Analysis

  • max time kernel
    142s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    12-01-2024 06:00

General

  • Target

    2024-01-11_754b79913fde2de487e9fc2826b65d57_ryuk_trickbot.exe

  • Size

    666KB

  • MD5

    754b79913fde2de487e9fc2826b65d57

  • SHA1

    c8299aadf886da55cb47e5cbafe8c5a482b47fc8

  • SHA256

    0816d66320d221de576c8a9e6af1b05c7656832939876dd99bb8b40029fe694a

  • SHA512

    4a2420e2e89757cab2376932ce548f9b31b845f8c99dfd1cdd9a3b53dabed9e3cb11ecf514edeaccd932f277f65397c126ecaf42831f016554d2001034a25a1d

  • SSDEEP

    12288:b9x+Tm3J3SrhP6pRKBdxZXi0gjFBFq4wTdbU0Cp4RWeAK+1coRm:b9nJ3SrhC+BdxZXi0gjFLq4wTZU0Cp4N

Score
10/10

Malware Config

Signatures

  • AnchorDNS Backdoor

    A backdoor which communicates with C2 through DNS, attributed to the creators of Trickbot and Bazar.

  • Detected AnchorDNS Backdoor 2 IoCs

    Sample triggered yara rules associated with the AnchorDNS malware family.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • NTFS ADS 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-11_754b79913fde2de487e9fc2826b65d57_ryuk_trickbot.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-11_754b79913fde2de487e9fc2826b65d57_ryuk_trickbot.exe"
    1⤵
    • NTFS ADS
    PID:1876
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {7008CDA2-FD1A-4410-8CEE-3CC18F44C61F} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2720
    • C:\Users\Admin\AppData\Local\Temp\2024-01-11_754b79913fde2de487e9fc2826b65d57_ryuk_trickbot.exe
      C:\Users\Admin\AppData\Local\Temp\2024-01-11_754b79913fde2de487e9fc2826b65d57_ryuk_trickbot.exe -u
      2⤵
      • Executes dropped EXE
      • NTFS ADS
      PID:2628

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\2024-01-11_754b79913fde2de487e9fc2826b65d57_ryuk_trickbot.exe

    Filesize

    666KB

    MD5

    754b79913fde2de487e9fc2826b65d57

    SHA1

    c8299aadf886da55cb47e5cbafe8c5a482b47fc8

    SHA256

    0816d66320d221de576c8a9e6af1b05c7656832939876dd99bb8b40029fe694a

    SHA512

    4a2420e2e89757cab2376932ce548f9b31b845f8c99dfd1cdd9a3b53dabed9e3cb11ecf514edeaccd932f277f65397c126ecaf42831f016554d2001034a25a1d

  • \Users\Admin\AppData\Local\Temp\2024-01-11_754b79913fde2de487e9fc2826b65d57_ryuk_trickbot.exe

    Filesize

    391KB

    MD5

    22c9529dca46585e218456d3c3b73849

    SHA1

    fb2b161fb762b133ac75f8223366469e877974ec

    SHA256

    252b9e29758494dc583d493b585d4cf367504410605eb3b28134c91ecde45f64

    SHA512

    11e625f057af6dff6b2007e07a2a786c870a4bb54568501f059ba59e24064e9835b2987fa7e0cd0dcf670430c2db04517e9ea50af635fc078d2d5e91dfd52ed1