Analysis

  • max time kernel
    747s
  • max time network
    750s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-02-2023 23:49

General

  • Target

    AnyDesk (1).exe

  • Size

    3.8MB

  • MD5

    e546506082b374a0869bdd97b313fe5d

  • SHA1

    082dc6b336b41788391bad20b26f4b9a1ad724fc

  • SHA256

    fc19f3275d02764cf249dc6fe8962e06b83a4f5769cc369bc4f77b90c567df18

  • SHA512

    15a8d7c74193dffd77639b1356ccbe975d17de73d0d6d177b8ecf816d665f620adefcded37c141bac0b2d8564fbba61aca4d9b01885740f23fbcc190515cbd08

  • SSDEEP

    98304:uSCb8xJlb0VgU/vZaZKa4opQILfbsLajDMWEeq7PbUs6En5:uH8HCOUZakpAbjbsLsMmqM

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 15 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 63 IoCs
  • Suspicious behavior: LoadsDriver 6 IoCs