Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-02-2024 11:17

General

  • Target

    sample.exe

  • Size

    1.1MB

  • MD5

    27175ea8cbe46ff37de5f88c3bb914af

  • SHA1

    5132fd07a623dfeffbb7448531e2ba8baa91b144

  • SHA256

    f29b948905449f330d2e5070d767d0dac4837d0b566eee28282dc78749083684

  • SHA512

    9902c6c6ddf50848f27cb9aae23a53ae976bf4959fe48eab8ef099dc03cad56310ce031e74ea53017ce01fa456b030b214f0760576821a4e1efe20b6e854970f

  • SSDEEP

    24576:n5shvRvrJpGinVvvr9snyoYo+uk8jfLRmb:kZGG6nILifLR+

Malware Config

Signatures

  • Detects Trigona ransomware 13 IoCs
  • Trigona

    A ransomware first seen at the beginning of the 2022.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops desktop.ini file(s) 4 IoCs
  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\sample.exe
    "C:\Users\Admin\AppData\Local\Temp\sample.exe"
    1⤵
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    PID:3872

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-399997616-3400990511-967324271-1000\desktop.ini

    Filesize

    2KB

    MD5

    67a0ffdab9da8ee922a348a87c6cc0ad

    SHA1

    954887fbea62b493457316b518b3d022a37330de

    SHA256

    ca3b74634cf6c58c139636af3f0225c69caa41f0ba055ff99a46e645f3d86640

    SHA512

    7ecdddfbe2d3eed6598c85ee88b177a64ab6bd5a7adb8440c3bb783333b290d3c6f028c230a3f1aee04d5e0f76fcfc9d7da6aed024ffc85c87191538ee43c253

  • C:\how_to_decrypt.hta

    Filesize

    12KB

    MD5

    0ce92c9694815374537c4eac60461370

    SHA1

    e18c4ab182b33a86ddc36daa980189e923d33f3c

    SHA256

    0ef9acacbed385f54a99773c345e3298c1676c6912e3bc50c54ff3e990329444

    SHA512

    cb753e54b358e93cb41d6921647680df9c296bac369c9796d127089f3a09accf898a33d1e27b637c9101313f468575b54c82c47370f0373f56dbe871d6770d18

  • memory/3872-5-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/3872-0-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/3872-12-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/3872-3-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/3872-1-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/3872-656-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/3872-3333-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/3872-11746-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/3872-17240-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/3872-19292-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/3872-19293-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/3872-19294-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/3872-19295-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB