Analysis
-
max time kernel
84s -
max time network
65s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
21/11/2022, 16:57
Static task
static1
Behavioral task
behavioral1
Sample
AnyDesk.exe
Resource
win10-20220812-en
Behavioral task
behavioral2
Sample
AnyDesk.exe
Resource
win10v2004-20220812-en
General
-
Target
AnyDesk.exe
-
Size
3.8MB
-
MD5
9a1d9fe9b1223273c314632d04008384
-
SHA1
665cad3ed21f6443d1adacf18ca45dfaa8f52c99
-
SHA256
0f4bf8506a2560c568b9815124dfc43a11c561ed611829df841ec7aba8302359
-
SHA512
3ec400acd075a4078d7d9f06c853be4ee0fdd7a9d1628428326534df6c0f3ea8f745af9d29031e9259a1bee2f78dd48dfaebcb7e897c22736909a9d6b4f24ba5
-
SSDEEP
98304:6+NmU7afvNN5+N6F8c5AvtfXmJ+PigmgG:6+NmcaNNH8UotnmL
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AnyDesk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString AnyDesk.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4224 AnyDesk.exe 4224 AnyDesk.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4040 AnyDesk.exe 4040 AnyDesk.exe 4040 AnyDesk.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 4040 AnyDesk.exe 4040 AnyDesk.exe 4040 AnyDesk.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2700 wrote to memory of 4224 2700 AnyDesk.exe 66 PID 2700 wrote to memory of 4224 2700 AnyDesk.exe 66 PID 2700 wrote to memory of 4224 2700 AnyDesk.exe 66 PID 2700 wrote to memory of 4040 2700 AnyDesk.exe 67 PID 2700 wrote to memory of 4040 2700 AnyDesk.exe 67 PID 2700 wrote to memory of 4040 2700 AnyDesk.exe 67
Processes
-
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"1⤵
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe" --local-service2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4224
-
-
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe" --local-control2⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4040
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD5bbd037e2a25a6f623ab9b2bb2b759efb
SHA110f7f85181d5b82bf9bc459e296003e4d6d3a909
SHA256be1ad433ef4026c4774d1b81a176bb1d8f366f8cda7082d277929dbbc0f7414b
SHA51226223c0c957a3bee83759544a6856dfd174233c935a3818250c8dd457f6607368e193f15a11a858062e6e5ea31515c603212e033d57169491ec6925c4a9adf7f
-
Filesize
7KB
MD5bbd037e2a25a6f623ab9b2bb2b759efb
SHA110f7f85181d5b82bf9bc459e296003e4d6d3a909
SHA256be1ad433ef4026c4774d1b81a176bb1d8f366f8cda7082d277929dbbc0f7414b
SHA51226223c0c957a3bee83759544a6856dfd174233c935a3818250c8dd457f6607368e193f15a11a858062e6e5ea31515c603212e033d57169491ec6925c4a9adf7f
-
Filesize
2KB
MD59f0a4358881bb1de2e9601f2ec4b2946
SHA13e95f392c7f902d73d1566f5b447e2df5f21da20
SHA256410f62d7d2d69e74816f682fec62278aee155a88122442022617db254b71e84b
SHA512ea3e13e82af1475d3e8f48f4447529106218c29261983953139d727a091f708e36110d53c7f710b70bb45f6b1fd4f01a32421f055fb66ee8faee7a0f4b852739
-
Filesize
312B
MD50c04ad1083dc5c7c45e3ee2cd344ae38
SHA1f1cf190f8ca93000e56d49732e9e827e2554c46f
SHA2566452273c017db7cbe0ffc5b109bbf3f8d3282fb91bfa3c5eabc4fb8f1fc98cb0
SHA5126c414b39bbc1f1f08446c6c6da6f6e1ceb9303bbf183ae279c872d91641ea8d67ec5e5c4e0824da3837eca73ec29fe70e92b72c09458c8ce50fa6f08791d1492
-
Filesize
424B
MD56dee5580c4281a4907d8c982f0a31222
SHA1ee3cbe6d8d3be041299f5d5bc8c22729805f51d8
SHA256820223450482f41020aa23ee39c12812943964b26731184cf232394b43a6f9f8
SHA51201952ac51081331370a7154997983eed0d3b0beb7d8d82c7759476f903e9ea06a0c2a8de32450b68cc1d5f1144e09a9fcf8bb824f074e1b45572958f30d7afe8
-
Filesize
424B
MD53cbfa1d3820f1f0f1e315ec3b38df8f8
SHA19d10c2432bfc2090c546eee4876415b600fa6c46
SHA256a444a348d7a60fbebff7b96243b1efb128a6b5c3b26f4c780e29652210477d80
SHA5127be4b546caaf35331787122093620d507bb0eca48e9fc7078fa2f39f42041ec6451a8d4ac33a02cbb16234e648400fd792892cc30df0151a307b9d422f74d0b6
-
Filesize
424B
MD56dee5580c4281a4907d8c982f0a31222
SHA1ee3cbe6d8d3be041299f5d5bc8c22729805f51d8
SHA256820223450482f41020aa23ee39c12812943964b26731184cf232394b43a6f9f8
SHA51201952ac51081331370a7154997983eed0d3b0beb7d8d82c7759476f903e9ea06a0c2a8de32450b68cc1d5f1144e09a9fcf8bb824f074e1b45572958f30d7afe8
-
Filesize
424B
MD56dee5580c4281a4907d8c982f0a31222
SHA1ee3cbe6d8d3be041299f5d5bc8c22729805f51d8
SHA256820223450482f41020aa23ee39c12812943964b26731184cf232394b43a6f9f8
SHA51201952ac51081331370a7154997983eed0d3b0beb7d8d82c7759476f903e9ea06a0c2a8de32450b68cc1d5f1144e09a9fcf8bb824f074e1b45572958f30d7afe8
-
Filesize
424B
MD53cbfa1d3820f1f0f1e315ec3b38df8f8
SHA19d10c2432bfc2090c546eee4876415b600fa6c46
SHA256a444a348d7a60fbebff7b96243b1efb128a6b5c3b26f4c780e29652210477d80
SHA5127be4b546caaf35331787122093620d507bb0eca48e9fc7078fa2f39f42041ec6451a8d4ac33a02cbb16234e648400fd792892cc30df0151a307b9d422f74d0b6
-
Filesize
424B
MD56dee5580c4281a4907d8c982f0a31222
SHA1ee3cbe6d8d3be041299f5d5bc8c22729805f51d8
SHA256820223450482f41020aa23ee39c12812943964b26731184cf232394b43a6f9f8
SHA51201952ac51081331370a7154997983eed0d3b0beb7d8d82c7759476f903e9ea06a0c2a8de32450b68cc1d5f1144e09a9fcf8bb824f074e1b45572958f30d7afe8
-
Filesize
424B
MD56dee5580c4281a4907d8c982f0a31222
SHA1ee3cbe6d8d3be041299f5d5bc8c22729805f51d8
SHA256820223450482f41020aa23ee39c12812943964b26731184cf232394b43a6f9f8
SHA51201952ac51081331370a7154997983eed0d3b0beb7d8d82c7759476f903e9ea06a0c2a8de32450b68cc1d5f1144e09a9fcf8bb824f074e1b45572958f30d7afe8
-
Filesize
424B
MD53cbfa1d3820f1f0f1e315ec3b38df8f8
SHA19d10c2432bfc2090c546eee4876415b600fa6c46
SHA256a444a348d7a60fbebff7b96243b1efb128a6b5c3b26f4c780e29652210477d80
SHA5127be4b546caaf35331787122093620d507bb0eca48e9fc7078fa2f39f42041ec6451a8d4ac33a02cbb16234e648400fd792892cc30df0151a307b9d422f74d0b6
-
Filesize
1KB
MD552813f1f30f7305283b659e44733b295
SHA1c5b36fef5522d8e1324a12e27f6492329a3bc6c2
SHA256d42b6c9c65e5cf6b74a84bc5ace8c40fc1dd3e6ea75012f301fa167862097efd
SHA512922ef0f1dc15ab0bfc6001bcf7290ef74fdb4d3e480aab3765edc212a31a8ba7a21d4ff6278ad32990ccaf91a2d00a46f22386af0e34b5c61e2bea29dc814fef
-
Filesize
1KB
MD5b9307880229cb05f33549e3393b50e8f
SHA1892d4c6c9be7028569c75cfb2aad9d933400696c
SHA256445402b1cb1cded5784799a2f6e9aff99e576eb396e24bc8fa9e3769e177f810
SHA512201dd54b5c7cc9d032183095547a9103a42f3fd2b7686524c093f64678c98457d47ffce1fe236a05e8ad71af544ba1b71cffc93888445a420ac3bf354741fc1e
-
Filesize
1KB
MD5b9307880229cb05f33549e3393b50e8f
SHA1892d4c6c9be7028569c75cfb2aad9d933400696c
SHA256445402b1cb1cded5784799a2f6e9aff99e576eb396e24bc8fa9e3769e177f810
SHA512201dd54b5c7cc9d032183095547a9103a42f3fd2b7686524c093f64678c98457d47ffce1fe236a05e8ad71af544ba1b71cffc93888445a420ac3bf354741fc1e
-
Filesize
1KB
MD5c015b0861ae3fdaa7cce23fdf2f61c44
SHA12b6e5cc94a21e65ff8ec9a858589ef59a1bcff8d
SHA25653976d4b6717504623cbd853965c2895641724e8726b6bea0b1b428f2af91fe9
SHA512418f2edfac5ea1cd2b7f45f0c0287623c79656a448949d6cb1fd741a467c8e60be1af9d48e700f9b76eb7df4cbce3221a6387983406e065458d06e9a83749aba