Resubmissions

21-01-2024 14:53

240121-r9tawaddhp 10

17-03-2023 06:39

230317-helswaef33 10

Analysis

  • max time kernel
    151s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-01-2024 14:53

General

  • Target

    f64211b0a49589bb53523dfb88eb9937ab88c8fcea98e2aabcbee90f1828e94e.exe

  • Size

    1.1MB

  • MD5

    e248e214c121845e69bbf266cc9e2853

  • SHA1

    683a1a845f0c2d0f358d62a450f710f960190f2f

  • SHA256

    f64211b0a49589bb53523dfb88eb9937ab88c8fcea98e2aabcbee90f1828e94e

  • SHA512

    d5a5968b079b2a561f2adeaa1cff9ba8e2faac242ef362894dde0b8f72ec725780da651950d06e2b019369f34dbbaf31a497440b4aabe7f8357f789bbdab9031

  • SSDEEP

    24576:KYxvmwliqDHWHVjdzuM7Br+e5rh+u7z7k:Zvmw3UjnrP9gQY

Malware Config

Signatures

  • Trigona

    A ransomware first seen at the beginning of the 2022.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops desktop.ini file(s) 4 IoCs
  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f64211b0a49589bb53523dfb88eb9937ab88c8fcea98e2aabcbee90f1828e94e.exe
    "C:\Users\Admin\AppData\Local\Temp\f64211b0a49589bb53523dfb88eb9937ab88c8fcea98e2aabcbee90f1828e94e.exe"
    1⤵
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    PID:2268

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1815711207-1844170477-3539718864-1000\desktop.ini

    Filesize

    897B

    MD5

    151ef62fdec8031b5b9ef4c5b5d9f0d6

    SHA1

    17c11d9b5508da6a36a12e4735373b6de482994e

    SHA256

    dc0432f3bee27a26569cf6c950493ca393240e0962fa9e3e593dca52060db9ac

    SHA512

    813413d097c10c9951ed3e5dde570774968b86ff3ab4d2e2fd9183d8c56268604a220cf66d219d5ddd8c47c0eecfcf5f975f83abf480542326de481daeff5c8d

  • C:\$Recycle.Bin\S-1-5-21-1815711207-1844170477-3539718864-1000\how_to_decrypt.hta

    Filesize

    11KB

    MD5

    51ff4d353adc5d947877e43da8a3fb62

    SHA1

    f7b99631470c2f897c73aaa1db402d5677e79e0d

    SHA256

    911b178da73d85e8d575716dfd267530ec8dc03bf4c1ac65d8e503d3bd371262

    SHA512

    ff688dde94f387cf75b36e63e72fc011ece662e053336eed3598ad4916258c8d4120d04528b91ca69f110a2b59f359585f712328026efce208de16249ddc765d

  • memory/2268-6903-0x0000000000400000-0x0000000000522000-memory.dmp

    Filesize

    1.1MB

  • memory/2268-8811-0x0000000000400000-0x0000000000522000-memory.dmp

    Filesize

    1.1MB

  • memory/2268-3-0x0000000000400000-0x0000000000522000-memory.dmp

    Filesize

    1.1MB

  • memory/2268-1-0x0000000000400000-0x0000000000522000-memory.dmp

    Filesize

    1.1MB

  • memory/2268-1969-0x0000000000400000-0x0000000000522000-memory.dmp

    Filesize

    1.1MB

  • memory/2268-5349-0x0000000000400000-0x0000000000522000-memory.dmp

    Filesize

    1.1MB

  • memory/2268-0-0x0000000000400000-0x0000000000522000-memory.dmp

    Filesize

    1.1MB

  • memory/2268-4-0x0000000000400000-0x0000000000522000-memory.dmp

    Filesize

    1.1MB

  • memory/2268-11157-0x0000000000400000-0x0000000000522000-memory.dmp

    Filesize

    1.1MB

  • memory/2268-14243-0x0000000000400000-0x0000000000522000-memory.dmp

    Filesize

    1.1MB

  • memory/2268-15472-0x0000000000400000-0x0000000000522000-memory.dmp

    Filesize

    1.1MB

  • memory/2268-15859-0x0000000000400000-0x0000000000522000-memory.dmp

    Filesize

    1.1MB

  • memory/2268-18170-0x0000000000400000-0x0000000000522000-memory.dmp

    Filesize

    1.1MB

  • memory/2268-21003-0x0000000000400000-0x0000000000522000-memory.dmp

    Filesize

    1.1MB