Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-06-2024 21:40
Static task
static1
Behavioral task
behavioral1
Sample
AnyDesk.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
AnyDesk.exe
Resource
win10v2004-20240508-en
General
-
Target
AnyDesk.exe
-
Size
5.1MB
-
MD5
aee6801792d67607f228be8cec8291f9
-
SHA1
bf6ba727ff14ca2fddf619f292d56db9d9088066
-
SHA256
1cdafbe519f60aaadb4a92e266fff709129f86f0c9ee595c45499c66092e0499
-
SHA512
09d9fc8702ab6fa4fc9323c37bc970b8a7dd180293b0dbf337de726476b0b9515a4f383fa294ba084eccf0698d1e3cb5a39d0ff9ea3ba40c8a56acafce3add4f
-
SSDEEP
98304:G5WW6KEdJxfpDVOMdq2668yIv1//nvkYCRThGXBJdicotUgwoAo5beyjF:y3vEbxfjf4Y8yofvktkLdurH5iyR
Malware Config
Signatures
-
Unexpected DNS network traffic destination 3 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 9.9.9.9 Destination IP 9.9.9.9 Destination IP 9.9.9.9 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
AnyDesk.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AnyDesk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString AnyDesk.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AnyDesk.exepid process 2420 AnyDesk.exe 2420 AnyDesk.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
AnyDesk.exepid process 4560 AnyDesk.exe 4560 AnyDesk.exe 4560 AnyDesk.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
AnyDesk.exepid process 4560 AnyDesk.exe 4560 AnyDesk.exe 4560 AnyDesk.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
AnyDesk.exedescription pid process target process PID 2524 wrote to memory of 2420 2524 AnyDesk.exe AnyDesk.exe PID 2524 wrote to memory of 2420 2524 AnyDesk.exe AnyDesk.exe PID 2524 wrote to memory of 2420 2524 AnyDesk.exe AnyDesk.exe PID 2524 wrote to memory of 4560 2524 AnyDesk.exe AnyDesk.exe PID 2524 wrote to memory of 4560 2524 AnyDesk.exe AnyDesk.exe PID 2524 wrote to memory of 4560 2524 AnyDesk.exe AnyDesk.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"1⤵
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe" --local-service2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2420
-
-
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe" --local-control2⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5b026fc67a20ad23fa084314e67979b57
SHA1d6282fb53e457ac6fde7b6ee03d0102bec0c3040
SHA256dc1b5521f67b409778fec49ae8c527e5a3cafff6d438700637e41e02ad1de836
SHA5121f4e14443a49d83188b9240ba09ab9589695ce2b4a364f3c64912601ffe2c8d11ae23c4bfee7d630de661069c5707d77edc4e44a65f7a7320fb505365c86e5cf
-
Filesize
9KB
MD502046e96794dba8c037e23812f9a08c4
SHA1844da5fac33ec4dba7aeb14f27cb7cf824545f2c
SHA256a8e1afda35fadcea0a8daea9d94b9c7a6e45b820feeb52323e0dee305ed58a3e
SHA512841e137ddc392b5bd88333776af7de669bd650b4168477dbbbdf4d44c5103da454a8b81784b3176babbd41e48b8d1ce3393e7ed7b66aa39ca392e07f941b6f5a
-
Filesize
2KB
MD59164f347418e07c675913cc1acc29358
SHA1c329be8d4d09c368f2b522173ecf8ed8c2ff9371
SHA2560879eced8231147024ae4c33fb57d75973f448add9f06e5b566aa16f805dd4d7
SHA51248c0f0bb9d29dbf8474c6c3980ba9fe2b9332a8609f4f66036d5da91e5477df0de7c1182ab12154769762f8864c80370d5f103dc9fa4ea36b3466f25294aefeb
-
Filesize
424B
MD5c7b5edb1cdb904be5cb2c75700fa71db
SHA1dcfd85e24df1345528c06543a8a9bbd50480bfa9
SHA2561c2d79229d620ca7c3372b3e9c58a54f4995a3e9eec7d0a2bef5fd05cbbdee22
SHA51298d0566971ae512a1688755c5d32cfe40d738e74e4413709ae7fbe6b553ed0a219f2269bef69a6780d8164477d31629e4ae46e83caed669edb4d9943990242d9
-
Filesize
424B
MD512379fedff86c362db0243333ff449d8
SHA16bac5c9c92e243cd280f59f2e22f67d4c0695ad6
SHA256d4d7bdca0bbe6597db5e413b2d16f643888ec7f7b13ee64ca5c9bcd175b2358e
SHA51206f9734aa3cde5e02da050cda1cdbfff9c93c2de87763418959d99aed51d4639e2cd7565e0414d9465012916d4220ba8402269be0ce6786b396bdd6a014ac0b2
-
Filesize
1KB
MD5d199b92b309792c895a8daeaecff72e4
SHA1afa3a4774c289831d202e3eadd579293dc7bc3a2
SHA25648f6cde4c036202e967780d255f8e15418574391c450cf8eb3aeb467c7f47458
SHA5124203f6e7f24228f06d784cf94d3b6ca7029bdd7753f69f2a47e7a1418fc7263b1a5dfb53c2a2338493db77293acaa8981ca230bf0fadc7c9897895b630805b53
-
Filesize
1KB
MD570d6061122e2ac2c5b4ad1d85f389d97
SHA1746caff38df835eff805848508edc496b23b090f
SHA256bf3cf6e85df2b44920e83cab8a065d25e64054f65295fff22fe7c1451f6fce48
SHA5124f115fe4f5bdba5b072bf070f3f9208fe22c2f2f1fc558ee679c7f38127d24ca4028c642c0e9c9942ce9fabf58e5e592383cefd08bcf0d02ab403927c4af8142
-
Filesize
1KB
MD516692e22b09b103956a023ce06a53de5
SHA1df457e9e08b96500722df548015a7d71adfe055d
SHA25669c9866c250b53441c8bf9ede987da6fd9c6fd2efe2bd7b10d1d635ee60566b5
SHA512c9b3cc457af067e2f085d90cc0ea67b85737a2fe4662944abe015e4df39afa50d815d97461bc7b7d698bc05a4b96cbf2724301dc8b09da5ce0baf68e932b8781