Analysis

  • max time kernel
    114s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20250207-en
  • resource tags

    arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system
  • submitted
    12/02/2025, 06:08

General

  • Target

    a891d24823796a4ffa2fac76d92fec2c7ffae1ac1c3665be0d4f85e13acd33f9.exe

  • Size

    1.7MB

  • MD5

    68635ad9d12f683071611bfd34c1ec34

  • SHA1

    3d59b3053f9f531197a47a6a936240cb81a700d9

  • SHA256

    a891d24823796a4ffa2fac76d92fec2c7ffae1ac1c3665be0d4f85e13acd33f9

  • SHA512

    811764a687edc700883ae31503bedb299702ee6281ae57bc0885f9fd60f80d0f572f545bb060dcd610f904167665ee2a520dbdd77e4f4fd953250b1fcf48cf96

  • SSDEEP

    24576:GGA0AhSVzjJqVR/xmx0AsQ5r2jOGJTS8KmlI+u+68+05vNR:JAhuzc3DXJTS8KmVzecH

Malware Config

Signatures

  • Detects Trigona ransomware 14 IoCs
  • Trigona

    A ransomware first seen at the beginning of the 2022.

  • Trigona family
  • Drops startup file 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 11 IoCs
  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a891d24823796a4ffa2fac76d92fec2c7ffae1ac1c3665be0d4f85e13acd33f9.exe
    "C:\Users\Admin\AppData\Local\Temp\a891d24823796a4ffa2fac76d92fec2c7ffae1ac1c3665be0d4f85e13acd33f9.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    PID:2604

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-677481364-2238709445-1347953534-1000\desktop.ini

    Filesize

    2KB

    MD5

    5799901d4f755d102a3566f882bbd3b2

    SHA1

    03a93f3f215c9fe5a34f463dd730d76faaf852c4

    SHA256

    26bbf6bd1ce805d20157191125560dd5a76488427d990502ba016e8e13901933

    SHA512

    af41dbd0d0636f1ee632db0265b207c244da898117d1d3a8cf90db48c7b731d2dde3a56404cefbb485290d30149526f74f9bd082c713eb4b37fa0140054fd292

  • C:\$Recycle.Bin\S-1-5-21-677481364-2238709445-1347953534-1000\how_to_decrypt.hta

    Filesize

    12KB

    MD5

    9d7351f423e6f4a155188aec9607cfe8

    SHA1

    976262e58bf8844f6a5b48928c135d3e425d8176

    SHA256

    9f1f10832f39e047f8b9fd78b366908e02a47ad180d665835ecdfcc9bcdbfc25

    SHA512

    84d9b588abfdbecfe84bb9a65587a5dbbf581b7809a13344c929ecc7594c00af94669172ffcf35f2108cba25fbb91d06a11b0d0b4495c0a50c26c51a141dfaf0

  • memory/2604-2287-0x0000000000400000-0x00000000005CF000-memory.dmp

    Filesize

    1.8MB

  • memory/2604-1-0x0000000000400000-0x00000000005CF000-memory.dmp

    Filesize

    1.8MB

  • memory/2604-9-0x0000000000400000-0x00000000005CF000-memory.dmp

    Filesize

    1.8MB

  • memory/2604-2-0x0000000000400000-0x00000000005CF000-memory.dmp

    Filesize

    1.8MB

  • memory/2604-2232-0x0000000000400000-0x00000000005CF000-memory.dmp

    Filesize

    1.8MB

  • memory/2604-2261-0x0000000000400000-0x00000000005CF000-memory.dmp

    Filesize

    1.8MB

  • memory/2604-0-0x0000000000400000-0x00000000005CF000-memory.dmp

    Filesize

    1.8MB

  • memory/2604-4-0x0000000000400000-0x00000000005CF000-memory.dmp

    Filesize

    1.8MB

  • memory/2604-2889-0x0000000000400000-0x00000000005CF000-memory.dmp

    Filesize

    1.8MB

  • memory/2604-2965-0x0000000000400000-0x00000000005CF000-memory.dmp

    Filesize

    1.8MB

  • memory/2604-11192-0x0000000000400000-0x00000000005CF000-memory.dmp

    Filesize

    1.8MB

  • memory/2604-13098-0x0000000000400000-0x00000000005CF000-memory.dmp

    Filesize

    1.8MB

  • memory/2604-13099-0x0000000000400000-0x00000000005CF000-memory.dmp

    Filesize

    1.8MB

  • memory/2604-13562-0x0000000000400000-0x00000000005CF000-memory.dmp

    Filesize

    1.8MB