Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12-02-2025 06:11

General

  • Target

    d743daa22fdf4313a10da027b034c603eda255be037cb45b28faea23114d3b8a.exe

  • Size

    1.1MB

  • MD5

    1852be15aa8dcf664291b3849bd348e4

  • SHA1

    eea811d2a304101cc0b0edebe6590ea0f3da0a27

  • SHA256

    d743daa22fdf4313a10da027b034c603eda255be037cb45b28faea23114d3b8a

  • SHA512

    91ca1d44fa98a43dbc53541cecb8ca656df01d6dc57783f12c70df49347520e150796834731b56107976b5b9dc915006d18caf39ac6792187d605542452bd4eb

  • SSDEEP

    24576:hY6frxBDmkY+Jr0Iql2v4sx+uxtTyJuqe:bKuTvBwSdCud

Malware Config

Signatures

  • Detects Trigona ransomware 12 IoCs
  • Trigona

    A ransomware first seen at the beginning of the 2022.

  • Trigona family
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 14 IoCs
  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d743daa22fdf4313a10da027b034c603eda255be037cb45b28faea23114d3b8a.exe
    "C:\Users\Admin\AppData\Local\Temp\d743daa22fdf4313a10da027b034c603eda255be037cb45b28faea23114d3b8a.exe"
    1⤵
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2516

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3290804112-2823094203-3137964600-1000\desktop.ini

    Filesize

    2KB

    MD5

    4e37b87a5aa9784856646547d8c20cab

    SHA1

    11e9b6579adeee866ba1755beee04a11c4b538c0

    SHA256

    5db63a65dafeced1a1e0a8bd6e45a7b5082a64cdc516ccd5143907b6598495cf

    SHA512

    f2fad0a8944a5215de8667d2fd0f83eb0ee87074606d37e04ead803d8897ad8a604fb259c4e019b1c127942ce2eb92c62bb4b155c3a028bdc22ff3d736674087

  • C:\how_to_decrypt.hta

    Filesize

    11KB

    MD5

    954f6bc2f3940ba458c2c44cc89e1bfe

    SHA1

    897aca8ce7f532fe46c5fc738aa9b91c7d17d8e3

    SHA256

    4e9d3dc70cb3d061c618e63473d1efbd39f6413733167c76540676f53fa18445

    SHA512

    fe33600a97dea7848be1a8a24e4210dc644a5f03c87e12ea8dbd05d611f0a0e5f6bfbf06dda97684c1d2615be0c7d1147aeab025a42aa25954f0b36ba33d3256

  • memory/2516-4-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/2516-0-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/2516-13-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/2516-2-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/2516-1-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/2516-807-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/2516-7707-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/2516-11587-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/2516-11683-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/2516-11778-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/2516-15633-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB

  • memory/2516-28394-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB