Analysis Overview
SHA256
f0c95b09ead49d1fe42e25f6d4f8bbcd3492d28c8f508e45e59feb31f4011c3e
Threat Level: Shows suspicious behavior
The file AnyDesk (DROPSY).exe was found to be: Shows suspicious behavior.
Malicious Activity Summary
Loads dropped DLL
Obfuscated with Agile.Net obfuscator
Suspicious use of AdjustPrivilegeToken
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2023-04-09 00:37
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2023-04-09 00:37
Reported
2023-04-09 00:40
Platform
win7-20230220-en
Max time kernel
150s
Max time network
33s
Command Line
Signatures
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\AnyDesk (DROPSY).exe | N/A |
Obfuscated with Agile.Net obfuscator
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\AnyDesk (DROPSY).exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\AnyDesk (DROPSY).exe
"C:\Users\Admin\AppData\Local\Temp\AnyDesk (DROPSY).exe"
Network
Files
memory/892-54-0x0000000000EB0000-0x0000000001720000-memory.dmp
memory/892-55-0x00000000053B0000-0x00000000055F4000-memory.dmp
memory/892-56-0x0000000007580000-0x00000000075C0000-memory.dmp
memory/892-57-0x0000000006740000-0x000000000697A000-memory.dmp
memory/892-58-0x00000000009D0000-0x00000000009E0000-memory.dmp
memory/892-59-0x00000000065F0000-0x00000000066B8000-memory.dmp
\Users\Admin\AppData\Local\Temp\ba012cba-2679-4da3-a26b-788d51617354\AgileDotNetRT.dll
| MD5 | 14ff402962ad21b78ae0b4c43cd1f194 |
| SHA1 | f8a510eb26666e875a5bdd1cadad40602763ad72 |
| SHA256 | fb9646cb956945bdc503e69645f6b5316d3826b780d3c36738d6b944e884d15b |
| SHA512 | daa7a08bf3709119a944bce28f6ebdd24e54a22b18cd9f86a87873e958df121a3881dcdd5e162f6b4e543238c7aef20f657c9830df01d4c79290f7c9a4fcc54b |
C:\Users\Admin\AppData\Local\Temp\ba012cba-2679-4da3-a26b-788d51617354\AgileDotNetRT.dll
| MD5 | 14ff402962ad21b78ae0b4c43cd1f194 |
| SHA1 | f8a510eb26666e875a5bdd1cadad40602763ad72 |
| SHA256 | fb9646cb956945bdc503e69645f6b5316d3826b780d3c36738d6b944e884d15b |
| SHA512 | daa7a08bf3709119a944bce28f6ebdd24e54a22b18cd9f86a87873e958df121a3881dcdd5e162f6b4e543238c7aef20f657c9830df01d4c79290f7c9a4fcc54b |
memory/892-66-0x0000000074940000-0x00000000749C0000-memory.dmp
memory/892-67-0x0000000006740000-0x0000000006975000-memory.dmp
memory/892-68-0x0000000006740000-0x0000000006975000-memory.dmp
memory/892-70-0x0000000006740000-0x0000000006975000-memory.dmp
memory/892-72-0x0000000006740000-0x0000000006975000-memory.dmp
memory/892-74-0x0000000006740000-0x0000000006975000-memory.dmp
memory/892-76-0x0000000006740000-0x0000000006975000-memory.dmp
memory/892-78-0x0000000006740000-0x0000000006975000-memory.dmp
memory/892-80-0x0000000006740000-0x0000000006975000-memory.dmp
memory/892-82-0x0000000006740000-0x0000000006975000-memory.dmp
memory/892-84-0x0000000006740000-0x0000000006975000-memory.dmp
memory/892-86-0x0000000006740000-0x0000000006975000-memory.dmp
memory/892-88-0x0000000006740000-0x0000000006975000-memory.dmp
memory/892-90-0x0000000006740000-0x0000000006975000-memory.dmp
memory/892-94-0x0000000006740000-0x0000000006975000-memory.dmp
memory/892-92-0x0000000006740000-0x0000000006975000-memory.dmp
memory/892-96-0x0000000006740000-0x0000000006975000-memory.dmp
memory/892-98-0x0000000006740000-0x0000000006975000-memory.dmp
memory/892-100-0x0000000006740000-0x0000000006975000-memory.dmp
memory/892-102-0x0000000006740000-0x0000000006975000-memory.dmp
memory/892-104-0x0000000006740000-0x0000000006975000-memory.dmp
memory/892-106-0x0000000006740000-0x0000000006975000-memory.dmp
memory/892-108-0x0000000006740000-0x0000000006975000-memory.dmp
memory/892-110-0x0000000006740000-0x0000000006975000-memory.dmp
memory/892-112-0x0000000006740000-0x0000000006975000-memory.dmp
memory/892-114-0x0000000006740000-0x0000000006975000-memory.dmp
memory/892-116-0x0000000006740000-0x0000000006975000-memory.dmp
memory/892-118-0x0000000006740000-0x0000000006975000-memory.dmp
memory/892-120-0x0000000006740000-0x0000000006975000-memory.dmp
memory/892-122-0x0000000006740000-0x0000000006975000-memory.dmp
memory/892-124-0x0000000006740000-0x0000000006975000-memory.dmp
memory/892-126-0x0000000006740000-0x0000000006975000-memory.dmp
memory/892-128-0x0000000006740000-0x0000000006975000-memory.dmp
memory/892-569-0x0000000007580000-0x00000000075C0000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2023-04-09 00:37
Reported
2023-04-09 00:40
Platform
win10v2004-20230220-en
Max time kernel
150s
Max time network
151s
Command Line
Signatures
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\AnyDesk (DROPSY).exe | N/A |
Obfuscated with Agile.Net obfuscator
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\AnyDesk (DROPSY).exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\AnyDesk (DROPSY).exe
"C:\Users\Admin\AppData\Local\Temp\AnyDesk (DROPSY).exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | assets.msn.com | udp |
| DE | 2.16.241.97:443 | assets.msn.com | tcp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 58.55.71.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 97.241.16.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 2.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 97.17.167.52.in-addr.arpa | udp |
| US | 52.152.110.14:443 | tcp | |
| US | 20.189.173.13:443 | tcp | |
| US | 8.247.211.254:80 | tcp | |
| US | 8.247.211.254:80 | tcp | |
| US | 8.247.211.254:80 | tcp | |
| NL | 173.223.113.164:443 | tcp | |
| NL | 173.223.113.131:80 | tcp | |
| US | 131.253.33.203:80 | tcp | |
| US | 8.8.8.8:53 | 233.141.123.20.in-addr.arpa | udp |
| US | 52.152.110.14:443 | tcp | |
| US | 8.247.211.254:80 | tcp | |
| US | 52.152.110.14:443 | tcp | |
| US | 52.152.110.14:443 | tcp | |
| US | 52.152.110.14:443 | tcp | |
| US | 52.152.110.14:443 | tcp |
Files
memory/1640-133-0x0000000000B60000-0x00000000013D0000-memory.dmp
memory/1640-134-0x0000000009EF0000-0x0000000009F00000-memory.dmp
memory/1640-135-0x00000000072C0000-0x0000000007864000-memory.dmp
memory/1640-136-0x00000000059E0000-0x0000000005A72000-memory.dmp
memory/1640-137-0x0000000005AA0000-0x0000000005AAA000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\ba012cba-2679-4da3-a26b-788d51617354\AgileDotNetRT.dll
| MD5 | 14ff402962ad21b78ae0b4c43cd1f194 |
| SHA1 | f8a510eb26666e875a5bdd1cadad40602763ad72 |
| SHA256 | fb9646cb956945bdc503e69645f6b5316d3826b780d3c36738d6b944e884d15b |
| SHA512 | daa7a08bf3709119a944bce28f6ebdd24e54a22b18cd9f86a87873e958df121a3881dcdd5e162f6b4e543238c7aef20f657c9830df01d4c79290f7c9a4fcc54b |
C:\Users\Admin\AppData\Local\Temp\ba012cba-2679-4da3-a26b-788d51617354\AgileDotNetRT.dll
| MD5 | 14ff402962ad21b78ae0b4c43cd1f194 |
| SHA1 | f8a510eb26666e875a5bdd1cadad40602763ad72 |
| SHA256 | fb9646cb956945bdc503e69645f6b5316d3826b780d3c36738d6b944e884d15b |
| SHA512 | daa7a08bf3709119a944bce28f6ebdd24e54a22b18cd9f86a87873e958df121a3881dcdd5e162f6b4e543238c7aef20f657c9830df01d4c79290f7c9a4fcc54b |
memory/1640-145-0x0000000072F60000-0x0000000072FE9000-memory.dmp
memory/1640-146-0x0000000006E90000-0x00000000070C5000-memory.dmp
memory/1640-147-0x0000000006E90000-0x00000000070C5000-memory.dmp
memory/1640-149-0x0000000006E90000-0x00000000070C5000-memory.dmp
memory/1640-151-0x0000000006E90000-0x00000000070C5000-memory.dmp
memory/1640-153-0x0000000006E90000-0x00000000070C5000-memory.dmp
memory/1640-155-0x0000000006E90000-0x00000000070C5000-memory.dmp
memory/1640-157-0x0000000006E90000-0x00000000070C5000-memory.dmp
memory/1640-159-0x0000000006E90000-0x00000000070C5000-memory.dmp
memory/1640-161-0x0000000006E90000-0x00000000070C5000-memory.dmp
memory/1640-163-0x0000000006E90000-0x00000000070C5000-memory.dmp
memory/1640-165-0x0000000006E90000-0x00000000070C5000-memory.dmp
memory/1640-167-0x0000000006E90000-0x00000000070C5000-memory.dmp
memory/1640-169-0x0000000006E90000-0x00000000070C5000-memory.dmp
memory/1640-171-0x0000000006E90000-0x00000000070C5000-memory.dmp
memory/1640-173-0x0000000006E90000-0x00000000070C5000-memory.dmp
memory/1640-175-0x0000000006E90000-0x00000000070C5000-memory.dmp
memory/1640-177-0x0000000006E90000-0x00000000070C5000-memory.dmp
memory/1640-179-0x0000000006E90000-0x00000000070C5000-memory.dmp
memory/1640-181-0x0000000006E90000-0x00000000070C5000-memory.dmp
memory/1640-183-0x0000000006E90000-0x00000000070C5000-memory.dmp
memory/1640-185-0x0000000006E90000-0x00000000070C5000-memory.dmp
memory/1640-187-0x0000000006E90000-0x00000000070C5000-memory.dmp
memory/1640-189-0x0000000006E90000-0x00000000070C5000-memory.dmp
memory/1640-191-0x0000000006E90000-0x00000000070C5000-memory.dmp
memory/1640-193-0x0000000006E90000-0x00000000070C5000-memory.dmp
memory/1640-195-0x0000000006E90000-0x00000000070C5000-memory.dmp
memory/1640-197-0x0000000006E90000-0x00000000070C5000-memory.dmp
memory/1640-199-0x0000000006E90000-0x00000000070C5000-memory.dmp
memory/1640-201-0x0000000006E90000-0x00000000070C5000-memory.dmp
memory/1640-203-0x0000000006E90000-0x00000000070C5000-memory.dmp
memory/1640-205-0x0000000006E90000-0x00000000070C5000-memory.dmp
memory/1640-207-0x0000000006E90000-0x00000000070C5000-memory.dmp
memory/1640-270-0x0000000009EF0000-0x0000000009F00000-memory.dmp