Resubmissions

21-01-2024 14:53

240121-r9a5asead2 10

30-06-2023 14:46

230630-r492faee4v 10

Analysis

  • max time kernel
    158s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-01-2024 14:53

General

  • Target

    Trigona.exe

  • Size

    1.1MB

  • MD5

    2c31a750240788f924ef64a2fb4fdf3b

  • SHA1

    c9c6a7f911d16b49d8b838dca3683357b72c9d6d

  • SHA256

    b49bf3a4baf637e067a8db7360051eba39713b7958519b49f8e236b6014c8477

  • SHA512

    1e36c96110b793bfea2e65f6ff4c0e59a0a6b8f86395d7be6497be264954ab9b7c61d0adfa85dcef5ce69afe4b200b3ece82cbf089264f7d648eaaa53acbd50d

  • SSDEEP

    12288:XRYqX7pdDWExBDmkYhiPJSA0IqOO2vBwRns2MqnuY/gtTyb7:hY6frxBDmkY+Jr0Iql2v4sx+uxtTyn

Malware Config

Signatures

  • Detects Trigona ransomware 13 IoCs
  • Trigona

    A ransomware first seen at the beginning of the 2022.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 4 IoCs
  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Trigona.exe
    "C:\Users\Admin\AppData\Local\Temp\Trigona.exe"
    1⤵
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    PID:3272

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3073191680-435865314-2862784915-1000\desktop.ini
    Filesize

    2KB

    MD5

    209df1668b94cd83ceb1dae46201e25a

    SHA1

    d4c9cecc3d1c0d8c935e023b8dbe9f50ae73f2e3

    SHA256

    00df70eac265ba2a700056675d368b76b9af669d35477910094d13b854eaa368

    SHA512

    91b302a86eea003492a8ec92eb33e07644b6d78eaec5afd1c5a9fb0a529fb130d5db58ff4fb5af8801ff98806668dce6ace975db49dcc947e8b770692c620ff3

  • C:\how_to_decrypt.hta
    Filesize

    11KB

    MD5

    5e6318e1aeed0f69ce15c9abb36eacc0

    SHA1

    0b7664bf9b63dd1ae74ce82b5c136d42366c285f

    SHA256

    9d13e9d6c20d8a71b54a9b53d40dc1281e34f9f55bc999ad3138e4710c3e7b79

    SHA512

    74e0fdddec47295e3464b3d2dd34f18507433ff5e5339618f11d25f96517ef00e7a64b2fef989a8558a9aea808a50eb63c6aebc0ac32b5d3c7d6d99b512c2f6c

  • memory/3272-4-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/3272-0-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/3272-11-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/3272-2-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/3272-1-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/3272-301-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/3272-767-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/3272-1718-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/3272-3366-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/3272-5266-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/3272-7400-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/3272-9897-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/3272-11066-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB