Analysis
-
max time kernel
594s -
max time network
597s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
01-04-2024 06:25
Static task
static1
Behavioral task
behavioral1
Sample
AnyDesk.exe
Resource
win10v2004-20240226-en
General
-
Target
AnyDesk.exe
-
Size
3.0MB
-
MD5
eb80f7bddb699784baa9fbf2941eaf4a
-
SHA1
df6abbfd20e731689f3c7d2a55f45ac83fbbc40b
-
SHA256
b9ad79eaf7a4133f95f24c3b9d976c72f34264dc5c99030f0e57992cb5621f78
-
SHA512
3a1162e9fef849cb7143dc1898d4cfcfd87eb80ced0edb321dfa096686b25ae8a9a7f3ae8f37a09724d94f96d64e08940fc23c0b931ddd8a1e70e2792cb3fe47
-
SSDEEP
98304:6aJXyQTrRGlSMoIuORmKBQielvZlpkiSti:3olMcR9BTY3WS
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AnyDesk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString AnyDesk.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2848 AnyDesk.exe 2848 AnyDesk.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1028 AnyDesk.exe 1028 AnyDesk.exe 1028 AnyDesk.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1028 AnyDesk.exe 1028 AnyDesk.exe 1028 AnyDesk.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4460 wrote to memory of 2848 4460 AnyDesk.exe 87 PID 4460 wrote to memory of 2848 4460 AnyDesk.exe 87 PID 4460 wrote to memory of 2848 4460 AnyDesk.exe 87 PID 4460 wrote to memory of 1028 4460 AnyDesk.exe 88 PID 4460 wrote to memory of 1028 4460 AnyDesk.exe 88 PID 4460 wrote to memory of 1028 4460 AnyDesk.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"1⤵
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe" --local-service2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2848
-
-
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe" --local-control2⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD58e554d0b6e88b1433b55000a99ce4b1e
SHA165a7800594ae1d5c86e76e69379e00cf47c85701
SHA2564f7e00f6d79a695c4243c3286709b87ffeaa1a28c159d0513d81771274f8ff00
SHA5121ac30410611309eb2c5e54fce2e77b6ba019c81e0c6230f82ad43cecaa1737c4ad0d50c712e3b2652b83e5603e919dd0513d13811e340a361245313fbcc638f1
-
Filesize
7KB
MD52c11ea31b51a7801ce5d846f72245805
SHA121f6baf176c7d570b310879491c2b71eb331dfce
SHA256b057f2e978137dbff8cb8ab20bd92cea7115a87e73bb0133451dcb67ca8c0275
SHA5127e160abf617e115a511d4b2b0bdd3a0494b34524fa7e562b11af692b41571649a9c2ddf42e3672894e515063cd45824eabe1ad2e18cf8e153de4b942cab6d878
-
Filesize
2KB
MD5d38ad65cc4c3ffeb06cbdf2a1271e865
SHA1429c74db0f59ccdf25b79fea3aa5e05d585c78dd
SHA256669327c452dc3dfedc0e9f2a643bb04c0085ae886f24465f3acb108797b9da04
SHA51273cb7a207f31a00bcbf1704af2a41375e1bd0c422de2221b83caa1f75b2478db99f25ba94360082ee9f15d929075b65e8db538f5f261f8b42346aa20f07a92e0
-
Filesize
105B
MD58e4db78f6c12fb6f91323aaf49d80174
SHA18d0449194219c563cf5e483d337ee97a24aed24e
SHA25696b10109276f22716c28ba9f2460804a36a7c3631d0825fa80a132edf3feafe5
SHA5128a26a6e8c946b398d3a6c8fe1b794123df06c76c6f79d2977062305e519cbc2cd7ae91dfdb918d8f2549e8cb5e5e5ae7f44e9b32a0d58c2f74b6fb151305ef90
-
Filesize
330B
MD5c71ee7e3fc27cf4806572b57a21747e6
SHA1e23c4415c66076f39d50b40f3c000bb0bdcb932c
SHA2567b998c63000550231edc241c10985ec454226bebeb19b434349ba93834a60da4
SHA512627fba90a7477cf9597291299d1fe96c07b94537e7c33482555faf7cc59f22af0bf59f1911de84e258fccb3151bbb1b6c4b6bcc6e5d7ff191f76bf0061c4a5ea
-
Filesize
107B
MD5f25e48e1d9e1e1398bc5fbc6885570b8
SHA146557c8ebb9236af6c28c9bdd317d1d25749e710
SHA2560379e6a5dff30a991e0acdb9932cac828eb3e30ca8cc23447a2bc73ae78181db
SHA51241e61480f5141b6950d7b96f3e4dfcca19bc480e0b11eeebdedaeb266c6e525f41f3d29a3c1c0bf8f17a3c30111d8fba7e269d5fcf84b336bee916e21881acb7
-
Filesize
205B
MD559352c2b0c590c5fd96365d3168d723b
SHA153ab571639cc3e3a38032c1095985f7f4278d8fc
SHA256079db0d18cb8ca55e8653f3d67608c5e445d32e368feb874ed3fa1d797c7c286
SHA5122d21bcd26ef934095ca5b37aa1e66091547870f5e09c2d203dfd75923d2575f93f1a42f31e4fb7b2423b766984464ed65b048f49519837918de246a892c82828