Resubmissions

21-01-2024 14:53

240121-r9d6ysead3 10

18-04-2023 10:19

230418-mclsbacf2v 10

Analysis

  • max time kernel
    150s
  • max time network
    167s
  • platform
    windows11-21h2_x64
  • resource
    win11-20231215-en
  • resource tags

    arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    21-01-2024 14:53

General

  • Target

    fb128dbd4e945574a2795c2089340467fcf61bb3232cc0886df98d86ff328d1b.exe

  • Size

    1.1MB

  • MD5

    530967fb3b7d9427552e4ac181a37b9a

  • SHA1

    41bcf469661ab9609a0d181953c2f8ffb75bb483

  • SHA256

    fb128dbd4e945574a2795c2089340467fcf61bb3232cc0886df98d86ff328d1b

  • SHA512

    b81a447a994839a6858bab10eaa2c26aabaf3f73e7ffd2c70d27dfde5f11b35f5d153362277c046d47bcf9dc2d2b7c92d5805e89e633f9326306071abb213afa

  • SSDEEP

    24576:15swNmjEoujhn3wVPWJFwEQWV+u7h62TL:HouNVOEbcah6qL

Malware Config

Signatures

  • Detects Trigona ransomware 14 IoCs
  • Trigona

    A ransomware first seen at the beginning of the 2022.

  • Drops startup file 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 4 IoCs
  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fb128dbd4e945574a2795c2089340467fcf61bb3232cc0886df98d86ff328d1b.exe
    "C:\Users\Admin\AppData\Local\Temp\fb128dbd4e945574a2795c2089340467fcf61bb3232cc0886df98d86ff328d1b.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    PID:956

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3632047111-1948211978-3010235048-1000\desktop.ini
    Filesize

    2KB

    MD5

    9754ebe2ab707ca0f3016dbf8b34bdfa

    SHA1

    2d78053db90755aadb0b5a9ff9a0eedc11a680ac

    SHA256

    0fd3b653653122b8cb3b029406dbc5584e7a28310339473930717a76478f6d3c

    SHA512

    9bc7709de9157d665a9685a6e7e1034dca0f1b10f6a3fa632a3a9b430c84b226c4bc2771af8b3848698604b97b957b9e7d65f3e48c712d864d54eb58e85e4fa3

  • C:\$Recycle.Bin\S-1-5-21-3632047111-1948211978-3010235048-1000\how_to_decrypt.hta
    Filesize

    11KB

    MD5

    51dcaf669676000a5f1bb4b26ec64a79

    SHA1

    87044b41dcaf44f7441d0e15acf38100f1d1c213

    SHA256

    6c630514f518e2b79c1fd51c36d896e54f414e0e2b8577fe4e468d68c7f4c0b5

    SHA512

    0194ea85b2b7aa31107802895901e3bbb2c68d74650ddaa65729969ff5566ade23a1636bcaa744d2bd2fa7983b825118d81e891f31bf419e3b0de80b06fb373e

  • memory/956-4950-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/956-6181-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/956-2-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/956-2633-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/956-4335-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/956-1-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/956-0-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/956-7-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/956-9941-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/956-11964-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/956-13924-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/956-17291-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/956-20511-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/956-22762-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB