Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
08/02/2024, 20:06
240208-yvqprsbh98 708/02/2024, 20:04
240208-ytg18sbh89 708/02/2024, 20:02
240208-ysb4laac9y 108/02/2024, 20:02
240208-yr4r8abh77 108/02/2024, 19:58
240208-yqcbksbh63 308/02/2024, 19:54
240208-ymx4wabh38 708/02/2024, 19:52
240208-ylw57abh26 108/02/2024, 19:51
240208-yk2z2sac4v 108/02/2024, 19:50
240208-yklytsbg95 108/02/2024, 19:46
240208-yg8y7abg62 3Analysis
-
max time kernel
1804s -
max time network
1771s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
08/02/2024, 20:04
Static task
static1
Behavioral task
behavioral1
Sample
AnyDesk.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
AnyDesk.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
AnyDesk.exe
Resource
android-x64-arm64-20231215-en
General
-
Target
AnyDesk.exe
-
Size
5.0MB
-
MD5
a21768190f3b9feae33aaef660cb7a83
-
SHA1
24780657328783ef50ae0964b23288e68841a421
-
SHA256
55e4ce3fe726043070ecd7de5a74b2459ea8bed19ef2a36ce7884b2ab0863047
-
SHA512
ca6da822072cb0d3797221e578780b19c8953e4207729a002a64a00ced134059c0ed21b02572c43924e4ba3930c0e88cd2cdb309259e3d0dcfb0c282f1832d62
-
SSDEEP
98304:NzTZ3cINQscs0m++LNkT6OpwDGUUH57yvZ/49Mr8EO3QhA9Kq:Nzt3cINQscNmvLCwDkHEvZ/4R79x
Malware Config
Signatures
-
Unexpected DNS network traffic destination 31 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 9.9.9.9 Destination IP 9.9.9.9 Destination IP 9.9.9.9 Destination IP 9.9.9.9 Destination IP 9.9.9.9 Destination IP 9.9.9.9 Destination IP 9.9.9.9 Destination IP 9.9.9.9 Destination IP 9.9.9.9 Destination IP 9.9.9.9 Destination IP 9.9.9.9 Destination IP 9.9.9.9 Destination IP 9.9.9.9 Destination IP 9.9.9.9 Destination IP 9.9.9.9 Destination IP 9.9.9.9 Destination IP 9.9.9.9 Destination IP 9.9.9.9 Destination IP 9.9.9.9 Destination IP 9.9.9.9 Destination IP 9.9.9.9 Destination IP 9.9.9.9 Destination IP 9.9.9.9 Destination IP 9.9.9.9 Destination IP 9.9.9.9 Destination IP 9.9.9.9 Destination IP 9.9.9.9 Destination IP 9.9.9.9 Destination IP 9.9.9.9 Destination IP 9.9.9.9 Destination IP 9.9.9.9 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AnyDesk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString AnyDesk.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4620 AnyDesk.exe 4620 AnyDesk.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3052 AnyDesk.exe 3052 AnyDesk.exe 3052 AnyDesk.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 3052 AnyDesk.exe 3052 AnyDesk.exe 3052 AnyDesk.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2580 wrote to memory of 4620 2580 AnyDesk.exe 84 PID 2580 wrote to memory of 4620 2580 AnyDesk.exe 84 PID 2580 wrote to memory of 4620 2580 AnyDesk.exe 84 PID 2580 wrote to memory of 3052 2580 AnyDesk.exe 85 PID 2580 wrote to memory of 3052 2580 AnyDesk.exe 85 PID 2580 wrote to memory of 3052 2580 AnyDesk.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"1⤵
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe" --local-service2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4620
-
-
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe" --local-control2⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD5dfc569a31cfc4bfb2c5504bd276e5b3e
SHA15a31dd5b55c15ed191d42a25ff3447ad6ecb1b09
SHA256c8aee92b5771a3195cc8df1b1ca69d121ca2203f72cb6eef12dbf0861aac587d
SHA512d24b49bf79d608ac48194af8bcdec401620568c093c15d02526fb09096e9d7a863c9d254545e9e880301c404ada900753a97284f2d686eae6f140a024af59e88
-
Filesize
2KB
MD51269cf6f128ece84bbf349e7390c48d5
SHA14e8cf2bffd698a5961ab9752aaa1199ed56cd513
SHA25672ae732ce4876e11a2b89969f332cd30c23accfbad9dafb51a9410d59296a760
SHA512e9edeb6b77608df8764ed03d7da894061e071a598d3140d3ec8b9b91c72562805afab9e6e7c3d9ceaeac72c7501fcd69559778bd9ed6b8e172db5138364e1bb6
-
Filesize
312B
MD50c04ad1083dc5c7c45e3ee2cd344ae38
SHA1f1cf190f8ca93000e56d49732e9e827e2554c46f
SHA2566452273c017db7cbe0ffc5b109bbf3f8d3282fb91bfa3c5eabc4fb8f1fc98cb0
SHA5126c414b39bbc1f1f08446c6c6da6f6e1ceb9303bbf183ae279c872d91641ea8d67ec5e5c4e0824da3837eca73ec29fe70e92b72c09458c8ce50fa6f08791d1492
-
Filesize
424B
MD53cf83266a3112aed41ac0321a23e15e4
SHA10090444e346c475006c6c770c227f9e651354ccf
SHA256158b582f8d413625a26b6d8df573f590ac4f60781fd8a6f71e3356f5742098f1
SHA512be58cab05c84cc5321148993204c52451f67c11b7d66286d7c9b382aa2f4f1d003dc4e2d8c8ce4f87b1fdbcf7f4f42efe6ccc33bf3aad150fd63bade601dc011
-
Filesize
424B
MD5fa0bba73508f97c3d7c6ae9aa6e58223
SHA14922ef2834b04f69230e9c2c514f8a5474fcfe77
SHA25643fa1fb6dbae9d9f1c4f1ebc617414b4896dcf99b81a65a0117344d8a764cd42
SHA5120a8c0970cf07bfce6dadf39198fa5f2d8d413d31dfa64f3b7a7fa162f1fe541e9881a422caaf9d9e434ae29907318861ad4f2b2650acd98581facc5f891a54db
-
Filesize
1KB
MD5f7c652f8bcb969a7484ee9b6d9ce2c4e
SHA1db806aba2a07fd2a248479a5a3e387ae8da385f5
SHA256beac78e59999f87152573772ca0bbeee4184e12d174a886da3d7873befd7fcce
SHA51288539e5bbe1868cb631bb8fa3bc1b51d957b7bb96240184e1987f23e135875ac7590d7cf24a5634fda94a75c55ab3ea5451ad9686eab4fa896d862e39fbff497
-
Filesize
1KB
MD56ff44965e3b798b7e1d5054850d6c0d3
SHA1792fa95d12cbad8dc2cdc8d1a280d440bf50595c
SHA2562043cf8d3e381b9641848d59f7deb2a2f266c808760b883ab4d4ef96af7e4740
SHA512274ef88c036c836899e5fdaedbf0fc8cf1ae719d3a889717cfb81fe2b3da5d07f42780dfb13191922c8ab989f40e860135b530e2c296380b4acaf9fd060f32f6
-
Filesize
1KB
MD5ee91f281cb3145d23f64c29458f1af3e
SHA11026121dc6d17c352c89306219f4d6c0d85c37cd
SHA256558318d75f06a327a106e5492e91bc64964603feeaa5ada06a2ccc8baa2a98b6
SHA512a9649db92272d93884ecb0f0147d0c1b4e6e916e16d3cb46d7a09d8e3bc3e71ede4600c729bccd917ee30de2730504349521ea6d8b18c2bbef68eb6a330a9074
-
Filesize
1KB
MD5cde7615a927b0aa2796548abed28bb96
SHA1595457fe02885d6d510015b6c6b7bd1892901fa0
SHA256f37a4b963139dbdb8c81ec133902176517c13a1072eb55eed5ab3ec38e7a460c
SHA5121feb30d1b28ead05010d52ae7626bfafaa0c9675d4bfd8607f0c0c1559d99035da21625e9bf037712dfe15240ed1c3a16d289ed2b13de7735014bc54c097ecfd