Analysis

  • max time kernel
    160s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28-02-2024 11:18

General

  • Target

    sample.exe

  • Size

    1.1MB

  • MD5

    cd215489a03871eaac431180546f162e

  • SHA1

    acb517dc5ec2376176cc3116bebfdf71d314663b

  • SHA256

    761b78ddab55b4e561607ce5ce9d424a7aec4f1994aad988f0612b096cdd1d6d

  • SHA512

    124821f7d1860a513bc3c51a8f11bc0134877930f5bc46c4675a7d407b8523ae5c4cb596cf6c72ace9dd50245910c71eda216b1169a53e458e8e8bd378059892

  • SSDEEP

    12288:HRYqX7pdDWExBDmkYhiPJSA0IqOO2vBwRns2MqnuY/gtTy7FXu9:xY6frxBDmkY+Jr0Iql2v4sx+uxtTyp+9

Malware Config

Signatures

  • Detects Trigona ransomware 13 IoCs
  • Trigona

    A ransomware first seen at the beginning of the 2022.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 11 IoCs
  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\sample.exe
    "C:\Users\Admin\AppData\Local\Temp\sample.exe"
    1⤵
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    PID:2884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-778096762-2241304387-192235952-1000\desktop.ini

    Filesize

    2KB

    MD5

    672ae8669e8852e1c6f0c8dad433171f

    SHA1

    995aaa356d3af5896561d9692dc2cf49e43c06fa

    SHA256

    d38145f4a5c59bdb2aedb32fd4555f630992277bfba962ea2b23245e7bd27f20

    SHA512

    85bac2726386098fea95994e0e18b931419055af251cae81bac49ec6ab632e1146672a1373535a17cb10b3a1f0ca38829f56e14a0a486bb9edb4837455146b91

  • C:\how_to_decrypt.hta

    Filesize

    11KB

    MD5

    9adf3ff8cbd58d35ee3a7f1118179fc2

    SHA1

    9ebec6495c42bff3269a104b8723f494b9c1a77d

    SHA256

    8431ccdf9366e13af6bd08d35cc5e54b1a66b2a433fb808951278781058d68a4

    SHA512

    031c00a24a7893c8111727e416ef34a2ff5d3a2b4c7600d3bf49784720c6eb4dfbbb110823e6c156a2faf2589c797f91d6348729ed27eb1f1edf26b16f128cf5

  • memory/2884-5-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/2884-0-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/2884-12-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/2884-3-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/2884-1-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/2884-662-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/2884-709-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/2884-713-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/2884-721-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/2884-837-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/2884-3177-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/2884-7421-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/2884-10685-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB