Malware Analysis Report

2025-06-15 21:44

Sample ID 230409-ayfrzahh8v
Target AnyDesk (DROPSY).exe
SHA256 f0c95b09ead49d1fe42e25f6d4f8bbcd3492d28c8f508e45e59feb31f4011c3e
Tags
agilenet
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

f0c95b09ead49d1fe42e25f6d4f8bbcd3492d28c8f508e45e59feb31f4011c3e

Threat Level: Shows suspicious behavior

The file AnyDesk (DROPSY).exe was found to be: Shows suspicious behavior.

Malicious Activity Summary

agilenet

Loads dropped DLL

Obfuscated with Agile.Net obfuscator

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2023-04-09 00:37

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-04-09 00:37

Reported

2023-04-09 00:40

Platform

win7-20230220-en

Max time kernel

150s

Max time network

33s

Command Line

"C:\Users\Admin\AppData\Local\Temp\AnyDesk (DROPSY).exe"

Signatures

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\AnyDesk (DROPSY).exe N/A

Obfuscated with Agile.Net obfuscator

agilenet
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\AnyDesk (DROPSY).exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\AnyDesk (DROPSY).exe

"C:\Users\Admin\AppData\Local\Temp\AnyDesk (DROPSY).exe"

Network

N/A

Files

memory/892-54-0x0000000000EB0000-0x0000000001720000-memory.dmp

memory/892-55-0x00000000053B0000-0x00000000055F4000-memory.dmp

memory/892-56-0x0000000007580000-0x00000000075C0000-memory.dmp

memory/892-57-0x0000000006740000-0x000000000697A000-memory.dmp

memory/892-58-0x00000000009D0000-0x00000000009E0000-memory.dmp

memory/892-59-0x00000000065F0000-0x00000000066B8000-memory.dmp

\Users\Admin\AppData\Local\Temp\ba012cba-2679-4da3-a26b-788d51617354\AgileDotNetRT.dll

MD5 14ff402962ad21b78ae0b4c43cd1f194
SHA1 f8a510eb26666e875a5bdd1cadad40602763ad72
SHA256 fb9646cb956945bdc503e69645f6b5316d3826b780d3c36738d6b944e884d15b
SHA512 daa7a08bf3709119a944bce28f6ebdd24e54a22b18cd9f86a87873e958df121a3881dcdd5e162f6b4e543238c7aef20f657c9830df01d4c79290f7c9a4fcc54b

C:\Users\Admin\AppData\Local\Temp\ba012cba-2679-4da3-a26b-788d51617354\AgileDotNetRT.dll

MD5 14ff402962ad21b78ae0b4c43cd1f194
SHA1 f8a510eb26666e875a5bdd1cadad40602763ad72
SHA256 fb9646cb956945bdc503e69645f6b5316d3826b780d3c36738d6b944e884d15b
SHA512 daa7a08bf3709119a944bce28f6ebdd24e54a22b18cd9f86a87873e958df121a3881dcdd5e162f6b4e543238c7aef20f657c9830df01d4c79290f7c9a4fcc54b

memory/892-66-0x0000000074940000-0x00000000749C0000-memory.dmp

memory/892-67-0x0000000006740000-0x0000000006975000-memory.dmp

memory/892-68-0x0000000006740000-0x0000000006975000-memory.dmp

memory/892-70-0x0000000006740000-0x0000000006975000-memory.dmp

memory/892-72-0x0000000006740000-0x0000000006975000-memory.dmp

memory/892-74-0x0000000006740000-0x0000000006975000-memory.dmp

memory/892-76-0x0000000006740000-0x0000000006975000-memory.dmp

memory/892-78-0x0000000006740000-0x0000000006975000-memory.dmp

memory/892-80-0x0000000006740000-0x0000000006975000-memory.dmp

memory/892-82-0x0000000006740000-0x0000000006975000-memory.dmp

memory/892-84-0x0000000006740000-0x0000000006975000-memory.dmp

memory/892-86-0x0000000006740000-0x0000000006975000-memory.dmp

memory/892-88-0x0000000006740000-0x0000000006975000-memory.dmp

memory/892-90-0x0000000006740000-0x0000000006975000-memory.dmp

memory/892-94-0x0000000006740000-0x0000000006975000-memory.dmp

memory/892-92-0x0000000006740000-0x0000000006975000-memory.dmp

memory/892-96-0x0000000006740000-0x0000000006975000-memory.dmp

memory/892-98-0x0000000006740000-0x0000000006975000-memory.dmp

memory/892-100-0x0000000006740000-0x0000000006975000-memory.dmp

memory/892-102-0x0000000006740000-0x0000000006975000-memory.dmp

memory/892-104-0x0000000006740000-0x0000000006975000-memory.dmp

memory/892-106-0x0000000006740000-0x0000000006975000-memory.dmp

memory/892-108-0x0000000006740000-0x0000000006975000-memory.dmp

memory/892-110-0x0000000006740000-0x0000000006975000-memory.dmp

memory/892-112-0x0000000006740000-0x0000000006975000-memory.dmp

memory/892-114-0x0000000006740000-0x0000000006975000-memory.dmp

memory/892-116-0x0000000006740000-0x0000000006975000-memory.dmp

memory/892-118-0x0000000006740000-0x0000000006975000-memory.dmp

memory/892-120-0x0000000006740000-0x0000000006975000-memory.dmp

memory/892-122-0x0000000006740000-0x0000000006975000-memory.dmp

memory/892-124-0x0000000006740000-0x0000000006975000-memory.dmp

memory/892-126-0x0000000006740000-0x0000000006975000-memory.dmp

memory/892-128-0x0000000006740000-0x0000000006975000-memory.dmp

memory/892-569-0x0000000007580000-0x00000000075C0000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2023-04-09 00:37

Reported

2023-04-09 00:40

Platform

win10v2004-20230220-en

Max time kernel

150s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\AnyDesk (DROPSY).exe"

Signatures

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\AnyDesk (DROPSY).exe N/A

Obfuscated with Agile.Net obfuscator

agilenet
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\AnyDesk (DROPSY).exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\AnyDesk (DROPSY).exe

"C:\Users\Admin\AppData\Local\Temp\AnyDesk (DROPSY).exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 assets.msn.com udp
DE 2.16.241.97:443 assets.msn.com tcp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 97.241.16.2.in-addr.arpa udp
US 8.8.8.8:53 2.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 52.152.110.14:443 tcp
US 20.189.173.13:443 tcp
US 8.247.211.254:80 tcp
US 8.247.211.254:80 tcp
US 8.247.211.254:80 tcp
NL 173.223.113.164:443 tcp
NL 173.223.113.131:80 tcp
US 131.253.33.203:80 tcp
US 8.8.8.8:53 233.141.123.20.in-addr.arpa udp
US 52.152.110.14:443 tcp
US 8.247.211.254:80 tcp
US 52.152.110.14:443 tcp
US 52.152.110.14:443 tcp
US 52.152.110.14:443 tcp
US 52.152.110.14:443 tcp

Files

memory/1640-133-0x0000000000B60000-0x00000000013D0000-memory.dmp

memory/1640-134-0x0000000009EF0000-0x0000000009F00000-memory.dmp

memory/1640-135-0x00000000072C0000-0x0000000007864000-memory.dmp

memory/1640-136-0x00000000059E0000-0x0000000005A72000-memory.dmp

memory/1640-137-0x0000000005AA0000-0x0000000005AAA000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\ba012cba-2679-4da3-a26b-788d51617354\AgileDotNetRT.dll

MD5 14ff402962ad21b78ae0b4c43cd1f194
SHA1 f8a510eb26666e875a5bdd1cadad40602763ad72
SHA256 fb9646cb956945bdc503e69645f6b5316d3826b780d3c36738d6b944e884d15b
SHA512 daa7a08bf3709119a944bce28f6ebdd24e54a22b18cd9f86a87873e958df121a3881dcdd5e162f6b4e543238c7aef20f657c9830df01d4c79290f7c9a4fcc54b

C:\Users\Admin\AppData\Local\Temp\ba012cba-2679-4da3-a26b-788d51617354\AgileDotNetRT.dll

MD5 14ff402962ad21b78ae0b4c43cd1f194
SHA1 f8a510eb26666e875a5bdd1cadad40602763ad72
SHA256 fb9646cb956945bdc503e69645f6b5316d3826b780d3c36738d6b944e884d15b
SHA512 daa7a08bf3709119a944bce28f6ebdd24e54a22b18cd9f86a87873e958df121a3881dcdd5e162f6b4e543238c7aef20f657c9830df01d4c79290f7c9a4fcc54b

memory/1640-145-0x0000000072F60000-0x0000000072FE9000-memory.dmp

memory/1640-146-0x0000000006E90000-0x00000000070C5000-memory.dmp

memory/1640-147-0x0000000006E90000-0x00000000070C5000-memory.dmp

memory/1640-149-0x0000000006E90000-0x00000000070C5000-memory.dmp

memory/1640-151-0x0000000006E90000-0x00000000070C5000-memory.dmp

memory/1640-153-0x0000000006E90000-0x00000000070C5000-memory.dmp

memory/1640-155-0x0000000006E90000-0x00000000070C5000-memory.dmp

memory/1640-157-0x0000000006E90000-0x00000000070C5000-memory.dmp

memory/1640-159-0x0000000006E90000-0x00000000070C5000-memory.dmp

memory/1640-161-0x0000000006E90000-0x00000000070C5000-memory.dmp

memory/1640-163-0x0000000006E90000-0x00000000070C5000-memory.dmp

memory/1640-165-0x0000000006E90000-0x00000000070C5000-memory.dmp

memory/1640-167-0x0000000006E90000-0x00000000070C5000-memory.dmp

memory/1640-169-0x0000000006E90000-0x00000000070C5000-memory.dmp

memory/1640-171-0x0000000006E90000-0x00000000070C5000-memory.dmp

memory/1640-173-0x0000000006E90000-0x00000000070C5000-memory.dmp

memory/1640-175-0x0000000006E90000-0x00000000070C5000-memory.dmp

memory/1640-177-0x0000000006E90000-0x00000000070C5000-memory.dmp

memory/1640-179-0x0000000006E90000-0x00000000070C5000-memory.dmp

memory/1640-181-0x0000000006E90000-0x00000000070C5000-memory.dmp

memory/1640-183-0x0000000006E90000-0x00000000070C5000-memory.dmp

memory/1640-185-0x0000000006E90000-0x00000000070C5000-memory.dmp

memory/1640-187-0x0000000006E90000-0x00000000070C5000-memory.dmp

memory/1640-189-0x0000000006E90000-0x00000000070C5000-memory.dmp

memory/1640-191-0x0000000006E90000-0x00000000070C5000-memory.dmp

memory/1640-193-0x0000000006E90000-0x00000000070C5000-memory.dmp

memory/1640-195-0x0000000006E90000-0x00000000070C5000-memory.dmp

memory/1640-197-0x0000000006E90000-0x00000000070C5000-memory.dmp

memory/1640-199-0x0000000006E90000-0x00000000070C5000-memory.dmp

memory/1640-201-0x0000000006E90000-0x00000000070C5000-memory.dmp

memory/1640-203-0x0000000006E90000-0x00000000070C5000-memory.dmp

memory/1640-205-0x0000000006E90000-0x00000000070C5000-memory.dmp

memory/1640-207-0x0000000006E90000-0x00000000070C5000-memory.dmp

memory/1640-270-0x0000000009EF0000-0x0000000009F00000-memory.dmp