Resubmissions

21-01-2024 14:53

240121-r9a5asead2 10

30-06-2023 14:46

230630-r492faee4v 10

Analysis

  • max time kernel
    131s
  • max time network
    154s
  • platform
    windows10-1703_x64
  • resource
    win10-20231215-en
  • resource tags

    arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system
  • submitted
    21-01-2024 14:53

General

  • Target

    Trigona.exe

  • Size

    1.1MB

  • MD5

    2c31a750240788f924ef64a2fb4fdf3b

  • SHA1

    c9c6a7f911d16b49d8b838dca3683357b72c9d6d

  • SHA256

    b49bf3a4baf637e067a8db7360051eba39713b7958519b49f8e236b6014c8477

  • SHA512

    1e36c96110b793bfea2e65f6ff4c0e59a0a6b8f86395d7be6497be264954ab9b7c61d0adfa85dcef5ce69afe4b200b3ece82cbf089264f7d648eaaa53acbd50d

  • SSDEEP

    12288:XRYqX7pdDWExBDmkYhiPJSA0IqOO2vBwRns2MqnuY/gtTyb7:hY6frxBDmkY+Jr0Iql2v4sx+uxtTyn

Malware Config

Signatures

  • Detects Trigona ransomware 12 IoCs
  • Trigona

    A ransomware first seen at the beginning of the 2022.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops desktop.ini file(s) 5 IoCs
  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Trigona.exe
    "C:\Users\Admin\AppData\Local\Temp\Trigona.exe"
    1⤵
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    PID:3572

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Network Service Discovery

1
T1046

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-655921741-723621465-1580683668-1000\desktop.ini
    Filesize

    2KB

    MD5

    fe2c3dc55bdc03bf2c60a8e905a824a7

    SHA1

    2809601d642c756f6bc9b9d55996b68fc98ac154

    SHA256

    267a80d1657b64b2b31b08f2a78ae110931205bd59d8604d56e861955a5e60bc

    SHA512

    c56d180e53c0480d1e723191fa83c35fe354ce56d69d321da83f003323d7f5ef3f9dc55f42aeaf8f0a7f4647399dbaa44423c6ebd8c83b440eb33c8d612dfaee

  • C:\how_to_decrypt.hta
    Filesize

    11KB

    MD5

    b43f9ac06bb47d691a1e58e2b3c28f03

    SHA1

    fd4cd5dd3797d1a93d50505fe69305c9e482f796

    SHA256

    e7c3d0e25ac0401a0604b31c4ae98ca627077333868a87546aafc282281b9f16

    SHA512

    df6afdfff57c37496012a515c0579e6e1e7b0a21805caf603358826b16a2089665c16ad54dbf740a90eac8e05aed88f4840aa50b7498c6c9516ae7a649d1b1a4

  • memory/3572-4-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/3572-0-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/3572-13-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/3572-2-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/3572-1-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/3572-764-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/3572-7423-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/3572-14256-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/3572-16342-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/3572-16343-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/3572-16344-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/3572-16345-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB