Overview
overview
10Static
static
1AnyDesk.exe
windows7-x64
8AnyDesk.exe
windows10-2004-x64
8tmp/ChromeSetup.exe
windows7-x64
8tmp/ChromeSetup.exe
windows10-2004-x64
8tmp/Spotif...6).exe
windows7-x64
8tmp/Spotif...6).exe
windows10-2004-x64
10tmp/filmor...83.exe
windows7-x64
7tmp/filmor...83.exe
windows10-2004-x64
7Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
15-03-2023 08:06
Static task
static1
Behavioral task
behavioral1
Sample
AnyDesk.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
AnyDesk.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
tmp/ChromeSetup.exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
tmp/ChromeSetup.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
tmp/SpotifySetup (6).exe
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
tmp/SpotifySetup (6).exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
tmp/filmora_setup_full1083.exe
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
tmp/filmora_setup_full1083.exe
Resource
win10v2004-20230220-en
General
-
Target
AnyDesk.exe
-
Size
5.5MB
-
MD5
33614c059849aaeacaa68422b11a9795
-
SHA1
baf66bc7a279fcde9fa90708c153e06b89bb60d9
-
SHA256
25884495d9c27c8b120bfab40bd28b7f5255b4916c54c7fb74a90dd8000bf44e
-
SHA512
c211cfee30e6f3336a0d4aa8e44d91be4fb0399c2dc7d8a01b37d4264b44865c51037f5b6470f3aecd53cb551951132d80fbdba3b18fe0787cacd6166a66e5f6
-
SSDEEP
98304:cKYGKdACTgvV6qPvZpgvXM/N3qZBO0cY2YPGvhP0JGom5:cp86qPvZ6v6NH0l7PXm5
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
powershell.exeflow pid process 2 1112 powershell.exe -
Loads dropped DLL 4 IoCs
Processes:
MsiExec.exepid process 1308 MsiExec.exe 1308 MsiExec.exe 1308 MsiExec.exe 1308 MsiExec.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exemsiexec.exedescription ioc process File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\X: msiexec.exe -
Drops file in System32 directory 1 IoCs
Processes:
powershell.exedescription ioc process File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Drops file in Windows directory 13 IoCs
Processes:
DrvInst.exemsiexec.exedescription ioc process File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe File created C:\Windows\Installer\6c97be.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI9B97.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSI9E17.tmp msiexec.exe File created C:\Windows\Installer\6c97c0.ipi msiexec.exe File created C:\Windows\Installer\6c97c2.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIA20F.tmp msiexec.exe File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\Installer\6c97be.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI9906.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI9AFA.tmp msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 46 IoCs
Processes:
DrvInst.exemsiexec.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D msiexec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe -
Modifies registry class 23 IoCs
Processes:
msiexec.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\24210B1B431A27145802EE85AB1B4207\MainFeature msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\24210B1B431A27145802EE85AB1B4207\Assignment = "1" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\77F933B46D1B7E843A3263A3FC358A51\24210B1B431A27145802EE85AB1B4207 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\24210B1B431A27145802EE85AB1B4207\SourceList\PackageName = "AnyDesk.msi" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\24210B1B431A27145802EE85AB1B4207\SourceList\Media\1 = ";" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\24210B1B431A27145802EE85AB1B4207\Clients = 3a0000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\24210B1B431A27145802EE85AB1B4207\PackageCode = "1BD298B5F2ED9B84692DEE45C27D3993" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\24210B1B431A27145802EE85AB1B4207\AdvertiseFlags = "388" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\24210B1B431A27145802EE85AB1B4207\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\24210B1B431A27145802EE85AB1B4207\SourceList\Media\DiskPrompt = "[1]" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\24210B1B431A27145802EE85AB1B4207\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\24210B1B431A27145802EE85AB1B4207 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\24210B1B431A27145802EE85AB1B4207\ProductName = "AnyDesk" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\24210B1B431A27145802EE85AB1B4207\SourceList msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\77F933B46D1B7E843A3263A3FC358A51 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\24210B1B431A27145802EE85AB1B4207\SourceList\Net msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\24210B1B431A27145802EE85AB1B4207 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\24210B1B431A27145802EE85AB1B4207\Language = "1046" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\24210B1B431A27145802EE85AB1B4207\Version = "16777216" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\24210B1B431A27145802EE85AB1B4207\InstanceType = "0" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\24210B1B431A27145802EE85AB1B4207\AuthorizedLUAApp = "0" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\24210B1B431A27145802EE85AB1B4207\DeploymentFlags = "3" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\24210B1B431A27145802EE85AB1B4207\SourceList\Media msiexec.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 13 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
msiexec.exepowershell.exepid process 1748 msiexec.exe 1748 msiexec.exe 1112 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
msiexec.exemsiexec.exevssvc.exeDrvInst.exedescription pid process Token: SeShutdownPrivilege 1200 msiexec.exe Token: SeIncreaseQuotaPrivilege 1200 msiexec.exe Token: SeRestorePrivilege 1748 msiexec.exe Token: SeTakeOwnershipPrivilege 1748 msiexec.exe Token: SeSecurityPrivilege 1748 msiexec.exe Token: SeCreateTokenPrivilege 1200 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1200 msiexec.exe Token: SeLockMemoryPrivilege 1200 msiexec.exe Token: SeIncreaseQuotaPrivilege 1200 msiexec.exe Token: SeMachineAccountPrivilege 1200 msiexec.exe Token: SeTcbPrivilege 1200 msiexec.exe Token: SeSecurityPrivilege 1200 msiexec.exe Token: SeTakeOwnershipPrivilege 1200 msiexec.exe Token: SeLoadDriverPrivilege 1200 msiexec.exe Token: SeSystemProfilePrivilege 1200 msiexec.exe Token: SeSystemtimePrivilege 1200 msiexec.exe Token: SeProfSingleProcessPrivilege 1200 msiexec.exe Token: SeIncBasePriorityPrivilege 1200 msiexec.exe Token: SeCreatePagefilePrivilege 1200 msiexec.exe Token: SeCreatePermanentPrivilege 1200 msiexec.exe Token: SeBackupPrivilege 1200 msiexec.exe Token: SeRestorePrivilege 1200 msiexec.exe Token: SeShutdownPrivilege 1200 msiexec.exe Token: SeDebugPrivilege 1200 msiexec.exe Token: SeAuditPrivilege 1200 msiexec.exe Token: SeSystemEnvironmentPrivilege 1200 msiexec.exe Token: SeChangeNotifyPrivilege 1200 msiexec.exe Token: SeRemoteShutdownPrivilege 1200 msiexec.exe Token: SeUndockPrivilege 1200 msiexec.exe Token: SeSyncAgentPrivilege 1200 msiexec.exe Token: SeEnableDelegationPrivilege 1200 msiexec.exe Token: SeManageVolumePrivilege 1200 msiexec.exe Token: SeImpersonatePrivilege 1200 msiexec.exe Token: SeCreateGlobalPrivilege 1200 msiexec.exe Token: SeBackupPrivilege 756 vssvc.exe Token: SeRestorePrivilege 756 vssvc.exe Token: SeAuditPrivilege 756 vssvc.exe Token: SeBackupPrivilege 1748 msiexec.exe Token: SeRestorePrivilege 1748 msiexec.exe Token: SeRestorePrivilege 880 DrvInst.exe Token: SeRestorePrivilege 880 DrvInst.exe Token: SeRestorePrivilege 880 DrvInst.exe Token: SeRestorePrivilege 880 DrvInst.exe Token: SeRestorePrivilege 880 DrvInst.exe Token: SeRestorePrivilege 880 DrvInst.exe Token: SeRestorePrivilege 880 DrvInst.exe Token: SeLoadDriverPrivilege 880 DrvInst.exe Token: SeLoadDriverPrivilege 880 DrvInst.exe Token: SeLoadDriverPrivilege 880 DrvInst.exe Token: SeRestorePrivilege 1748 msiexec.exe Token: SeTakeOwnershipPrivilege 1748 msiexec.exe Token: SeRestorePrivilege 1748 msiexec.exe Token: SeTakeOwnershipPrivilege 1748 msiexec.exe Token: SeRestorePrivilege 1748 msiexec.exe Token: SeTakeOwnershipPrivilege 1748 msiexec.exe Token: SeRestorePrivilege 1748 msiexec.exe Token: SeTakeOwnershipPrivilege 1748 msiexec.exe Token: SeRestorePrivilege 1748 msiexec.exe Token: SeTakeOwnershipPrivilege 1748 msiexec.exe Token: SeRestorePrivilege 1748 msiexec.exe Token: SeTakeOwnershipPrivilege 1748 msiexec.exe Token: SeRestorePrivilege 1748 msiexec.exe Token: SeTakeOwnershipPrivilege 1748 msiexec.exe Token: SeRestorePrivilege 1748 msiexec.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
msiexec.exepowershell.exepid process 1200 msiexec.exe 1112 powershell.exe 1112 powershell.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AnyDesk.exepid process 1352 AnyDesk.exe 1352 AnyDesk.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
AnyDesk.exemsiexec.exeMsiExec.exedescription pid process target process PID 1352 wrote to memory of 1200 1352 AnyDesk.exe msiexec.exe PID 1352 wrote to memory of 1200 1352 AnyDesk.exe msiexec.exe PID 1352 wrote to memory of 1200 1352 AnyDesk.exe msiexec.exe PID 1352 wrote to memory of 1200 1352 AnyDesk.exe msiexec.exe PID 1352 wrote to memory of 1200 1352 AnyDesk.exe msiexec.exe PID 1352 wrote to memory of 1200 1352 AnyDesk.exe msiexec.exe PID 1352 wrote to memory of 1200 1352 AnyDesk.exe msiexec.exe PID 1748 wrote to memory of 1308 1748 msiexec.exe MsiExec.exe PID 1748 wrote to memory of 1308 1748 msiexec.exe MsiExec.exe PID 1748 wrote to memory of 1308 1748 msiexec.exe MsiExec.exe PID 1748 wrote to memory of 1308 1748 msiexec.exe MsiExec.exe PID 1748 wrote to memory of 1308 1748 msiexec.exe MsiExec.exe PID 1748 wrote to memory of 1308 1748 msiexec.exe MsiExec.exe PID 1748 wrote to memory of 1308 1748 msiexec.exe MsiExec.exe PID 1308 wrote to memory of 1112 1308 MsiExec.exe powershell.exe PID 1308 wrote to memory of 1112 1308 MsiExec.exe powershell.exe PID 1308 wrote to memory of 1112 1308 MsiExec.exe powershell.exe PID 1308 wrote to memory of 1112 1308 MsiExec.exe powershell.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\AnyDesk.msi"2⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1200
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 8C85BB3B475E2E33B7A854A324DCE9B42⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe-NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pssA76A.ps1" -propFile "C:\Users\Admin\AppData\Local\Temp\msiA748.txt" -scriptFile "C:\Users\Admin\AppData\Local\Temp\scrA749.ps1" -scriptArgsFile "C:\Users\Admin\AppData\Local\Temp\scrA75A.txt" -propSep " :<->: " -testPrefix "_testValue."3⤵
- Blocklisted process makes network request
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:1112 -
C:\Users\Admin\proeminente\corroborar\Hw2toa.exe"C:\Users\Admin\proeminente\corroborar\Hw2toa.exe"4⤵PID:1000
-
-
C:\Users\Public\Documents\AnyDesk\setup.exe"C:\Users\Public\Documents\AnyDesk\setup.exe"4⤵PID:1644
-
C:\Users\Public\Documents\AnyDesk\setup.exe"C:\Users\Public\Documents\AnyDesk\setup.exe" --local-service5⤵PID:1904
-
-
C:\Users\Public\Documents\AnyDesk\setup.exe"C:\Users\Public\Documents\AnyDesk\setup.exe" --local-control5⤵PID:600
-
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:756
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "000000000000049C" "0000000000000578"1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:880
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵PID:1880
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1880 CREDAT:275457 /prefetch:22⤵PID:480
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
606KB
MD52645d676f859f00c29288eeba5ed4330
SHA1784a7a133850b1ed9385c3d1336404743563cdbf
SHA2563c159c92ef69cfee7073929fd77e081ad4a0f2df70c9da6b2d22c1d3085b74b5
SHA51243971da7901b3c410b15f731d428897e6d8f3f1f01517aace1b68d8a39d372c14c8271da8644d95518608d87ad8c4026393d9a5bc430295ebf0f659fee14491a
-
Filesize
5.2MB
MD51b71048c460473fd82ec2de1c98798b0
SHA1a139134145c4eb2fb460a319d1727540ee264927
SHA256cb6901ccc6c51ab46b327eb44c5dc7cc597e38c89a7584177e58d5d0f26fe45f
SHA512d3e09b1533f4b479090b97aea372e8eb720fb7fbcb9bd5290383a432da855ec4a780b50f61dc558595d3b9098ede0cde513b548570dc9293b3cf1f53eb4a0d29
-
Filesize
5KB
MD5fc1bb6c87fd1f08b534e52546561c53c
SHA1db402c5c1025cf8d3e79df7b868fd186243aa9d1
SHA256a04750ed5f05b82b90f6b8ea3748ba246af969757a5a4b74a0e25b186add520b
SHA5125495f4ac3c8f42394a82540449526bb8ddd91adf0a1a852a9e1f2d32a63858b966648b4099d9947d8ac68ee43824dacda24c337c5b97733905e36c4921280e86
-
Filesize
17KB
MD5573c661545a080753d80b02e5116212c
SHA14905b0e15d7c6daa47ec99f8536306b8dcdca702
SHA2569f636f81baf940aa6c51f47bbeb3de89c3a70fcc524bebd4333fcf2e7a690c25
SHA5120d8c3979a02e0a11207cd5d9dddad6d704fe4aa2c979106e56019c3d2eddfbb93f650e59f1c8ed0336d022cbcb89ce82bdcf5c7ab1635ba096944aa5f743b10e
-
Filesize
6KB
MD552ac58bef2144f3c6ad783dd00800936
SHA1ab250c73fa9519f47758f795a50261ad85ac7900
SHA25688112d3366f9ccb0e74e06e16079b0e37c6c29a988b0391233acae5c27f5b9e3
SHA512c3497fb186ec0fab10003579d9f5908fddf7a2a6cb7f08f2e052037d0d778a6795480119538abd9d712a2380335d507c9d41568e6f4d5b32f988577b5e9e8ca6
-
Filesize
1KB
MD55cecdf955d2a8dffe2be6b38e778da21
SHA1e12b36a8e986cbb46f393cd88d4dcbe0a6a42953
SHA256ee60903a02f1f98d5db3c1fd8bc53fb4b3daa3e4e8d169165c5e49ef648b30d5
SHA51212911f5f10d8cd4530e2bb20e68d7269e9feab7284d28dcbf6d576476a6b29c59decea31576bcecd1a937e0e8899d401492829089364666b83b91d8b63e5d777
-
Filesize
1KB
MD5132a97cd2e2c747b4db931e3fc0bcd63
SHA1bcfd4b2ee7b5db5522d0e69cc82173de9c5b329a
SHA256414360f2d6ab0faaaadb411688465875ee8d80303c7d750734b399f915f3c33a
SHA512e1142ea909aa6b89de932a4dac4e391491f30dcfc5e9fa0567571a31a183ceb73d70570733b753de96a7d8a1d66a35c792a51fa94f02fa422f75ae216f0d555b
-
Filesize
34.0MB
MD52d3ba64c6b91723bcda584b7b086a7e7
SHA1b00f3b74f16c29546427d27a70c85d63dc87601c
SHA256bb5e945b4d14207d543169e43b1e39e6565a7a8ecdba3b663b73d7b653f9c911
SHA51284c5af14cff7c2a20a7505032bee707248af6b79dd184752e308551b5a2aa3703f6d19e5151ec87eba04242d917da7a34584d9f69c69e095db352a09fdd20f9d
-
Filesize
213KB
MD57fb1c5dfc2605843cec69a6fc4e96576
SHA1b5e591d23a3798b89648033760d3710a403b32be
SHA256330c1d3dd702af11b01ae38ced101e4c4217816e4887e9ebffe2e529cdc857d5
SHA5120c62d01a97d01044a7f4083f2cf6a0e18397bc50cc9f0847bf6da2f604d1d89cd3010d005785077aca2d8249f870f2817a6b4d845235cda55ac5519aee5dc1b7
-
Filesize
213KB
MD57fb1c5dfc2605843cec69a6fc4e96576
SHA1b5e591d23a3798b89648033760d3710a403b32be
SHA256330c1d3dd702af11b01ae38ced101e4c4217816e4887e9ebffe2e529cdc857d5
SHA5120c62d01a97d01044a7f4083f2cf6a0e18397bc50cc9f0847bf6da2f604d1d89cd3010d005785077aca2d8249f870f2817a6b4d845235cda55ac5519aee5dc1b7
-
Filesize
213KB
MD57fb1c5dfc2605843cec69a6fc4e96576
SHA1b5e591d23a3798b89648033760d3710a403b32be
SHA256330c1d3dd702af11b01ae38ced101e4c4217816e4887e9ebffe2e529cdc857d5
SHA5120c62d01a97d01044a7f4083f2cf6a0e18397bc50cc9f0847bf6da2f604d1d89cd3010d005785077aca2d8249f870f2817a6b4d845235cda55ac5519aee5dc1b7
-
Filesize
3.6MB
MD5650316f36cab9b31d6d743109c55b87a
SHA12016b0aa7d44bff91f292acacd81998cc5ca79e1
SHA2568e48344a0637941d305d3d368a96adeeb791b1ee1d4c4b7316fa492962f5e7fe
SHA5128b69198d0f20e34f87b458ce90c19e5a7e3ecd53a6d896a356b58a9e2232e8d450c7b31d33e1a9439f5e705faabfdd7ed2be36b312c231fd60f116328207cbd8
-
Filesize
33KB
MD51ff80ebe5082a13d02253b415aa26f60
SHA17da7551ec7f3f1e606edf9313595e4ebe45ac8d1
SHA256e0088b6361c7ea8e611ba32542beff7ac12955991c82a5fe9ef5d9a97d6ca14f
SHA5128c33e9427227835229d27f59206e55cd98c372e6a20981c6b0518a5f9b81c127b0f40276c21adac06a433c1947ab56f7f2166135d184dec1162b5071e3037e90
-
Filesize
89.4MB
MD590358f8902d4597a7d92c1430e98a713
SHA1d71dff92a8d47e48eaf7e067dc3dc5349a2edd11
SHA256e7a1403108c1c6270b6d31cc723f1ace8c4039f6010cb80a6ee5ed0a31f6f96d
SHA512b1ce59c494a9e019c18f607980154f6e046e435746c0da36af50e15e5539c8af214fa62c5c6efecec204ffd29e16a905443c1153fb5581cbae7ebee1b59ee042
-
Filesize
3.8MB
MD59a1d9fe9b1223273c314632d04008384
SHA1665cad3ed21f6443d1adacf18ca45dfaa8f52c99
SHA2560f4bf8506a2560c568b9815124dfc43a11c561ed611829df841ec7aba8302359
SHA5123ec400acd075a4078d7d9f06c853be4ee0fdd7a9d1628428326534df6c0f3ea8f745af9d29031e9259a1bee2f78dd48dfaebcb7e897c22736909a9d6b4f24ba5
-
Filesize
3.8MB
MD59a1d9fe9b1223273c314632d04008384
SHA1665cad3ed21f6443d1adacf18ca45dfaa8f52c99
SHA2560f4bf8506a2560c568b9815124dfc43a11c561ed611829df841ec7aba8302359
SHA5123ec400acd075a4078d7d9f06c853be4ee0fdd7a9d1628428326534df6c0f3ea8f745af9d29031e9259a1bee2f78dd48dfaebcb7e897c22736909a9d6b4f24ba5
-
Filesize
1.8MB
MD5e8ee10e1ea7a6b3b348096fb8a87355c
SHA123b50ed95e44b1e0b08e51939144a0bad2bbe3cf
SHA2565f2190a636dfbacea7211bdd8dcbdc3457f19e8121ac83acfba8d6423c52504e
SHA512201af0645374714ac8961b7c1ea976fc59a32fd175e79d4b395619eff3bf510bf04b19a389465a56fb3b6696e5b67547cb8688ce7e3b6e5afd67743479d9e6be
-
Filesize
1.8MB
MD5cbaa5e879d9fdd4bdd3c292e206de322
SHA1cb322b6abc43d4858d33d8b227ea494f6104e1ef
SHA256f7a0f935200635e37286518294867b157c968cf42eb28dcc9c2c138819968698
SHA51212f7bc36d79dc13fc83a3cc394db20c065217aa107de13f2b9ecc70a339fc74b587ac906bd74ad4c493932ab7287d881558c540ce3018f3ed57c8ade22d96d28
-
Filesize
5.2MB
MD51b71048c460473fd82ec2de1c98798b0
SHA1a139134145c4eb2fb460a319d1727540ee264927
SHA256cb6901ccc6c51ab46b327eb44c5dc7cc597e38c89a7584177e58d5d0f26fe45f
SHA512d3e09b1533f4b479090b97aea372e8eb720fb7fbcb9bd5290383a432da855ec4a780b50f61dc558595d3b9098ede0cde513b548570dc9293b3cf1f53eb4a0d29
-
Filesize
436KB
MD5475d20c0ea477a35660e3f67ecf0a1df
SHA167340739f51e1134ae8f0ffc5ae9dd710e8e3a08
SHA256426e6cf199a8268e8a7763ec3a4dd7add982b28c51d89ebea90ca792cbae14dd
SHA51299525aaab2ab608134b5d66b5313e7fc3c2e2877395c5c171897d7a6c66efb26b606de1a4cb01118c2738ea4b6542e4eb4983e631231b3f340bf85e509a9589e
-
Filesize
436KB
MD5475d20c0ea477a35660e3f67ecf0a1df
SHA167340739f51e1134ae8f0ffc5ae9dd710e8e3a08
SHA256426e6cf199a8268e8a7763ec3a4dd7add982b28c51d89ebea90ca792cbae14dd
SHA51299525aaab2ab608134b5d66b5313e7fc3c2e2877395c5c171897d7a6c66efb26b606de1a4cb01118c2738ea4b6542e4eb4983e631231b3f340bf85e509a9589e
-
Filesize
436KB
MD5475d20c0ea477a35660e3f67ecf0a1df
SHA167340739f51e1134ae8f0ffc5ae9dd710e8e3a08
SHA256426e6cf199a8268e8a7763ec3a4dd7add982b28c51d89ebea90ca792cbae14dd
SHA51299525aaab2ab608134b5d66b5313e7fc3c2e2877395c5c171897d7a6c66efb26b606de1a4cb01118c2738ea4b6542e4eb4983e631231b3f340bf85e509a9589e
-
Filesize
436KB
MD5475d20c0ea477a35660e3f67ecf0a1df
SHA167340739f51e1134ae8f0ffc5ae9dd710e8e3a08
SHA256426e6cf199a8268e8a7763ec3a4dd7add982b28c51d89ebea90ca792cbae14dd
SHA51299525aaab2ab608134b5d66b5313e7fc3c2e2877395c5c171897d7a6c66efb26b606de1a4cb01118c2738ea4b6542e4eb4983e631231b3f340bf85e509a9589e
-
Filesize
574KB
MD57b7d9e2c9b8236e7155f2f97254cb40e
SHA199621fc9d14511428d62d91c31865fb2c4625663
SHA256df58faba241328b9645dcb5dec387ec5edd56e2d878384a4783f2c0a66f85897
SHA512fbaa1560f03255f73be3e846959e4b7cbb1c24165d014ed01245639add6cc463975e5558567ab5704e18c9078a8a071c9e38dc1e499ba6e3dc507d4275b4a228
-
Filesize
213KB
MD57fb1c5dfc2605843cec69a6fc4e96576
SHA1b5e591d23a3798b89648033760d3710a403b32be
SHA256330c1d3dd702af11b01ae38ced101e4c4217816e4887e9ebffe2e529cdc857d5
SHA5120c62d01a97d01044a7f4083f2cf6a0e18397bc50cc9f0847bf6da2f604d1d89cd3010d005785077aca2d8249f870f2817a6b4d845235cda55ac5519aee5dc1b7
-
Filesize
213KB
MD57fb1c5dfc2605843cec69a6fc4e96576
SHA1b5e591d23a3798b89648033760d3710a403b32be
SHA256330c1d3dd702af11b01ae38ced101e4c4217816e4887e9ebffe2e529cdc857d5
SHA5120c62d01a97d01044a7f4083f2cf6a0e18397bc50cc9f0847bf6da2f604d1d89cd3010d005785077aca2d8249f870f2817a6b4d845235cda55ac5519aee5dc1b7
-
Filesize
33KB
MD51ff80ebe5082a13d02253b415aa26f60
SHA17da7551ec7f3f1e606edf9313595e4ebe45ac8d1
SHA256e0088b6361c7ea8e611ba32542beff7ac12955991c82a5fe9ef5d9a97d6ca14f
SHA5128c33e9427227835229d27f59206e55cd98c372e6a20981c6b0518a5f9b81c127b0f40276c21adac06a433c1947ab56f7f2166135d184dec1162b5071e3037e90
-
Filesize
3.6MB
MD5650316f36cab9b31d6d743109c55b87a
SHA12016b0aa7d44bff91f292acacd81998cc5ca79e1
SHA2568e48344a0637941d305d3d368a96adeeb791b1ee1d4c4b7316fa492962f5e7fe
SHA5128b69198d0f20e34f87b458ce90c19e5a7e3ecd53a6d896a356b58a9e2232e8d450c7b31d33e1a9439f5e705faabfdd7ed2be36b312c231fd60f116328207cbd8
-
Filesize
3.8MB
MD59a1d9fe9b1223273c314632d04008384
SHA1665cad3ed21f6443d1adacf18ca45dfaa8f52c99
SHA2560f4bf8506a2560c568b9815124dfc43a11c561ed611829df841ec7aba8302359
SHA5123ec400acd075a4078d7d9f06c853be4ee0fdd7a9d1628428326534df6c0f3ea8f745af9d29031e9259a1bee2f78dd48dfaebcb7e897c22736909a9d6b4f24ba5
-
Filesize
2.2MB
MD54c66ef6d49ddc78eef4be9d455e697bc
SHA18c198888441ce81417c695fa2cbc377e797a190b
SHA2566b925e84cc1655fd67ddfcb639636f46bb0aaac9fc0695c3f258eee2825e5c13
SHA512f3289b8fe0144fc82e949cb0f1e1491231be524275a0872d9584b88bf78c859e1a2250eaeed37ff231158bced61dac5da5285600eb3222d17cbe8b540d972f99
-
Filesize
1.9MB
MD541f53e8632679e8b94cbefc588aee867
SHA15516d29aca9511dbbd3549984ef78922c9cfecdc
SHA2564c137bdcba6bd5ffda84f35132e101e2050800897084c006666343ae6be3ae7f
SHA512bb0f785e80ab30ce5a3d04c87c33fb33d45a331a8d3155369d6b42bf22a018938366d6e2e0faff0d8e02a458c75b5c61308c3901aa7adafb1ee80db25b8dbe46
-
Filesize
436KB
MD5475d20c0ea477a35660e3f67ecf0a1df
SHA167340739f51e1134ae8f0ffc5ae9dd710e8e3a08
SHA256426e6cf199a8268e8a7763ec3a4dd7add982b28c51d89ebea90ca792cbae14dd
SHA51299525aaab2ab608134b5d66b5313e7fc3c2e2877395c5c171897d7a6c66efb26b606de1a4cb01118c2738ea4b6542e4eb4983e631231b3f340bf85e509a9589e
-
Filesize
436KB
MD5475d20c0ea477a35660e3f67ecf0a1df
SHA167340739f51e1134ae8f0ffc5ae9dd710e8e3a08
SHA256426e6cf199a8268e8a7763ec3a4dd7add982b28c51d89ebea90ca792cbae14dd
SHA51299525aaab2ab608134b5d66b5313e7fc3c2e2877395c5c171897d7a6c66efb26b606de1a4cb01118c2738ea4b6542e4eb4983e631231b3f340bf85e509a9589e
-
Filesize
436KB
MD5475d20c0ea477a35660e3f67ecf0a1df
SHA167340739f51e1134ae8f0ffc5ae9dd710e8e3a08
SHA256426e6cf199a8268e8a7763ec3a4dd7add982b28c51d89ebea90ca792cbae14dd
SHA51299525aaab2ab608134b5d66b5313e7fc3c2e2877395c5c171897d7a6c66efb26b606de1a4cb01118c2738ea4b6542e4eb4983e631231b3f340bf85e509a9589e
-
Filesize
574KB
MD57b7d9e2c9b8236e7155f2f97254cb40e
SHA199621fc9d14511428d62d91c31865fb2c4625663
SHA256df58faba241328b9645dcb5dec387ec5edd56e2d878384a4783f2c0a66f85897
SHA512fbaa1560f03255f73be3e846959e4b7cbb1c24165d014ed01245639add6cc463975e5558567ab5704e18c9078a8a071c9e38dc1e499ba6e3dc507d4275b4a228