Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-02-2024 11:17

General

  • Target

    sample.exe

  • Size

    1.1MB

  • MD5

    a031edc72ddea262780560405c0ea4ae

  • SHA1

    7466b3a81dad69b01df5d4b1233734bc0454ced8

  • SHA256

    eda603f4d469d017917f5d6affeb992fdf3b7971e49868ece8c38fb8e6f8b444

  • SHA512

    608d6f490db60a8a0a9d25b5920bc1ced718a2de31a2293e799c79b15850e4a325f8dcdf004f95f09dad0093722d51cd83ee7bc33553a82a0cb87aff0004323f

  • SSDEEP

    24576:xY6frxBDmkY+Jr0Iql2v4sx+uxtTy1eFR:LKuTvBwSd7R

Malware Config

Signatures

  • Detects Trigona ransomware 13 IoCs
  • Trigona

    A ransomware first seen at the beginning of the 2022.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops desktop.ini file(s) 4 IoCs
  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\sample.exe
    "C:\Users\Admin\AppData\Local\Temp\sample.exe"
    1⤵
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    PID:464

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Network Service Discovery

1
T1046

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-275798769-4264537674-1142822080-1000\desktop.ini
    Filesize

    2KB

    MD5

    3f998866788156b1d388b704ca6ad0a3

    SHA1

    0b0642863652d38873dda6fd92e0dd826d2110e8

    SHA256

    9c1e94dd46dae742d8d4508d12a5c88f2948c4b02ebf942857a57e89bee56dad

    SHA512

    63c659fcadb4da16d30994f602220870ac79d3852973c3e794b8e9824bbdecbfe46508758b0ce9a5ced891ca309d61c4bd4f50f817d573fc16bbae4d278bba2b

  • C:\how_to_decrypt.hta
    Filesize

    11KB

    MD5

    e2817c5b88f880aca976bd0cf37f1644

    SHA1

    9ca2a1b92b340c05609af91399caed47e04eae99

    SHA256

    030ec1b8e290dfb7c13dd8d3027bbe32b7edc4c2c00b67f5cf7bfe959f546052

    SHA512

    b7e43d4e7b8b077a8eba745b1870fa9db31e3ea054a8844fcefb80cdd8f43312e1c44143408ad44aa28aa49ede11e09e8c80399707e937497697d66d11947e79

  • memory/464-4-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/464-0-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/464-6-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/464-13-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/464-2-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/464-1-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/464-789-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/464-9197-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/464-16877-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/464-19301-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/464-19302-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/464-19303-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/464-19304-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB