Analysis

  • max time kernel
    150s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28-02-2024 11:18

General

  • Target

    sample.exe

  • Size

    1.1MB

  • MD5

    530967fb3b7d9427552e4ac181a37b9a

  • SHA1

    41bcf469661ab9609a0d181953c2f8ffb75bb483

  • SHA256

    fb128dbd4e945574a2795c2089340467fcf61bb3232cc0886df98d86ff328d1b

  • SHA512

    b81a447a994839a6858bab10eaa2c26aabaf3f73e7ffd2c70d27dfde5f11b35f5d153362277c046d47bcf9dc2d2b7c92d5805e89e633f9326306071abb213afa

  • SSDEEP

    24576:15swNmjEoujhn3wVPWJFwEQWV+u7h62TL:HouNVOEbcah6qL

Malware Config

Signatures

  • Detects Trigona ransomware 13 IoCs
  • Trigona

    A ransomware first seen at the beginning of the 2022.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 11 IoCs
  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\sample.exe
    "C:\Users\Admin\AppData\Local\Temp\sample.exe"
    1⤵
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    PID:2656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-330940541-141609230-1670313778-1000\desktop.ini
    Filesize

    2KB

    MD5

    964ce811b570dea40b5acb8a9f2338a1

    SHA1

    317a22a559f5a7aec4f9ca13ed8e8d32fac5dc82

    SHA256

    fc8bd7dafce27cba65a8de1572d79088699f1867337e34ead2ccb5c88b7483c5

    SHA512

    dc0e672980b6b919efaab759deff229a2ebbc365f64d2ebc2db95fde61d432c135eee137ec0757ef0e64fb699ba3f082ca52fed13ea0747746f046f58c1968d0

  • C:\$Recycle.Bin\S-1-5-21-330940541-141609230-1670313778-1000\how_to_decrypt.hta
    Filesize

    11KB

    MD5

    b71cfc16db89952c061b19accf70713b

    SHA1

    537fe532bfa829330cd82d437cb8110eae0872dd

    SHA256

    d288c4716f421aecfe39da644049d2345d01ad4bffb9a130d4bc59abead8d113

    SHA512

    82a272ffbb01a284275d5b062b693369fb6741be58eead384641a6553318aa1fbdb2aaa5cd02a44e1855f45b8ab379980770421ff3d4ec2abe7300ad0aed1491

  • memory/2656-4-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/2656-0-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/2656-9-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/2656-2-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/2656-1836-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/2656-2233-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/2656-2237-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/2656-1-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/2656-2837-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/2656-2922-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/2656-6109-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/2656-9823-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB

  • memory/2656-11412-0x0000000000400000-0x0000000000526000-memory.dmp
    Filesize

    1.1MB