Analysis
-
max time kernel
141s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 06:00
Static task
static1
Behavioral task
behavioral1
Sample
AnyDesk (4).exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
AnyDesk (4).exe
Resource
win10v2004-20231215-en
General
-
Target
AnyDesk (4).exe
-
Size
1.4MB
-
MD5
055fc495cd42cf445abf2f8fd99f2e4d
-
SHA1
81f2bb25d57894f6a87bfcbf1c885ca0881e1578
-
SHA256
6d335ee4ecfb270693e6054e9cd7d0cbdb4c4735d1a3229f059226a9fbd60a5a
-
SHA512
ccfccce7ad1e227e724cfd53438c2b91a5b961476d38f72797e016ea65f6f542e9b8eaa53d1bad03a2d6f3250f81763654b2fef2ac45c5bc63e0f1ecd0c4bdd2
-
SSDEEP
24576:MoOqKw+chJgYOggDK10pvogD5Iw/xqVeUuBwkDvWnOQVj+FYeZIJxIPiPNQwfI/:MoODcjlcj9IwIVB5k7Wn5i/mJKkpQ
Malware Config
Signatures
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions AnyDesk (4).exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\VMware, Inc.\VMware Tools AnyDesk (4).exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion AnyDesk (4).exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion AnyDesk (4).exe -
Loads dropped DLL 1 IoCs
pid Process 3232 AnyDesk (4).exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum AnyDesk (4).exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 AnyDesk (4).exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe 3232 AnyDesk (4).exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3232 AnyDesk (4).exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\AnyDesk (4).exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk (4).exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3232
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112KB
MD52f1a50031dcf5c87d92e8b2491fdcea6
SHA171e2aaa2d1bb7dbe32a00e1d01d744830ecce08f
SHA25647578a37901c82f66e4dba47acd5c3cab6d09c9911d16f5ad0413275342147ed
SHA5121c66dbe1320c1a84023bdf77686a2a7ab79a3e86ba5a4ea2cda9a37f8a916137d5cfec30b28ceae181355f6f279270465ef63ae90b7e8dcd4c1a8198a7fd36a8