Analysis
-
max time kernel
160s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11-10-2023 11:27
Static task
static1
Behavioral task
behavioral1
Sample
AnyDesk.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
AnyDesk.exe
Resource
win10v2004-20230915-en
General
-
Target
AnyDesk.exe
-
Size
5.2MB
-
MD5
37e172be64b12f3207300d11b74656b8
-
SHA1
1895d7c4f785f92e48b5191fd812822593cbc73f
-
SHA256
bc747e3bf7b6e02c09f3d18bdd0e64eef62b940b2f16c9c72e647eec85cf0138
-
SHA512
98cf7a591beb4af2066ddd9d17caee69b3cbb42343cb4dc0d517fb99983159ae8e960c315030487b3ea22b2512359f108a6cfe15ec3b725c040ac06b877c88ff
-
SSDEEP
98304:pgBOLscYr9NrQO6lSdAd7qvlyBhbUhrZsTY3ycd8izlxGhzAqK3:KOoc+dQO6+Ad7qdriTYlfzlIhMt
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2508 AnyDesk.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3064 AnyDesk.exe 3064 AnyDesk.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 3064 AnyDesk.exe 3064 AnyDesk.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2880 wrote to memory of 2508 2880 AnyDesk.exe 30 PID 2880 wrote to memory of 2508 2880 AnyDesk.exe 30 PID 2880 wrote to memory of 2508 2880 AnyDesk.exe 30 PID 2880 wrote to memory of 2508 2880 AnyDesk.exe 30 PID 2880 wrote to memory of 3064 2880 AnyDesk.exe 31 PID 2880 wrote to memory of 3064 2880 AnyDesk.exe 31 PID 2880 wrote to memory of 3064 2880 AnyDesk.exe 31 PID 2880 wrote to memory of 3064 2880 AnyDesk.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe" --local-service2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2508
-
-
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe" --local-control2⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD599bb3de85f90a17576f566b01c06cf7d
SHA136071d35ec57de77ba24d6d00877b2140bf6590e
SHA2565bcf9a0238c729015ebbbafe9f0ef37a3b6acc07e234162a82e948369fe74ddf
SHA5124d41221f068ebc6feb24e75c5234dd0d92e33c50ad975dda555348b695251e9a21be7bdc3c9ba7f2a4261e2f5bf9dff806f0428f74104af5a204a394413c3989
-
Filesize
424B
MD53c986594cba2c4ac0a53c465f880c8d7
SHA1d14508f6641689d41f2ff9e9f20303b06f78c50c
SHA2561017e2578d6607b355babd10887a5a4fa93f64547635da00dcfd9ad66b411c75
SHA51210a53240cb9e876e9d8659c4c3d84e5a0fbe7ba855d8339e54571fa19d36dca1e3fbf062d72a6a1721862c4561787ba032b812c92042b16a6b2e82b1937a27ac
-
Filesize
1KB
MD5a62020a7a81e605f3e1e89efc57df115
SHA1b738e7c6fc11733e97ec289ab154f1f9b3de3af7
SHA256ff23ac6f19b3504d27ceffccaa4b6537395ea43ed8a068c5fcfcd6a3f5710de4
SHA512723563d0a83589c6ae57438d72159a71deaa6680aab9422b5b95245862fbfa5c122870ece7805f607870467edacd082cd2c86bbaa61708742d1c7469de33eed1
-
Filesize
1KB
MD5a62020a7a81e605f3e1e89efc57df115
SHA1b738e7c6fc11733e97ec289ab154f1f9b3de3af7
SHA256ff23ac6f19b3504d27ceffccaa4b6537395ea43ed8a068c5fcfcd6a3f5710de4
SHA512723563d0a83589c6ae57438d72159a71deaa6680aab9422b5b95245862fbfa5c122870ece7805f607870467edacd082cd2c86bbaa61708742d1c7469de33eed1