb4fdf3b

  • SHA1

    c9c6a7f911d16b49d8b838dca3683357b72c9d6d

  • SHA256

    b49bf3a4baf637e067a8db7360051eba39713b7958519b49f8e236b6014c8477

  • SHA512

    1e36c96110b793bfea2e65f6ff4c0e59a0a6b8f86395d7be6497be264954ab9b7c61d0adfa85dcef5ce69afe4b200b3ece82cbf089264f7d648eaaa53acbd50d

  • SSDEEP

    12288:XRYqX7pdDWExBDmkYhiPJSA0IqOO2vBwRns2MqnuY/gtTyb7:hY6frxBDmkY+Jr0Iql2v4sx+uxtTyn

Malware Config

Signatures

  • Detects Trigona ransomware 14 IoCs
  • Trigona

    A ransomware first seen at the beginning of the 2022.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 11 IoCs
  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Trigona.exe
    "C:\Users\Admin\AppData\Local\Temp\Trigona.exe"
    1⤵
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    PID:2204

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3427588347-1492276948-3422228430-1000\desktop.ini
    Filesize

    2KB

    MD5

    65414d62fc0e1c3ef1cc16ccea1ef3dc

    SHA1

    2246f4142ccd47f9bff19fdccad4692a7708d177

    SHA256

    bd45c6da658d6146d2d7fe974ead43fed3b9672b599a31157f26402d57889457

    SHA512

    d838cd10ccfb6edcb53810824b807cf7585a955a343af84e0a65a8acdcbf6d0540e2224776adec96081ec2f97a45a71fc0834af07f8fc2d38d8fdfd90840f128

  • C:\how_to_decrypt.hta
    Filesize

    11KB

    MD5

    63356ab5bd66bac03c904dbe80c062f1

    SHA1

    c980855c992ba713196ab194ec62d7111ad600ea

    SHA256

    cdb66e3a04779a29444db7f0efde4c5849eec7997a4ecac47ff121dbb4364144

    SHA512

    bcd21ac60654d188a4baf77e351518328c2352beff7b700f973b6863ecc913a2a203ff51ed9c4fe1afd61e19f82431dd199c2acf536baf29be8225244e6aa089

  • memory/2204-6-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/2204-1-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/2204-0-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/2204-7-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/2204-8-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/2204-15-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/2204-2-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/2204-4-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/2204-44-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/2204-801-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/2204-1380-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/2204-7683-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/2204-9988-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/2204-11579-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB