Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12-01-2024 06:00
Behavioral task
behavioral1
Sample
2024-01-11_754b79913fde2de487e9fc2826b65d57_ryuk_trickbot.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-11_754b79913fde2de487e9fc2826b65d57_ryuk_trickbot.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-11_754b79913fde2de487e9fc2826b65d57_ryuk_trickbot.exe
-
Size
666KB
-
MD5
754b79913fde2de487e9fc2826b65d57
-
SHA1
c8299aadf886da55cb47e5cbafe8c5a482b47fc8
-
SHA256
0816d66320d221de576c8a9e6af1b05c7656832939876dd99bb8b40029fe694a
-
SHA512
4a2420e2e89757cab2376932ce548f9b31b845f8c99dfd1cdd9a3b53dabed9e3cb11ecf514edeaccd932f277f65397c126ecaf42831f016554d2001034a25a1d
-
SSDEEP
12288:b9x+Tm3J3SrhP6pRKBdxZXi0gjFBFq4wTdbU0Cp4RWeAK+1coRm:b9nJ3SrhC+BdxZXi0gjFLq4wTZU0Cp4N
Malware Config
Signatures
-
Detected AnchorDNS Backdoor 2 IoCs
Sample triggered yara rules associated with the AnchorDNS malware family.
resource yara_rule behavioral1/files/0x000b000000014181-4.dat family_anchor_dns behavioral1/files/0x000b000000014181-6.dat family_anchor_dns -
Executes dropped EXE 1 IoCs
pid Process 2628 2024-01-11_754b79913fde2de487e9fc2826b65d57_ryuk_trickbot.exe -
Loads dropped DLL 1 IoCs
pid Process 2720 taskeng.exe -
NTFS ADS 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\2024-01-11_754b79913fde2de487e9fc2826b65d57_ryuk_trickbot.exe:$TASK 2024-01-11_754b79913fde2de487e9fc2826b65d57_ryuk_trickbot.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\2024-01-11_754b79913fde2de487e9fc2826b65d57_ryuk_trickbot.exe:$FILE 2024-01-11_754b79913fde2de487e9fc2826b65d57_ryuk_trickbot.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\2024-01-11_754b79913fde2de487e9fc2826b65d57_ryuk_trickbot.exe: data 2024-01-11_754b79913fde2de487e9fc2826b65d57_ryuk_trickbot.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2720 taskeng.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2628 2720 taskeng.exe 31 PID 2720 wrote to memory of 2628 2720 taskeng.exe 31 PID 2720 wrote to memory of 2628 2720 taskeng.exe 31 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-11_754b79913fde2de487e9fc2826b65d57_ryuk_trickbot.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-11_754b79913fde2de487e9fc2826b65d57_ryuk_trickbot.exe"1⤵
- NTFS ADS
PID:1876
-
C:\Windows\system32\taskeng.exetaskeng.exe {7008CDA2-FD1A-4410-8CEE-3CC18F44C61F} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\2024-01-11_754b79913fde2de487e9fc2826b65d57_ryuk_trickbot.exeC:\Users\Admin\AppData\Local\Temp\2024-01-11_754b79913fde2de487e9fc2826b65d57_ryuk_trickbot.exe -u2⤵
- Executes dropped EXE
- NTFS ADS
PID:2628
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
666KB
MD5754b79913fde2de487e9fc2826b65d57
SHA1c8299aadf886da55cb47e5cbafe8c5a482b47fc8
SHA2560816d66320d221de576c8a9e6af1b05c7656832939876dd99bb8b40029fe694a
SHA5124a2420e2e89757cab2376932ce548f9b31b845f8c99dfd1cdd9a3b53dabed9e3cb11ecf514edeaccd932f277f65397c126ecaf42831f016554d2001034a25a1d
-
Filesize
391KB
MD522c9529dca46585e218456d3c3b73849
SHA1fb2b161fb762b133ac75f8223366469e877974ec
SHA256252b9e29758494dc583d493b585d4cf367504410605eb3b28134c91ecde45f64
SHA51211e625f057af6dff6b2007e07a2a786c870a4bb54568501f059ba59e24064e9835b2987fa7e0cd0dcf670430c2db04517e9ea50af635fc078d2d5e91dfd52ed1