Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2023 16:57
Static task
static1
Behavioral task
behavioral1
Sample
AnyDesk.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
AnyDesk.exe
Resource
win10v2004-20230220-en
General
-
Target
AnyDesk.exe
-
Size
2.8MB
-
MD5
ff6bbddc34cbd33e2501872b97c4bacd
-
SHA1
f2bd2d8381739149e1c624762ca557dee2164caa
-
SHA256
6f4a78da5c19afba57637bd344213d5ff55fb69dc343d6a6c79b0696ce53eaa0
-
SHA512
1c2c8505e0e5da64b6766a9a5686c8efdbc11df8085a92c25cef38c01a0034ff8dd3feb462d5d2179d9b88b86ac9002dfdd202318e6988fb8cf23431e03bae44
-
SSDEEP
49152:9Ll8YFwl2Wauwp8DvwNKnQUiA1FY0QYAlyBMNaI8SgQEFPPVXzVz:zcl2WWp8WLA1eCAlhd8SXEFPVp
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AnyDesk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString AnyDesk.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1816 AnyDesk.exe 1816 AnyDesk.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2796 AnyDesk.exe 2796 AnyDesk.exe 2796 AnyDesk.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2796 AnyDesk.exe 2796 AnyDesk.exe 2796 AnyDesk.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3804 wrote to memory of 1816 3804 AnyDesk.exe 86 PID 3804 wrote to memory of 1816 3804 AnyDesk.exe 86 PID 3804 wrote to memory of 1816 3804 AnyDesk.exe 86 PID 3804 wrote to memory of 2796 3804 AnyDesk.exe 87 PID 3804 wrote to memory of 2796 3804 AnyDesk.exe 87 PID 3804 wrote to memory of 2796 3804 AnyDesk.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"1⤵
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe" --local-service2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1816
-
-
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe" --local-control2⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2796
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD58ff5bb9c7d8567d13029dc1810db12d8
SHA1222ed25e4cfa5242335692e656e20723f66f858d
SHA25616f11be09fdae21c7746a905b9be197d0ae27af98206484c2451887ab0bdcfb7
SHA5123141052f5f4ac30b2b82db1666a5139423ec3c0743e2e9bc946765492ffca35f6b8b5d7cc465dcbce80d3486d97baf5eb0e0d0ea5bc761736f8721ff5425ed76
-
Filesize
7KB
MD57fc5ef66f00982d0c0be721bddb2627d
SHA112b5556f07d51727bbee48121df81d57052dd094
SHA256c73b50080dba6c05db40d2f11dce8ccfc67be9aeecbdaae597926db9d6b2332b
SHA5127eeb2df5d0590e1f85e1b63cbac75498cc53f118ac7ba512cbdeb62bb281b6bcbe2c4cc93f3b27e604768544f0d7a156054b3a380a5fb25018966a418e0d5c64
-
Filesize
2KB
MD526e7e915884b7a0a5b92995350c5840c
SHA16f63665c8c9fef5de377ab8c2759383830403833
SHA256b715ec76b780374bbd49e0680ab897f0fadba0caa7912a63c17af7cb499b8490
SHA5128f4adf3dfd33098ffbbfe831e81f5b88f584c1e5e13c8462d593dea5e51e4f2e7089b5c3ce4d80bc136a574ac725ec0af16f3709ee3f136cfdbc4954102810bf
-
Filesize
105B
MD5be462bb1b425f17fb9aa35adfa581c8d
SHA1512fda5a523f212e06d7d108a34d26b27d96382f
SHA2567cbed01802bacbc187e8f3675700962ad68967a4beced7f6416d520f4bdccda1
SHA51244b68d696503af686e8654fd3edec23537a2dc26991db0d67a9858b708419f9a06c182cf0dd6f584eae45374b8dd31cd3691ebea1f176d50582a4dde94e35d92
-
Filesize
113B
MD57388c4d5c570d62b30db5d2ec9b5d994
SHA131fe9185a3d7d8b4f4bbb62fdc6a4b7039734f3b
SHA25694adfea00315e3714c8be4d6b001fea5d9195b9c76eefbfe8502b4b89872a1d2
SHA512318ade0cf3ab17038fbe80d70e6e78c4e2913fb9e3cdee1b02c880e64d841f4725dc3b93e123b38ace95a4c363686924477f4e5d7a6d242d76da28a4bf6c09b5
-
Filesize
107B
MD5f25e48e1d9e1e1398bc5fbc6885570b8
SHA146557c8ebb9236af6c28c9bdd317d1d25749e710
SHA2560379e6a5dff30a991e0acdb9932cac828eb3e30ca8cc23447a2bc73ae78181db
SHA51241e61480f5141b6950d7b96f3e4dfcca19bc480e0b11eeebdedaeb266c6e525f41f3d29a3c1c0bf8f17a3c30111d8fba7e269d5fcf84b336bee916e21881acb7
-
Filesize
205B
MD559352c2b0c590c5fd96365d3168d723b
SHA153ab571639cc3e3a38032c1095985f7f4278d8fc
SHA256079db0d18cb8ca55e8653f3d67608c5e445d32e368feb874ed3fa1d797c7c286
SHA5122d21bcd26ef934095ca5b37aa1e66091547870f5e09c2d203dfd75923d2575f93f1a42f31e4fb7b2423b766984464ed65b048f49519837918de246a892c82828