Resubmissions

21-01-2024 14:53

240121-r9m4vsddhn 10

05-04-2023 12:55

230405-p5386seg66 10

Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-01-2024 14:53

General

  • Target

    8cbe32f31befe7c4169f25614afd1778006e4bda6c6091531bc7b4ff4bf62376.exe

  • Size

    1.1MB

  • MD5

    eb9fdc083164c0cead39fecaad9aafb4

  • SHA1

    19c8782165f56d4153658da5f88f9edd14ae2022

  • SHA256

    8cbe32f31befe7c4169f25614afd1778006e4bda6c6091531bc7b4ff4bf62376

  • SHA512

    c4c54de23730f5265d29372c21f4f2212a0204f9b83d7fba5dacb0578fbe9f1c95e7521ff892364253f0cd8f4cfbf5befbef387af942714eb4b1b983b0258603

  • SSDEEP

    24576:2Y5sZYIcpO4Y4w+xEjN7oQr+O+uvjx8t2mEdp:/Y4470JYj+kmEf

Malware Config

Signatures

  • Detects Trigona ransomware 13 IoCs
  • Trigona

    A ransomware first seen at the beginning of the 2022.

  • Drops startup file 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops desktop.ini file(s) 4 IoCs
  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8cbe32f31befe7c4169f25614afd1778006e4bda6c6091531bc7b4ff4bf62376.exe
    "C:\Users\Admin\AppData\Local\Temp\8cbe32f31befe7c4169f25614afd1778006e4bda6c6091531bc7b4ff4bf62376.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    PID:3428

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1232405761-1209240240-3206092754-1000\desktop.ini
    Filesize

    2KB

    MD5

    3318742cfd8b8a94e706874b79a41da0

    SHA1

    7c6b246cbb3c91cfb14a65ff6e8624bb7acd267a

    SHA256

    ca13e2c3b447485b14e8b1fba4062cfcb9092c49d0a8629694c3970c40834c05

    SHA512

    00c16a0478ab70d9102400e0287c2964584e48ca12f639018805831e9ff31d9ad0ba5d39e9c868f66dc82aef5113a51d1099ac5b140cc7ebc044d8a59d16c587

  • C:\$Recycle.Bin\S-1-5-21-1232405761-1209240240-3206092754-1000\how_to_decrypt.hta
    Filesize

    12KB

    MD5

    21bf1f5c159901df30ef15b581b35371

    SHA1

    fd2e67963fef2e8a613a3dc5f030e8c8d9eb7680

    SHA256

    de33079ccfe40bc357d0c3c0345d2a7ecf4d52aff14a07e3aec344e81f1ff3ef

    SHA512

    769ef2da6b799e9954962462a1ca9e6fad00284d5f49cbdf08bd83c6f5df0911742d3f87ab0787587786f74558b489b3eaf9b517b09862febc707142a134e2fc

  • memory/3428-4439-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/3428-8-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/3428-2-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/3428-2933-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/3428-0-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/3428-1-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/3428-5054-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/3428-7545-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/3428-17675-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/3428-22832-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/3428-22833-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/3428-22834-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/3428-22835-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB