Analysis
-
max time kernel
136s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
25-04-2024 03:20
Static task
static1
Behavioral task
behavioral1
Sample
AnyDesk_1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
AnyDesk_1.exe
Resource
win10v2004-20240412-en
General
-
Target
AnyDesk_1.exe
-
Size
1.8MB
-
MD5
636b9c40cd21065c8a41407c2ae872d0
-
SHA1
41a82e824469e4482224f4f68be1aef28aa9f0ca
-
SHA256
97038aeac9ceb8d105fd3c396d624b207cb6aa55383c71decb1a9818dbe28fda
-
SHA512
dcc2933e7ede15602a17ac41fa12fc2e7a6163c805864985f4751f8e5ef00784c533c005f04f000a0cd6f280410189b2104968aa8cc22344fd5d0a6588cccbeb
-
SSDEEP
49152:udPsn6zl4avm36mtiZhKFJbbLg0QDssbGKKlMJ:udFs6Pd0QDsqKG
Malware Config
Signatures
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
Processes:
AnyDesk_1.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions AnyDesk_1.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
Processes:
AnyDesk_1.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\VMware, Inc.\VMware Tools AnyDesk_1.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
AnyDesk_1.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion AnyDesk_1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion AnyDesk_1.exe -
Loads dropped DLL 1 IoCs
Processes:
AnyDesk_1.exepid process 2892 AnyDesk_1.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
AnyDesk_1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum AnyDesk_1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 AnyDesk_1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AnyDesk_1.exedescription pid process Token: SeDebugPrivilege 2892 AnyDesk_1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\AnyDesk_1.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk_1.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of AdjustPrivilegeToken
PID:2892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112KB
MD52f1a50031dcf5c87d92e8b2491fdcea6
SHA171e2aaa2d1bb7dbe32a00e1d01d744830ecce08f
SHA25647578a37901c82f66e4dba47acd5c3cab6d09c9911d16f5ad0413275342147ed
SHA5121c66dbe1320c1a84023bdf77686a2a7ab79a3e86ba5a4ea2cda9a37f8a916137d5cfec30b28ceae181355f6f279270465ef63ae90b7e8dcd4c1a8198a7fd36a8