Resubmissions

21-01-2024 14:53

240121-r9a5asead2 10

30-06-2023 14:46

230630-r492faee4v 10

Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows11-21h2_x64
  • resource
    win11-20231215-en
  • resource tags

    arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    21-01-2024 14:53

General

  • Target

    Trigona.exe

  • Size

    1.1MB

  • MD5

    2c31a750240788f924ef64a2fb4fdf3b

  • SHA1

    c9c6a7f911d16b49d8b838dca3683357b72c9d6d

  • SHA256

    b49bf3a4baf637e067a8db7360051eba39713b7958519b49f8e236b6014c8477

  • SHA512

    1e36c96110b793bfea2e65f6ff4c0e59a0a6b8f86395d7be6497be264954ab9b7c61d0adfa85dcef5ce69afe4b200b3ece82cbf089264f7d648eaaa53acbd50d

  • SSDEEP

    12288:XRYqX7pdDWExBDmkYhiPJSA0IqOO2vBwRns2MqnuY/gtTyb7:hY6frxBDmkY+Jr0Iql2v4sx+uxtTyn

Malware Config

Signatures

  • Detects Trigona ransomware 12 IoCs
  • Trigona

    A ransomware first seen at the beginning of the 2022.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 4 IoCs
  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Trigona.exe
    "C:\Users\Admin\AppData\Local\Temp\Trigona.exe"
    1⤵
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    PID:2008

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-771046930-2949676035-3337286276-1000\desktop.ini
    Filesize

    2KB

    MD5

    3004349f0806669706b4edac7d43c079

    SHA1

    45b597b2721c942c631413dcf793f3ca8dd734ce

    SHA256

    65e7e3cc4ed18bacd12c4cf5da61e9e8933e734154dfb4125fd0198f187e4a4f

    SHA512

    1b87b7df0109685db8c6a2b5995d7aa8bfd5e8b279dde066abd69a7031c577fd01001f27a4380a958ada993ea6ae71b75feb9044d0ec44a3cc7c85bf470624b6

  • C:\how_to_decrypt.hta
    Filesize

    11KB

    MD5

    ca6e2244804ab875621cc834c0880122

    SHA1

    d26a83202eaf44cc15d27b9778a73c51a619f3e2

    SHA256

    9d0b06b8c31c6b2995b3dfe27a65b865d9b6949007abe5590ddf28d0bf44b703

    SHA512

    67e077cc7f465cf7cedaa39331bfcfc38279a78e80c89edea3a14789a6cc2c90f45b75000ecd08fc7a712f665bc1798d6cac4d0c4c283bcd18499a306cc335d7

  • memory/2008-4-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/2008-0-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/2008-13-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/2008-2-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/2008-1-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/2008-970-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/2008-11552-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/2008-17244-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/2008-19295-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/2008-19296-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/2008-19297-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/2008-19298-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB