Analysis

  • max time kernel
    151s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28-02-2024 11:17

General

  • Target

    sample.exe

  • Size

    1.1MB

  • MD5

    27175ea8cbe46ff37de5f88c3bb914af

  • SHA1

    5132fd07a623dfeffbb7448531e2ba8baa91b144

  • SHA256

    f29b948905449f330d2e5070d767d0dac4837d0b566eee28282dc78749083684

  • SHA512

    9902c6c6ddf50848f27cb9aae23a53ae976bf4959fe48eab8ef099dc03cad56310ce031e74ea53017ce01fa456b030b214f0760576821a4e1efe20b6e854970f

  • SSDEEP

    24576:n5shvRvrJpGinVvvr9snyoYo+uk8jfLRmb:kZGG6nILifLR+

Malware Config

Signatures

  • Detects Trigona ransomware 12 IoCs
  • Trigona

    A ransomware first seen at the beginning of the 2022.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 11 IoCs
  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\sample.exe
    "C:\Users\Admin\AppData\Local\Temp\sample.exe"
    1⤵
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    PID:2956

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2461186416-2307104501-1787948496-1000\desktop.ini
    Filesize

    2KB

    MD5

    8e67fa7d6f53e8366fb0ef872888958f

    SHA1

    e00359293328848ace7a8ba55dfc17ec1dcea97d

    SHA256

    ed9e02e9ff6e0655fd1259d49cde45b2a7328f4dd45d3147c52a2cfed29894dc

    SHA512

    db631405af03f506ea2eea7095c0d30a4b5ba1593b40ff6c31513947d7d19a98d55b230dc1e36183374bed8e0d7e6bcbc885720f274933b81f9dec8de1ecd03b

  • C:\how_to_decrypt.hta
    Filesize

    12KB

    MD5

    21012c3c558cf185219f0ec15c770a44

    SHA1

    802f4c8789513c862f83465ee2f6b4e7f68a59bf

    SHA256

    0198c292ecec40e5923e8b76696fa84a50a3e54dadef9bd17e7556bccaec594f

    SHA512

    14bc87199a518ad647a3f432873b16c3755aedc1ff53ee6cb1a3af3c6dd9a0afff1fb305428b6e2a6390b62c88e502650263d6aeefdf4182e808c8d5e9132b0d

  • memory/2956-5-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/2956-0-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/2956-12-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/2956-3-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/2956-1-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/2956-739-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/2956-1221-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/2956-8765-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/2956-9059-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/2956-10566-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/2956-11667-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/2956-11668-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB