Resubmissions

21-01-2024 14:54

240121-r9z4esdeaj 10

03-02-2023 07:15

230203-h3h2wscd88 10

Analysis

  • max time kernel
    150s
  • max time network
    160s
  • platform
    windows10-1703_x64
  • resource
    win10-20231215-en
  • resource tags

    arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system
  • submitted
    21-01-2024 14:54

General

  • Target

    704f1655ce9127d7aab6d82660b48a127b5f00cadd7282acb03c440f21dae5e2.exe

  • Size

    1.1MB

  • MD5

    67dd0708a2dcbe6b7661fd5eb4593ea7

  • SHA1

    3d496563984c73e129577da8ca87d3e823fdcce4

  • SHA256

    704f1655ce9127d7aab6d82660b48a127b5f00cadd7282acb03c440f21dae5e2

  • SHA512

    6dc6949196b6aa1e44564c955bf02b45e74247c23408e24fe206087725922dcb5cebb5db58635414313e6c96cfba26758919509ecd0e19832506069236dd9c21

  • SSDEEP

    24576:oYj5E9T+xHeQhNmYOnW8FQrbID+u9v1Qs:Z5E9LQvRrtSvB

Malware Config

Signatures

  • Detects Trigona ransomware 13 IoCs
  • Trigona

    A ransomware first seen at the beginning of the 2022.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops desktop.ini file(s) 1 IoCs
  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\704f1655ce9127d7aab6d82660b48a127b5f00cadd7282acb03c440f21dae5e2.exe
    "C:\Users\Admin\AppData\Local\Temp\704f1655ce9127d7aab6d82660b48a127b5f00cadd7282acb03c440f21dae5e2.exe"
    1⤵
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    PID:2296

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Network Service Discovery

1
T1046

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PerfLogs\how_to_decrypt.hta
    Filesize

    11KB

    MD5

    f8c6f2ad777d14f1df4759b06b4de730

    SHA1

    59f06ed52b900592cdfb771542dc0c5fc0dd1c95

    SHA256

    82a62c854b1cd5c21b4eed3b31de10509fc07b47d931b121aeaa3cf48529962e

    SHA512

    0b1ced03c04575ecf59a3088834bfced03631e9ef40054a5e482194baad537dca5f85f145aef012e8c7619974de423c7dd38c36f8bfca41e0308d51531e86016

  • memory/2296-831-0x0000000000400000-0x0000000000523000-memory.dmp
    Filesize

    1.1MB

  • memory/2296-3-0x0000000000400000-0x0000000000523000-memory.dmp
    Filesize

    1.1MB

  • memory/2296-4-0x0000000000400000-0x0000000000523000-memory.dmp
    Filesize

    1.1MB

  • memory/2296-1-0x0000000000400000-0x0000000000523000-memory.dmp
    Filesize

    1.1MB

  • memory/2296-789-0x0000000000400000-0x0000000000523000-memory.dmp
    Filesize

    1.1MB

  • memory/2296-0-0x0000000000400000-0x0000000000523000-memory.dmp
    Filesize

    1.1MB

  • memory/2296-1344-0x0000000000400000-0x0000000000523000-memory.dmp
    Filesize

    1.1MB

  • memory/2296-3564-0x0000000000400000-0x0000000000523000-memory.dmp
    Filesize

    1.1MB

  • memory/2296-8001-0x0000000000400000-0x0000000000523000-memory.dmp
    Filesize

    1.1MB

  • memory/2296-8044-0x0000000000400000-0x0000000000523000-memory.dmp
    Filesize

    1.1MB

  • memory/2296-10257-0x0000000000400000-0x0000000000523000-memory.dmp
    Filesize

    1.1MB

  • memory/2296-12227-0x0000000000400000-0x0000000000523000-memory.dmp
    Filesize

    1.1MB

  • memory/2296-14368-0x0000000000400000-0x0000000000523000-memory.dmp
    Filesize

    1.1MB