Analysis

  • max time kernel
    54s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    30-09-2022 14:38

General

  • Target

    anydesk setup.msi

  • Size

    8.2MB

  • MD5

    1491e78be7e5a4c5a0475c7c679d1628

  • SHA1

    d591dfa1bc1fce94018be12b0c45627d053406ca

  • SHA256

    49e0e5f0de62fb6647ac6a76a8e57a9b636c777f9304337bff11971a7c6966e3

  • SHA512

    cd0e0f4082fe2cba3e6719776f0ba0663f3c969950edcff118b03fa30f38fde278f80063f207b8cc2f0c4607a2a976e826fdbec165ab3aadafa1a76a25e3c243

  • SSDEEP

    196608:EsmqQDx19HKjYh8EFwIR8j9IR8fsNHKSEv7c:EsmqQdqdIR85IRxNqS8c

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 9 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 57 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I "C:\Users\Admin\AppData\Local\Temp\anydesk setup.msi"
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1284
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1408
    • C:\Windows\Installer\MSIA27A.tmp
      "C:\Windows\Installer\MSIA27A.tmp"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1156
      • C:\Users\Admin\AppData\Local\Temp\is-0MLS4.tmp\MSIA27A.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-0MLS4.tmp\MSIA27A.tmp" /SL5="$1015A,7703614,831488,C:\Windows\Installer\MSIA27A.tmp"
        3⤵
        • Executes dropped EXE
        PID:2024
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:268
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000004D4" "0000000000000494"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:1800

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-0MLS4.tmp\MSIA27A.tmp

    Filesize

    3.0MB

    MD5

    f380cb51b5d8198c0f31f717949c4f00

    SHA1

    088fd106ee395bb75a2ade6e51d21bd2faf63f51

    SHA256

    2aae78bb1eff723a663d54be4973cad7a99ffece60d40524d9dbfac17694c455

    SHA512

    72a8de30962014c78dca691cabc848705af53db452150bc3f7fdfe3a8e1db504b03bb6a6b5fe74d6a9719efd792ce69e839d936bd2918616598ea4b2295b3dd9

  • C:\Windows\Installer\MSIA27A.tmp

    Filesize

    8.1MB

    MD5

    591e2cb28ab4c2c8729b7b8b21797779

    SHA1

    0708d8bade5e1c1e4198b440f988c1b1b722c1e6

    SHA256

    87e0e6a8898d0d8043aec584b4a563943e539a5e7f3cadd78264dec1096f67f7

    SHA512

    08e1ba57ae8364f16c6129a08ee6fcf7380aff036f8946601ab2311143227ef8a10a2057d8eff92e971ddd0006c3dbdeffbeb84bcf2d118228a9859e57186ae4

  • C:\Windows\Installer\MSIA27A.tmp

    Filesize

    8.1MB

    MD5

    591e2cb28ab4c2c8729b7b8b21797779

    SHA1

    0708d8bade5e1c1e4198b440f988c1b1b722c1e6

    SHA256

    87e0e6a8898d0d8043aec584b4a563943e539a5e7f3cadd78264dec1096f67f7

    SHA512

    08e1ba57ae8364f16c6129a08ee6fcf7380aff036f8946601ab2311143227ef8a10a2057d8eff92e971ddd0006c3dbdeffbeb84bcf2d118228a9859e57186ae4

  • \Users\Admin\AppData\Local\Temp\is-0MLS4.tmp\MSIA27A.tmp

    Filesize

    3.0MB

    MD5

    f380cb51b5d8198c0f31f717949c4f00

    SHA1

    088fd106ee395bb75a2ade6e51d21bd2faf63f51

    SHA256

    2aae78bb1eff723a663d54be4973cad7a99ffece60d40524d9dbfac17694c455

    SHA512

    72a8de30962014c78dca691cabc848705af53db452150bc3f7fdfe3a8e1db504b03bb6a6b5fe74d6a9719efd792ce69e839d936bd2918616598ea4b2295b3dd9

  • memory/1156-58-0x00000000762E1000-0x00000000762E3000-memory.dmp

    Filesize

    8KB

  • memory/1156-59-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/1156-62-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/1156-67-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/1284-54-0x000007FEFC211000-0x000007FEFC213000-memory.dmp

    Filesize

    8KB