Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
14/04/2023, 16:57
Static task
static1
Behavioral task
behavioral1
Sample
AnyDesk.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
AnyDesk.exe
Resource
win10v2004-20230220-en
General
-
Target
AnyDesk.exe
-
Size
2.8MB
-
MD5
ff6bbddc34cbd33e2501872b97c4bacd
-
SHA1
f2bd2d8381739149e1c624762ca557dee2164caa
-
SHA256
6f4a78da5c19afba57637bd344213d5ff55fb69dc343d6a6c79b0696ce53eaa0
-
SHA512
1c2c8505e0e5da64b6766a9a5686c8efdbc11df8085a92c25cef38c01a0034ff8dd3feb462d5d2179d9b88b86ac9002dfdd202318e6988fb8cf23431e03bae44
-
SSDEEP
49152:9Ll8YFwl2Wauwp8DvwNKnQUiA1FY0QYAlyBMNaI8SgQEFPPVXzVz:zcl2WWp8WLA1eCAlhd8SXEFPVp
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AnyDesk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString AnyDesk.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 460 AnyDesk.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 516 AnyDesk.exe 516 AnyDesk.exe 516 AnyDesk.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 516 AnyDesk.exe 516 AnyDesk.exe 516 AnyDesk.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1708 wrote to memory of 460 1708 AnyDesk.exe 28 PID 1708 wrote to memory of 460 1708 AnyDesk.exe 28 PID 1708 wrote to memory of 460 1708 AnyDesk.exe 28 PID 1708 wrote to memory of 460 1708 AnyDesk.exe 28 PID 1708 wrote to memory of 516 1708 AnyDesk.exe 29 PID 1708 wrote to memory of 516 1708 AnyDesk.exe 29 PID 1708 wrote to memory of 516 1708 AnyDesk.exe 29 PID 1708 wrote to memory of 516 1708 AnyDesk.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"1⤵
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe" --local-service2⤵
- Suspicious behavior: EnumeratesProcesses
PID:460
-
-
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe" --local-control2⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:516
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5fe9cea87556bd61a0dc678a3674b1c49
SHA1149719771b9bb66b8da813ad1791213ab53c51e2
SHA2568ffde6bc19f092fff9e12ce2df2d991a65311a6fb1f85a74229cd2e35772e2ea
SHA512fac8a64ae75fca17b6c014b2c3085c287481d85fbd6bbda96f41b5dd1a71f43d723e35c3a62f201d58c110aef2b027340d7c5f108576d3b8f5c3f726fd5e49fb
-
Filesize
5KB
MD55dcb717d1a597a24386d39d1b8601462
SHA152397b395da74b4e41059e8a688f83ae0f12b800
SHA256c71425f2bb902de7118fc1bd5e611f28d8f454d9db3854cbc107f711bb92b57a
SHA512003658e55d05a7c5424f1dc81c5ad63542722253b5fe768dac0551ac98f37712dc7bde932f5276f4e3c674ae1fbfb1177dae33e3df507d3754dce769b19764d8
-
Filesize
2KB
MD51c11ee1ce05d6a8eae17aa8811b34978
SHA17f48d4add9e72828a1050bb722de1dc21c85eacf
SHA256312e91db21f266855d6e7b66deaab7fd85a977b93c5731fc32d1ec7fc42a4a20
SHA5123f551ad9e86fa6b0b3ba23b3e4ffb311312491bc036b3bfbe58d5d6650d3af6c57ab04feae3a61cc949e0b36b092809f5a94726ef4bb52576a1f496561c3dc02
-
Filesize
105B
MD5f559a9f77ec71b885582b469e30cf8e3
SHA144ffaf76d715393eb8f39b73bdce585afe904e75
SHA256c69a04d0edd931ec17557caffca2e06e40cf805aadcb2b8172f513aef7990ccf
SHA5126d39fbcab24f8bf4a8b992a7dfdb7fd97ccae7223610450b20f505ad00bf9987b94e6e725bf5824e3513f10a8df2d411b22a014f97c93888eebb93a2900447f2
-
Filesize
113B
MD5f92bce7a25af12dce7934f13fa5f4ee6
SHA188a810e00a39cd744eeadcb089fd39ff0355ddf7
SHA256fe8a812b924b4ca91da954f1b5143b65340f3191aa3d54e087ab487f0452546c
SHA5122d80d314f5e812f15b9912cc05bd3fbc23ec9e8daedbaa67b1a00bbabecf899f134c7fd94ad80721ccb68bdd205c3c6e7edac8a239951dcbbcc1119699817cd9
-
Filesize
205B
MD559352c2b0c590c5fd96365d3168d723b
SHA153ab571639cc3e3a38032c1095985f7f4278d8fc
SHA256079db0d18cb8ca55e8653f3d67608c5e445d32e368feb874ed3fa1d797c7c286
SHA5122d21bcd26ef934095ca5b37aa1e66091547870f5e09c2d203dfd75923d2575f93f1a42f31e4fb7b2423b766984464ed65b048f49519837918de246a892c82828