Analysis Overview
SHA256
f0c95b09ead49d1fe42e25f6d4f8bbcd3492d28c8f508e45e59feb31f4011c3e
Threat Level: Shows suspicious behavior
The file AnyDesk (DROPSY).exe was found to be: Shows suspicious behavior.
Malicious Activity Summary
Loads dropped DLL
Obfuscated with Agile.Net obfuscator
Checks SCSI registry key(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
MITRE ATT&CK
Enterprise Matrix V6
Analysis: static1
Detonation Overview
Reported
2023-04-11 21:04
Signatures
Analysis: behavioral2
Detonation Overview
Submitted
2023-04-11 21:04
Reported
2023-04-11 21:05
Platform
win10v2004-20230220-en
Max time kernel
64s
Max time network
76s
Command Line
Signatures
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\AnyDesk (DROPSY).exe | N/A |
Obfuscated with Agile.Net obfuscator
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Checks SCSI registry key(s)
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A | C:\Windows\system32\taskmgr.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName | C:\Windows\system32\taskmgr.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 | C:\Windows\system32\taskmgr.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\AnyDesk (DROPSY).exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\system32\taskmgr.exe | N/A |
| Token: SeSystemProfilePrivilege | N/A | C:\Windows\system32\taskmgr.exe | N/A |
| Token: SeCreateGlobalPrivilege | N/A | C:\Windows\system32\taskmgr.exe | N/A |
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Processes
C:\Users\Admin\AppData\Local\Temp\AnyDesk (DROPSY).exe
"C:\Users\Admin\AppData\Local\Temp\AnyDesk (DROPSY).exe"
C:\Windows\system32\taskmgr.exe
"C:\Windows\system32\taskmgr.exe" /0
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 176.122.125.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 28.118.140.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 108.211.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | assets.msn.com | udp |
| NL | 23.73.0.161:443 | assets.msn.com | tcp |
| US | 209.197.3.8:80 | tcp | |
| US | 8.8.8.8:53 | 161.0.73.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 171.39.242.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 240.232.229.192.in-addr.arpa | udp |
| US | 20.42.73.24:443 | tcp | |
| US | 209.197.3.8:80 | tcp | |
| US | 8.8.8.8:53 | 68.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 45.8.109.52.in-addr.arpa | udp |
Files
memory/3716-133-0x0000000000D60000-0x00000000015D0000-memory.dmp
memory/3716-134-0x00000000075A0000-0x0000000007B44000-memory.dmp
memory/3716-135-0x0000000005CF0000-0x0000000005D82000-memory.dmp
memory/3716-136-0x000000000A200000-0x000000000A210000-memory.dmp
memory/3716-137-0x0000000005D90000-0x0000000005D9A000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\ba012cba-2679-4da3-a26b-788d51617354\AgileDotNetRT.dll
| MD5 | 14ff402962ad21b78ae0b4c43cd1f194 |
| SHA1 | f8a510eb26666e875a5bdd1cadad40602763ad72 |
| SHA256 | fb9646cb956945bdc503e69645f6b5316d3826b780d3c36738d6b944e884d15b |
| SHA512 | daa7a08bf3709119a944bce28f6ebdd24e54a22b18cd9f86a87873e958df121a3881dcdd5e162f6b4e543238c7aef20f657c9830df01d4c79290f7c9a4fcc54b |
C:\Users\Admin\AppData\Local\Temp\ba012cba-2679-4da3-a26b-788d51617354\AgileDotNetRT.dll
| MD5 | 14ff402962ad21b78ae0b4c43cd1f194 |
| SHA1 | f8a510eb26666e875a5bdd1cadad40602763ad72 |
| SHA256 | fb9646cb956945bdc503e69645f6b5316d3826b780d3c36738d6b944e884d15b |
| SHA512 | daa7a08bf3709119a944bce28f6ebdd24e54a22b18cd9f86a87873e958df121a3881dcdd5e162f6b4e543238c7aef20f657c9830df01d4c79290f7c9a4fcc54b |
memory/3716-145-0x00000000731D0000-0x0000000073259000-memory.dmp
memory/3716-146-0x0000000007100000-0x0000000007335000-memory.dmp
memory/3716-147-0x0000000007100000-0x0000000007335000-memory.dmp
memory/3716-149-0x0000000007100000-0x0000000007335000-memory.dmp
memory/3716-151-0x0000000007100000-0x0000000007335000-memory.dmp
memory/3716-153-0x0000000007100000-0x0000000007335000-memory.dmp
memory/3716-155-0x0000000007100000-0x0000000007335000-memory.dmp
memory/3716-157-0x0000000007100000-0x0000000007335000-memory.dmp
memory/3716-159-0x0000000007100000-0x0000000007335000-memory.dmp
memory/3716-161-0x0000000007100000-0x0000000007335000-memory.dmp
memory/3716-163-0x0000000007100000-0x0000000007335000-memory.dmp
memory/3716-165-0x0000000007100000-0x0000000007335000-memory.dmp
memory/3716-167-0x0000000007100000-0x0000000007335000-memory.dmp
memory/3716-169-0x0000000007100000-0x0000000007335000-memory.dmp
memory/3716-171-0x0000000007100000-0x0000000007335000-memory.dmp
memory/3716-173-0x0000000007100000-0x0000000007335000-memory.dmp
memory/3716-175-0x0000000007100000-0x0000000007335000-memory.dmp
memory/3716-177-0x0000000007100000-0x0000000007335000-memory.dmp
memory/3716-179-0x0000000007100000-0x0000000007335000-memory.dmp
memory/3716-181-0x0000000007100000-0x0000000007335000-memory.dmp
memory/3716-183-0x0000000007100000-0x0000000007335000-memory.dmp
memory/3716-185-0x0000000007100000-0x0000000007335000-memory.dmp
memory/3716-187-0x0000000007100000-0x0000000007335000-memory.dmp
memory/3716-189-0x0000000007100000-0x0000000007335000-memory.dmp
memory/3716-191-0x0000000007100000-0x0000000007335000-memory.dmp
memory/3716-193-0x0000000007100000-0x0000000007335000-memory.dmp
memory/3716-195-0x0000000007100000-0x0000000007335000-memory.dmp
memory/3716-197-0x0000000007100000-0x0000000007335000-memory.dmp
memory/3716-199-0x0000000007100000-0x0000000007335000-memory.dmp
memory/3716-201-0x0000000007100000-0x0000000007335000-memory.dmp
memory/3716-203-0x0000000007100000-0x0000000007335000-memory.dmp
memory/3716-205-0x0000000007100000-0x0000000007335000-memory.dmp
memory/3716-207-0x0000000007100000-0x0000000007335000-memory.dmp
memory/3716-340-0x000000000A200000-0x000000000A210000-memory.dmp
Analysis: behavioral1
Detonation Overview
Submitted
2023-04-11 21:04
Reported
2023-04-11 21:06
Platform
win7-20230220-en
Max time kernel
151s
Max time network
34s
Command Line
Signatures
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\AnyDesk (DROPSY).exe | N/A |
Obfuscated with Agile.Net obfuscator
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\AnyDesk (DROPSY).exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\AnyDesk (DROPSY).exe
"C:\Users\Admin\AppData\Local\Temp\AnyDesk (DROPSY).exe"
Network
Files
memory/1360-54-0x00000000005E0000-0x0000000000E50000-memory.dmp
memory/1360-55-0x0000000009A80000-0x0000000009AC0000-memory.dmp
memory/1360-56-0x00000000053C0000-0x0000000005604000-memory.dmp
memory/1360-57-0x00000000067A0000-0x00000000069DA000-memory.dmp
memory/1360-58-0x0000000000FF0000-0x0000000001000000-memory.dmp
memory/1360-59-0x0000000006600000-0x00000000066C8000-memory.dmp
\Users\Admin\AppData\Local\Temp\ba012cba-2679-4da3-a26b-788d51617354\AgileDotNetRT.dll
| MD5 | 14ff402962ad21b78ae0b4c43cd1f194 |
| SHA1 | f8a510eb26666e875a5bdd1cadad40602763ad72 |
| SHA256 | fb9646cb956945bdc503e69645f6b5316d3826b780d3c36738d6b944e884d15b |
| SHA512 | daa7a08bf3709119a944bce28f6ebdd24e54a22b18cd9f86a87873e958df121a3881dcdd5e162f6b4e543238c7aef20f657c9830df01d4c79290f7c9a4fcc54b |
C:\Users\Admin\AppData\Local\Temp\ba012cba-2679-4da3-a26b-788d51617354\AgileDotNetRT.dll
| MD5 | 14ff402962ad21b78ae0b4c43cd1f194 |
| SHA1 | f8a510eb26666e875a5bdd1cadad40602763ad72 |
| SHA256 | fb9646cb956945bdc503e69645f6b5316d3826b780d3c36738d6b944e884d15b |
| SHA512 | daa7a08bf3709119a944bce28f6ebdd24e54a22b18cd9f86a87873e958df121a3881dcdd5e162f6b4e543238c7aef20f657c9830df01d4c79290f7c9a4fcc54b |
memory/1360-66-0x0000000074610000-0x0000000074690000-memory.dmp
memory/1360-67-0x00000000067A0000-0x00000000069D5000-memory.dmp
memory/1360-68-0x00000000067A0000-0x00000000069D5000-memory.dmp
memory/1360-70-0x00000000067A0000-0x00000000069D5000-memory.dmp
memory/1360-72-0x00000000067A0000-0x00000000069D5000-memory.dmp
memory/1360-74-0x00000000067A0000-0x00000000069D5000-memory.dmp
memory/1360-76-0x00000000067A0000-0x00000000069D5000-memory.dmp
memory/1360-78-0x00000000067A0000-0x00000000069D5000-memory.dmp
memory/1360-80-0x00000000067A0000-0x00000000069D5000-memory.dmp
memory/1360-82-0x00000000067A0000-0x00000000069D5000-memory.dmp
memory/1360-84-0x00000000067A0000-0x00000000069D5000-memory.dmp
memory/1360-86-0x00000000067A0000-0x00000000069D5000-memory.dmp
memory/1360-88-0x00000000067A0000-0x00000000069D5000-memory.dmp
memory/1360-90-0x00000000067A0000-0x00000000069D5000-memory.dmp
memory/1360-92-0x00000000067A0000-0x00000000069D5000-memory.dmp
memory/1360-94-0x00000000067A0000-0x00000000069D5000-memory.dmp
memory/1360-96-0x00000000067A0000-0x00000000069D5000-memory.dmp
memory/1360-98-0x00000000067A0000-0x00000000069D5000-memory.dmp
memory/1360-100-0x00000000067A0000-0x00000000069D5000-memory.dmp
memory/1360-102-0x00000000067A0000-0x00000000069D5000-memory.dmp
memory/1360-104-0x00000000067A0000-0x00000000069D5000-memory.dmp
memory/1360-106-0x00000000067A0000-0x00000000069D5000-memory.dmp
memory/1360-108-0x00000000067A0000-0x00000000069D5000-memory.dmp
memory/1360-110-0x00000000067A0000-0x00000000069D5000-memory.dmp
memory/1360-112-0x00000000067A0000-0x00000000069D5000-memory.dmp
memory/1360-114-0x00000000067A0000-0x00000000069D5000-memory.dmp
memory/1360-116-0x00000000067A0000-0x00000000069D5000-memory.dmp
memory/1360-118-0x00000000067A0000-0x00000000069D5000-memory.dmp
memory/1360-120-0x00000000067A0000-0x00000000069D5000-memory.dmp
memory/1360-122-0x00000000067A0000-0x00000000069D5000-memory.dmp
memory/1360-124-0x00000000067A0000-0x00000000069D5000-memory.dmp
memory/1360-126-0x00000000067A0000-0x00000000069D5000-memory.dmp
memory/1360-128-0x00000000067A0000-0x00000000069D5000-memory.dmp
memory/1360-571-0x0000000009A80000-0x0000000009AC0000-memory.dmp