Resubmissions

21-01-2024 14:54

240121-r9z4esdeaj 10

03-02-2023 07:15

230203-h3h2wscd88 10

Analysis

  • max time kernel
    147s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-01-2024 14:54

General

  • Target

    704f1655ce9127d7aab6d82660b48a127b5f00cadd7282acb03c440f21dae5e2.exe

  • Size

    1.1MB

  • MD5

    67dd0708a2dcbe6b7661fd5eb4593ea7

  • SHA1

    3d496563984c73e129577da8ca87d3e823fdcce4

  • SHA256

    704f1655ce9127d7aab6d82660b48a127b5f00cadd7282acb03c440f21dae5e2

  • SHA512

    6dc6949196b6aa1e44564c955bf02b45e74247c23408e24fe206087725922dcb5cebb5db58635414313e6c96cfba26758919509ecd0e19832506069236dd9c21

  • SSDEEP

    24576:oYj5E9T+xHeQhNmYOnW8FQrbID+u9v1Qs:Z5E9LQvRrtSvB

Malware Config

Signatures

  • Detects Trigona ransomware 13 IoCs
  • Trigona

    A ransomware first seen at the beginning of the 2022.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops desktop.ini file(s) 1 IoCs
  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\704f1655ce9127d7aab6d82660b48a127b5f00cadd7282acb03c440f21dae5e2.exe
    "C:\Users\Admin\AppData\Local\Temp\704f1655ce9127d7aab6d82660b48a127b5f00cadd7282acb03c440f21dae5e2.exe"
    1⤵
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    PID:780

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Network Service Discovery

1
T1046

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PerfLogs\how_to_decrypt.hta
    Filesize

    11KB

    MD5

    b1c0c42be28e7eb65bcf14aba355bcfb

    SHA1

    9f0e2ea6a2c6e5800e65545e80e264b049a8b196

    SHA256

    7f59ef0f51dff56c2ed55c89d9a608be5b983581b4d410f5ee3f2364a71101f7

    SHA512

    a0619ddf7777dd88c916a7d1c7fc21980e162cee3ee8882bf655a2de085f85ecb128d8c20f1a1621618a6c3d417d3482fe4d2da7d8fe87fd4150741c68631f01

  • memory/780-748-0x0000000000400000-0x0000000000523000-memory.dmp
    Filesize

    1.1MB

  • memory/780-3-0x0000000000400000-0x0000000000523000-memory.dmp
    Filesize

    1.1MB

  • memory/780-5-0x0000000000400000-0x0000000000523000-memory.dmp
    Filesize

    1.1MB

  • memory/780-7-0x0000000000400000-0x0000000000523000-memory.dmp
    Filesize

    1.1MB

  • memory/780-1-0x0000000000400000-0x0000000000523000-memory.dmp
    Filesize

    1.1MB

  • memory/780-0-0x0000000000400000-0x0000000000523000-memory.dmp
    Filesize

    1.1MB

  • memory/780-1699-0x0000000000400000-0x0000000000523000-memory.dmp
    Filesize

    1.1MB

  • memory/780-10698-0x0000000000400000-0x0000000000523000-memory.dmp
    Filesize

    1.1MB

  • memory/780-15583-0x0000000000400000-0x0000000000523000-memory.dmp
    Filesize

    1.1MB

  • memory/780-26610-0x0000000000400000-0x0000000000523000-memory.dmp
    Filesize

    1.1MB

  • memory/780-27173-0x0000000000400000-0x0000000000523000-memory.dmp
    Filesize

    1.1MB

  • memory/780-29678-0x0000000000400000-0x0000000000523000-memory.dmp
    Filesize

    1.1MB

  • memory/780-34097-0x0000000000400000-0x0000000000523000-memory.dmp
    Filesize

    1.1MB