Malware Analysis Report

2025-06-15 21:45

Sample ID 230409-av3sbsga82
Target AnyDesk (DROPSY).exe
SHA256 f0c95b09ead49d1fe42e25f6d4f8bbcd3492d28c8f508e45e59feb31f4011c3e
Tags
agilenet
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

f0c95b09ead49d1fe42e25f6d4f8bbcd3492d28c8f508e45e59feb31f4011c3e

Threat Level: Shows suspicious behavior

The file AnyDesk (DROPSY).exe was found to be: Shows suspicious behavior.

Malicious Activity Summary

agilenet

Loads dropped DLL

Obfuscated with Agile.Net obfuscator

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2023-04-09 00:32

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-04-09 00:32

Reported

2023-04-09 00:35

Platform

win7-20230220-en

Max time kernel

151s

Max time network

33s

Command Line

"C:\Users\Admin\AppData\Local\Temp\AnyDesk (DROPSY).exe"

Signatures

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\AnyDesk (DROPSY).exe N/A

Obfuscated with Agile.Net obfuscator

agilenet
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\AnyDesk (DROPSY).exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\AnyDesk (DROPSY).exe

"C:\Users\Admin\AppData\Local\Temp\AnyDesk (DROPSY).exe"

Network

N/A

Files

memory/1100-54-0x0000000000E10000-0x0000000001680000-memory.dmp

memory/1100-55-0x00000000099C0000-0x0000000009A00000-memory.dmp

memory/1100-56-0x0000000005370000-0x00000000055B4000-memory.dmp

memory/1100-57-0x0000000006750000-0x000000000698A000-memory.dmp

memory/1100-58-0x00000000009D0000-0x00000000009E0000-memory.dmp

memory/1100-59-0x00000000065B0000-0x0000000006678000-memory.dmp

\Users\Admin\AppData\Local\Temp\ba012cba-2679-4da3-a26b-788d51617354\AgileDotNetRT.dll

MD5 14ff402962ad21b78ae0b4c43cd1f194
SHA1 f8a510eb26666e875a5bdd1cadad40602763ad72
SHA256 fb9646cb956945bdc503e69645f6b5316d3826b780d3c36738d6b944e884d15b
SHA512 daa7a08bf3709119a944bce28f6ebdd24e54a22b18cd9f86a87873e958df121a3881dcdd5e162f6b4e543238c7aef20f657c9830df01d4c79290f7c9a4fcc54b

C:\Users\Admin\AppData\Local\Temp\ba012cba-2679-4da3-a26b-788d51617354\AgileDotNetRT.dll

MD5 14ff402962ad21b78ae0b4c43cd1f194
SHA1 f8a510eb26666e875a5bdd1cadad40602763ad72
SHA256 fb9646cb956945bdc503e69645f6b5316d3826b780d3c36738d6b944e884d15b
SHA512 daa7a08bf3709119a944bce28f6ebdd24e54a22b18cd9f86a87873e958df121a3881dcdd5e162f6b4e543238c7aef20f657c9830df01d4c79290f7c9a4fcc54b

memory/1100-66-0x0000000073FE0000-0x0000000074060000-memory.dmp

memory/1100-67-0x0000000006750000-0x0000000006985000-memory.dmp

memory/1100-68-0x0000000006750000-0x0000000006985000-memory.dmp

memory/1100-70-0x0000000006750000-0x0000000006985000-memory.dmp

memory/1100-72-0x0000000006750000-0x0000000006985000-memory.dmp

memory/1100-74-0x0000000006750000-0x0000000006985000-memory.dmp

memory/1100-76-0x0000000006750000-0x0000000006985000-memory.dmp

memory/1100-78-0x0000000006750000-0x0000000006985000-memory.dmp

memory/1100-80-0x0000000006750000-0x0000000006985000-memory.dmp

memory/1100-82-0x0000000006750000-0x0000000006985000-memory.dmp

memory/1100-84-0x0000000006750000-0x0000000006985000-memory.dmp

memory/1100-86-0x0000000006750000-0x0000000006985000-memory.dmp

memory/1100-88-0x0000000006750000-0x0000000006985000-memory.dmp

memory/1100-90-0x0000000006750000-0x0000000006985000-memory.dmp

memory/1100-92-0x0000000006750000-0x0000000006985000-memory.dmp

memory/1100-94-0x0000000006750000-0x0000000006985000-memory.dmp

memory/1100-96-0x0000000006750000-0x0000000006985000-memory.dmp

memory/1100-98-0x0000000006750000-0x0000000006985000-memory.dmp

memory/1100-102-0x0000000006750000-0x0000000006985000-memory.dmp

memory/1100-104-0x0000000006750000-0x0000000006985000-memory.dmp

memory/1100-106-0x0000000006750000-0x0000000006985000-memory.dmp

memory/1100-108-0x0000000006750000-0x0000000006985000-memory.dmp

memory/1100-100-0x0000000006750000-0x0000000006985000-memory.dmp

memory/1100-110-0x0000000006750000-0x0000000006985000-memory.dmp

memory/1100-112-0x0000000006750000-0x0000000006985000-memory.dmp

memory/1100-114-0x0000000006750000-0x0000000006985000-memory.dmp

memory/1100-116-0x0000000006750000-0x0000000006985000-memory.dmp

memory/1100-118-0x0000000006750000-0x0000000006985000-memory.dmp

memory/1100-120-0x0000000006750000-0x0000000006985000-memory.dmp

memory/1100-122-0x0000000006750000-0x0000000006985000-memory.dmp

memory/1100-124-0x0000000006750000-0x0000000006985000-memory.dmp

memory/1100-126-0x0000000006750000-0x0000000006985000-memory.dmp

memory/1100-128-0x0000000006750000-0x0000000006985000-memory.dmp

memory/1100-464-0x00000000099C0000-0x0000000009A00000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2023-04-09 00:32

Reported

2023-04-09 00:33

Platform

win10v2004-20230221-en

Max time kernel

39s

Max time network

38s

Command Line

"C:\Users\Admin\AppData\Local\Temp\AnyDesk (DROPSY).exe"

Signatures

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\AnyDesk (DROPSY).exe N/A

Obfuscated with Agile.Net obfuscator

agilenet
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\AnyDesk (DROPSY).exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\AnyDesk (DROPSY).exe

"C:\Users\Admin\AppData\Local\Temp\AnyDesk (DROPSY).exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 71.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 assets.msn.com udp
GB 95.101.143.105:443 assets.msn.com tcp
US 8.8.8.8:53 105.143.101.95.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 151.122.125.40.in-addr.arpa udp

Files

memory/4320-133-0x0000000000C20000-0x0000000001490000-memory.dmp

memory/4320-134-0x00000000037E0000-0x00000000037F0000-memory.dmp

memory/4320-135-0x00000000075C0000-0x0000000007B64000-memory.dmp

memory/4320-136-0x0000000005D00000-0x0000000005D92000-memory.dmp

memory/4320-137-0x0000000005CB0000-0x0000000005CBA000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\ba012cba-2679-4da3-a26b-788d51617354\AgileDotNetRT.dll

MD5 14ff402962ad21b78ae0b4c43cd1f194
SHA1 f8a510eb26666e875a5bdd1cadad40602763ad72
SHA256 fb9646cb956945bdc503e69645f6b5316d3826b780d3c36738d6b944e884d15b
SHA512 daa7a08bf3709119a944bce28f6ebdd24e54a22b18cd9f86a87873e958df121a3881dcdd5e162f6b4e543238c7aef20f657c9830df01d4c79290f7c9a4fcc54b

C:\Users\Admin\AppData\Local\Temp\ba012cba-2679-4da3-a26b-788d51617354\AgileDotNetRT.dll

MD5 14ff402962ad21b78ae0b4c43cd1f194
SHA1 f8a510eb26666e875a5bdd1cadad40602763ad72
SHA256 fb9646cb956945bdc503e69645f6b5316d3826b780d3c36738d6b944e884d15b
SHA512 daa7a08bf3709119a944bce28f6ebdd24e54a22b18cd9f86a87873e958df121a3881dcdd5e162f6b4e543238c7aef20f657c9830df01d4c79290f7c9a4fcc54b

memory/4320-145-0x0000000072F60000-0x0000000072FE9000-memory.dmp

memory/4320-146-0x0000000007100000-0x0000000007335000-memory.dmp

memory/4320-147-0x0000000007100000-0x0000000007335000-memory.dmp

memory/4320-149-0x0000000007100000-0x0000000007335000-memory.dmp

memory/4320-151-0x0000000007100000-0x0000000007335000-memory.dmp

memory/4320-153-0x0000000007100000-0x0000000007335000-memory.dmp

memory/4320-155-0x0000000007100000-0x0000000007335000-memory.dmp

memory/4320-157-0x0000000007100000-0x0000000007335000-memory.dmp

memory/4320-159-0x0000000007100000-0x0000000007335000-memory.dmp

memory/4320-161-0x0000000007100000-0x0000000007335000-memory.dmp

memory/4320-163-0x0000000007100000-0x0000000007335000-memory.dmp

memory/4320-165-0x0000000007100000-0x0000000007335000-memory.dmp

memory/4320-167-0x0000000007100000-0x0000000007335000-memory.dmp

memory/4320-169-0x0000000007100000-0x0000000007335000-memory.dmp

memory/4320-171-0x0000000007100000-0x0000000007335000-memory.dmp

memory/4320-173-0x0000000007100000-0x0000000007335000-memory.dmp

memory/4320-175-0x0000000007100000-0x0000000007335000-memory.dmp

memory/4320-177-0x0000000007100000-0x0000000007335000-memory.dmp

memory/4320-179-0x0000000007100000-0x0000000007335000-memory.dmp

memory/4320-181-0x0000000007100000-0x0000000007335000-memory.dmp

memory/4320-183-0x0000000007100000-0x0000000007335000-memory.dmp

memory/4320-185-0x0000000007100000-0x0000000007335000-memory.dmp

memory/4320-187-0x0000000007100000-0x0000000007335000-memory.dmp

memory/4320-189-0x0000000007100000-0x0000000007335000-memory.dmp

memory/4320-191-0x0000000007100000-0x0000000007335000-memory.dmp

memory/4320-193-0x0000000007100000-0x0000000007335000-memory.dmp

memory/4320-195-0x0000000007100000-0x0000000007335000-memory.dmp

memory/4320-197-0x0000000007100000-0x0000000007335000-memory.dmp

memory/4320-199-0x0000000007100000-0x0000000007335000-memory.dmp

memory/4320-201-0x0000000007100000-0x0000000007335000-memory.dmp

memory/4320-203-0x0000000007100000-0x0000000007335000-memory.dmp

memory/4320-205-0x0000000007100000-0x0000000007335000-memory.dmp

memory/4320-207-0x0000000007100000-0x0000000007335000-memory.dmp

memory/4320-294-0x00000000037E0000-0x00000000037F0000-memory.dmp