Resubmissions

21-01-2024 14:53

240121-r9m4vsddhn 10

05-04-2023 12:55

230405-p5386seg66 10

Analysis

  • max time kernel
    64s
  • max time network
    151s
  • platform
    windows10-1703_x64
  • resource
    win10-20231215-en
  • resource tags

    arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system
  • submitted
    21-01-2024 14:53

General

  • Target

    8cbe32f31befe7c4169f25614afd1778006e4bda6c6091531bc7b4ff4bf62376.exe

  • Size

    1.1MB

  • MD5

    eb9fdc083164c0cead39fecaad9aafb4

  • SHA1

    19c8782165f56d4153658da5f88f9edd14ae2022

  • SHA256

    8cbe32f31befe7c4169f25614afd1778006e4bda6c6091531bc7b4ff4bf62376

  • SHA512

    c4c54de23730f5265d29372c21f4f2212a0204f9b83d7fba5dacb0578fbe9f1c95e7521ff892364253f0cd8f4cfbf5befbef387af942714eb4b1b983b0258603

  • SSDEEP

    24576:2Y5sZYIcpO4Y4w+xEjN7oQr+O+uvjx8t2mEdp:/Y4470JYj+kmEf

Malware Config

Signatures

  • Detects Trigona ransomware 13 IoCs
  • Trigona

    A ransomware first seen at the beginning of the 2022.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops desktop.ini file(s) 1 IoCs
  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8cbe32f31befe7c4169f25614afd1778006e4bda6c6091531bc7b4ff4bf62376.exe
    "C:\Users\Admin\AppData\Local\Temp\8cbe32f31befe7c4169f25614afd1778006e4bda6c6091531bc7b4ff4bf62376.exe"
    1⤵
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    PID:3380

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-655921741-723621465-1580683668-1000\desktop.ini

    Filesize

    2KB

    MD5

    920504387a2452d236188020f0da6798

    SHA1

    765e71cd8e476bc3eb115ffe73acf5d5b78450c7

    SHA256

    ea56d65c3a0640b5d1f75021362f420e99087b61088fd4c546f4da8e16a36c56

    SHA512

    d9abc103be71ac759baaf41a68275aafac4dfcd65b2779cd8a0527b1d829492de1eb509fb39398587715790491826c9171af676204ba8cbe7e059ab7eda6cc30

  • C:\$Recycle.Bin\S-1-5-21-655921741-723621465-1580683668-1000\how_to_decrypt.hta

    Filesize

    12KB

    MD5

    57e2379bc6ff046542891b9af81dea2f

    SHA1

    2cb0f2ca068673b0a625437cc4a28fe2a278157a

    SHA256

    1a07fb2de58e996ff8da6463d085816f80dc1e744072aad76f718695faf03478

    SHA512

    a96c917034bc281e576afcb69367a3fc4573920a75f0d0b42ce9b3e18f481f4c086df1b5062b4d706037082a9a4d55258b6668399a27c9c92ccfb212fee5aa76

  • memory/3380-854-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/3380-2-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/3380-209-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/3380-850-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/3380-0-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/3380-1-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/3380-1466-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/3380-2064-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/3380-8161-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/3380-9920-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/3380-12507-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/3380-14086-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/3380-15953-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB