Analysis
-
max time kernel
1791s -
max time network
1798s -
platform
windows11-21h2_x64 -
resource
win11-20240419-en -
resource tags
arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system -
submitted
03-05-2024 10:36
Static task
static1
Behavioral task
behavioral1
Sample
AnyDesk.exe
Resource
win11-20240419-en
General
-
Target
AnyDesk.exe
-
Size
3.0MB
-
MD5
eb80f7bddb699784baa9fbf2941eaf4a
-
SHA1
df6abbfd20e731689f3c7d2a55f45ac83fbbc40b
-
SHA256
b9ad79eaf7a4133f95f24c3b9d976c72f34264dc5c99030f0e57992cb5621f78
-
SHA512
3a1162e9fef849cb7143dc1898d4cfcfd87eb80ced0edb321dfa096686b25ae8a9a7f3ae8f37a09724d94f96d64e08940fc23c0b931ddd8a1e70e2792cb3fe47
-
SSDEEP
98304:6aJXyQTrRGlSMoIuORmKBQielvZlpkiSti:3olMcR9BTY3WS
Malware Config
Signatures
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AnyDesk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString AnyDesk.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 544 AnyDesk.exe 544 AnyDesk.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4824 AnyDesk.exe 4824 AnyDesk.exe 4824 AnyDesk.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 4824 AnyDesk.exe 4824 AnyDesk.exe 4824 AnyDesk.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3132 wrote to memory of 544 3132 AnyDesk.exe 79 PID 3132 wrote to memory of 544 3132 AnyDesk.exe 79 PID 3132 wrote to memory of 544 3132 AnyDesk.exe 79 PID 3132 wrote to memory of 4824 3132 AnyDesk.exe 80 PID 3132 wrote to memory of 4824 3132 AnyDesk.exe 80 PID 3132 wrote to memory of 4824 3132 AnyDesk.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"1⤵
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe" --local-service2⤵
- Suspicious behavior: EnumeratesProcesses
PID:544
-
-
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe" --local-control2⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD5c4e2121430c9e8fe3cbe1a159d6ab373
SHA1a1b6c9bc0545afd6e2cd1380c49fdd05816fdd18
SHA25640d88bfe3e06724f5a222e45dd790ae70db84f06c155497274469963e25828d5
SHA512f7dbfce00f35a4d81ebefc89e971036bccf20f660f93ac5c5009a704a832e2f06efaedf0d8b13c8418c4532b2083e2ed6846fd7949ca7ff07335a883c09a3a6e
-
Filesize
2KB
MD5bf3261e81d8bdf5bc16d65bbc4749289
SHA1a34f3042d8bcc62a8e274226e742f3726dab1e0b
SHA256806b4298843d7b7f0d9e4aa0acf0f352a279e22536395d283060f8ea8d4b8c8e
SHA512bd231836e468ab0449bafda29c3d305750ed312f6b7665648e3abde36f784f10a4a5d3df192675e9e91d93506bc01a53c932bd49e48827a9365d282c9a9f11bf
-
Filesize
105B
MD59161000a40f7921c1a32841da74c3866
SHA117b056a331823b6244ffcef429c56c2ce6a087e6
SHA256af720b2a32188f3c67abad0872045c844a100146525db24b63b5e310fd6af827
SHA512bad4d0c1c47c75a18298ed3e980010c56080abb88ad064c6c93ee16127a5a0103c919c09747d34337c13904683f641ed2810fc1bd0d13dfea4d6c7d701bec285
-
Filesize
329B
MD5e41ee98f25e693d348838c9e8712c1cb
SHA1a90f34bc20c998ef3b883bafbbc4168ebbe0bdca
SHA2563d9c6b1653299c42b983edee32bebfbd4348c7e60ab080f72600ea29174428fb
SHA512ea8c8366ab0b1902b7cf76ce95482ab6957f3f98966e41c18ff4f1cd2dba894038c7ce78c9133fc5679de99093d386608c5741c4e499798082d47e469c45b04b
-
Filesize
205B
MD58de8fc89da2be4215e5dfa0c997e77f0
SHA13557df07a7d459c6506763eb69130a7e7049d6c1
SHA256dabab62439eb2686b581086c360eebd27a4d30d65b61983b37c48eac92a9e32f
SHA51255c5405a668808004841a416ee88ed9f83950d648fc5a2cbd82fa131e28ac7f15ef26878f732db5d940de6988cade4799aca0de25f49e857a0a74270317784a8