Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
20-07-2023 16:34
Static task
static1
Behavioral task
behavioral1
Sample
AnyDesk.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
AnyDesk.exe
Resource
win10v2004-20230703-en
General
-
Target
AnyDesk.exe
-
Size
3.0MB
-
MD5
eb80f7bddb699784baa9fbf2941eaf4a
-
SHA1
df6abbfd20e731689f3c7d2a55f45ac83fbbc40b
-
SHA256
b9ad79eaf7a4133f95f24c3b9d976c72f34264dc5c99030f0e57992cb5621f78
-
SHA512
3a1162e9fef849cb7143dc1898d4cfcfd87eb80ced0edb321dfa096686b25ae8a9a7f3ae8f37a09724d94f96d64e08940fc23c0b931ddd8a1e70e2792cb3fe47
-
SSDEEP
98304:6aJXyQTrRGlSMoIuORmKBQielvZlpkiSti:3olMcR9BTY3WS
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AnyDesk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString AnyDesk.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2200 AnyDesk.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2876 AnyDesk.exe 2876 AnyDesk.exe 2876 AnyDesk.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2876 AnyDesk.exe 2876 AnyDesk.exe 2876 AnyDesk.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2472 wrote to memory of 2200 2472 AnyDesk.exe 28 PID 2472 wrote to memory of 2200 2472 AnyDesk.exe 28 PID 2472 wrote to memory of 2200 2472 AnyDesk.exe 28 PID 2472 wrote to memory of 2200 2472 AnyDesk.exe 28 PID 2472 wrote to memory of 2876 2472 AnyDesk.exe 29 PID 2472 wrote to memory of 2876 2472 AnyDesk.exe 29 PID 2472 wrote to memory of 2876 2472 AnyDesk.exe 29 PID 2472 wrote to memory of 2876 2472 AnyDesk.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"1⤵
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe" --local-service2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2200
-
-
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe" --local-control2⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2876
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD527894f201dfc1ab4babbe67c8ac9d3c9
SHA15cd357327b608532df1963db5888b7e9b5d2e52c
SHA25658adde8aa56c3e44c68a094944f31fed9432f7d0734e160d21f8c58f6d1d67ab
SHA512a06abe602136ea5d08e7b7e3a4082604599219ede3e433ac7eef5ec6246133a2ccdbc33b6fbca63efa0d9bf6abcef6861b4f6ab1f1c5879bdba4ff9bfe8f841e
-
Filesize
5KB
MD527894f201dfc1ab4babbe67c8ac9d3c9
SHA15cd357327b608532df1963db5888b7e9b5d2e52c
SHA25658adde8aa56c3e44c68a094944f31fed9432f7d0734e160d21f8c58f6d1d67ab
SHA512a06abe602136ea5d08e7b7e3a4082604599219ede3e433ac7eef5ec6246133a2ccdbc33b6fbca63efa0d9bf6abcef6861b4f6ab1f1c5879bdba4ff9bfe8f841e
-
Filesize
2KB
MD594ab3a8dfc6a67b25e56001e1dc98782
SHA16ab8029e5e4c376327548408504d2270b2c0fcb7
SHA256bb9f7b99588d940bb39f5f48e29bf8fae4dd023b922a62bfe99a32f150a0c967
SHA512c8700ba2054d864e17731a691246b1ab8abae9a0ad0471297b2c05d5b179190954c10c3574d11f807be7d0a5e76c86f7cd32d1e1e7a254a8c37e9b965e954726
-
Filesize
105B
MD58ee54e72ef80843c62606b02a12a97a2
SHA152f2347ec212f06003eeee4fdce418f92f2e4346
SHA256c427d4bc2d9831fff973006e1ed18b5ad5fa29e4f77f4d90c95fe024ec835d12
SHA5129f316071c0556b5190a13506d10702cc58c923b10d85fb4f965f7c88b2bfdeac46f0bf9de631429dedefc41b2d55d99e877733c1910726a1a9c6f93f20ab4c59
-
Filesize
330B
MD5fbfb98dd45482e152e46102e0bafff75
SHA12d48a484680c6721dfa8658158639bb48a501f8d
SHA25642061bb4230b9768989fc2c3550c918a3f89cce48e0678e7f9e19ba87bdadc93
SHA51278a7b9386a2da880ab5b8456a74405c039ef03cbf198524c0b8bdae73f5e930e12f2e8a17109cc16f1e95dd60ac7f0b08564ab968794958b3d69061183b73c59
-
Filesize
330B
MD5fbfb98dd45482e152e46102e0bafff75
SHA12d48a484680c6721dfa8658158639bb48a501f8d
SHA25642061bb4230b9768989fc2c3550c918a3f89cce48e0678e7f9e19ba87bdadc93
SHA51278a7b9386a2da880ab5b8456a74405c039ef03cbf198524c0b8bdae73f5e930e12f2e8a17109cc16f1e95dd60ac7f0b08564ab968794958b3d69061183b73c59
-
Filesize
107B
MD5f25e48e1d9e1e1398bc5fbc6885570b8
SHA146557c8ebb9236af6c28c9bdd317d1d25749e710
SHA2560379e6a5dff30a991e0acdb9932cac828eb3e30ca8cc23447a2bc73ae78181db
SHA51241e61480f5141b6950d7b96f3e4dfcca19bc480e0b11eeebdedaeb266c6e525f41f3d29a3c1c0bf8f17a3c30111d8fba7e269d5fcf84b336bee916e21881acb7
-
Filesize
205B
MD559352c2b0c590c5fd96365d3168d723b
SHA153ab571639cc3e3a38032c1095985f7f4278d8fc
SHA256079db0d18cb8ca55e8653f3d67608c5e445d32e368feb874ed3fa1d797c7c286
SHA5122d21bcd26ef934095ca5b37aa1e66091547870f5e09c2d203dfd75923d2575f93f1a42f31e4fb7b2423b766984464ed65b048f49519837918de246a892c82828