Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows11-21h2_x64 -
resource
win11-20240611-en -
resource tags
arch:x64arch:x86image:win11-20240611-enlocale:en-usos:windows11-21h2-x64system -
submitted
29-06-2024 22:45
Static task
static1
Behavioral task
behavioral1
Sample
AnyDesk.exe
Resource
win11-20240611-en
General
-
Target
AnyDesk.exe
-
Size
5.1MB
-
MD5
aee6801792d67607f228be8cec8291f9
-
SHA1
bf6ba727ff14ca2fddf619f292d56db9d9088066
-
SHA256
1cdafbe519f60aaadb4a92e266fff709129f86f0c9ee595c45499c66092e0499
-
SHA512
09d9fc8702ab6fa4fc9323c37bc970b8a7dd180293b0dbf337de726476b0b9515a4f383fa294ba084eccf0698d1e3cb5a39d0ff9ea3ba40c8a56acafce3add4f
-
SSDEEP
98304:G5WW6KEdJxfpDVOMdq2668yIv1//nvkYCRThGXBJdicotUgwoAo5beyjF:y3vEbxfjf4Y8yofvktkLdurH5iyR
Malware Config
Signatures
-
Drops file in System32 directory 15 IoCs
Processes:
AnyDesk.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_wide_alternate.db AnyDesk.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_768.db AnyDesk.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_48.db AnyDesk.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_96.db AnyDesk.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_256.db AnyDesk.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_wide.db AnyDesk.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_32.db AnyDesk.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_1280.db AnyDesk.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_2560.db AnyDesk.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_sr.db AnyDesk.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_custom_stream.db AnyDesk.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.db AnyDesk.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_1920.db AnyDesk.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_exif.db AnyDesk.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\iconcache_16.db AnyDesk.exe -
Drops file in Windows directory 4 IoCs
Processes:
UserOOBEBroker.exedescription ioc process File opened for modification C:\Windows\Panther\UnattendGC\setupact.log UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml UserOOBEBroker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
AnyDesk.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AnyDesk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString AnyDesk.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
AnyDesk.exepid process 4208 AnyDesk.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
AnyDesk.exeAnyDesk.exepid process 3104 AnyDesk.exe 3104 AnyDesk.exe 3104 AnyDesk.exe 3104 AnyDesk.exe 3104 AnyDesk.exe 3104 AnyDesk.exe 1988 AnyDesk.exe 1988 AnyDesk.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
AnyDesk.exeAUDIODG.EXEdescription pid process Token: SeDebugPrivilege 3104 AnyDesk.exe Token: 33 2280 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2280 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 10 IoCs
Processes:
AnyDesk.exepid process 4208 AnyDesk.exe 4208 AnyDesk.exe 4208 AnyDesk.exe 4208 AnyDesk.exe 4208 AnyDesk.exe 4208 AnyDesk.exe 4208 AnyDesk.exe 4208 AnyDesk.exe 4208 AnyDesk.exe 4208 AnyDesk.exe -
Suspicious use of SendNotifyMessage 10 IoCs
Processes:
AnyDesk.exepid process 4208 AnyDesk.exe 4208 AnyDesk.exe 4208 AnyDesk.exe 4208 AnyDesk.exe 4208 AnyDesk.exe 4208 AnyDesk.exe 4208 AnyDesk.exe 4208 AnyDesk.exe 4208 AnyDesk.exe 4208 AnyDesk.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AnyDesk.exepid process 2832 AnyDesk.exe 2832 AnyDesk.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
AnyDesk.exedescription pid process target process PID 1988 wrote to memory of 3104 1988 AnyDesk.exe AnyDesk.exe PID 1988 wrote to memory of 3104 1988 AnyDesk.exe AnyDesk.exe PID 1988 wrote to memory of 3104 1988 AnyDesk.exe AnyDesk.exe PID 1988 wrote to memory of 4208 1988 AnyDesk.exe AnyDesk.exe PID 1988 wrote to memory of 4208 1988 AnyDesk.exe AnyDesk.exe PID 1988 wrote to memory of 4208 1988 AnyDesk.exe AnyDesk.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"1⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe" --local-service2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3104 -
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe" --backend3⤵
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:2832
-
-
-
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe" --local-control2⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4208
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004D0 0x00000000000004C01⤵
- Suspicious use of AdjustPrivilegeToken
PID:2280
-
C:\Windows\System32\DataExchangeHost.exeC:\Windows\System32\DataExchangeHost.exe -Embedding1⤵PID:3744
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:1496
-
C:\Windows\System32\oobe\UserOOBEBroker.exeC:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding1⤵
- Drops file in Windows directory
PID:2492
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exeC:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding1⤵PID:816
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD51ce7d5a1566c8c449d0f6772a8c27900
SHA160854185f6338e1bfc7497fd41aa44c5c00d8f85
SHA25673170761d6776c0debacfbbc61b6988cb8270a20174bf5c049768a264bb8ffaf
SHA5127e3411be8614170ae91db1626c452997dc6db663d79130872a124af982ee1d457cefba00abd7f5269adce3052403be31238aecc3934c7379d224cb792d519753
-
Filesize
5KB
MD50690bd3abaacb32c8b605eb2e5f05a62
SHA12a637b6059d302fd0898a5e0c3b8001fcbc5468d
SHA25651cc76f71c72768e4439ac277685a23dbf897a92f28e4a55fab28f7b0566b86b
SHA512aabd4a01c764471e2019d80a27aba3ecf33b994f98ea05c9c02ff944c4f41a303e637d319f260797454954603ea85d7f487a86739f52ece4fb49622faed984af
-
Filesize
9KB
MD53cc5ca8b631bdb493f53475cc297cbdd
SHA1a5aaa69ae3191a8af9303c512aeedbf8028695d1
SHA25675026da54e886f4e6cb2b428123085f871f149649b257d19c87e4c2880169bca
SHA5123c6fa56ec5ffb029ef2e135b6dc707f6b31b66d7e40a1869c74300e9f67082825a40922be39a54b00451c2fe429931df8fea294fcc95fbffa5b1b8e0fb65199d
-
Filesize
37KB
MD59b804e6617b0d1cc1fa5827173f1be3a
SHA1b6675f14ea10fab7cf14668ba133917b9a9c31c5
SHA256150c7535c11a1e557da7315db7ce906fe2c56c5fb7e277676ef0de2a491b6e46
SHA5120795586c5a03ac2a1c906f68a1d3e6dae82c007bc1bfc3e008320e8ff93b2d859399e2aa993f267c22bc7868c04d2cb013cb84a6c470f15a1429f54ce91685d9
-
Filesize
2KB
MD5f3047b4bbc7645cff1569096b7346a58
SHA1ec8d11d726e0b3dd1406d9bb317a2999f24b3079
SHA2562ca8033edca3c2744caf86cba0e112ea95f87bd50da88adfcd8cc431ddc6abc7
SHA512e9508e953a4a81df4c84b3f19f739b2dacaec4ed54c7b689e93962c0145860060fde9e8d7704791e063dcf59c08c98074e97e880f1dfe553062938ef0645008c
-
Filesize
2KB
MD5c2711a8c05417a64b66d55ba5526991f
SHA1c1b462d488ef976fd6c00a72df8091c48fd39826
SHA256527c67c564d738b41167bf687c3b60af76a903d72b3fb91d696e0790c6b70b9e
SHA51222bde842d500462b8e38e97664e9c8f394fb7d258d719aa9f3c59bc3d6c16848ead86324bfdbdafca1fea38a05d151c8c48610e77ac650622d3c0c058f4545fd
-
Filesize
701B
MD5f96bdbeaaf9cea2a96bd6b77c3e0768f
SHA116c39da9ac40a22519040f9ba02633b3daa70f8d
SHA256dbe063a7332a4e90b3c87f933374ab39d1c345f9fd667ee6df48cb43e4e3bc72
SHA5122152b71e8ac9bf2d07f728d6a2076350370b86bbe12a7f24e35f4194db05f0e6e426ef0ee45ce655ed4256894f607cd0c8b98b7f6df2a87ea350ad5e039ac8fe
-
Filesize
758B
MD596c0678b386b258ec749e08a54e775c4
SHA1496c08c5691317cdae427374f7dd0222360dbdd6
SHA2565e77c678bee896600a3e4ec05defd2332275e198843776ec9e2fe2f4cd3ff3cc
SHA51210b15964575eab49f9d8e71aaa05cb98dc49d895c96e5dedc2e16afa779e8fb926748c0fcb9c378cde7647181948c0c45ab5751275c59937b07aa11a8682f804
-
Filesize
312B
MD50c04ad1083dc5c7c45e3ee2cd344ae38
SHA1f1cf190f8ca93000e56d49732e9e827e2554c46f
SHA2566452273c017db7cbe0ffc5b109bbf3f8d3282fb91bfa3c5eabc4fb8f1fc98cb0
SHA5126c414b39bbc1f1f08446c6c6da6f6e1ceb9303bbf183ae279c872d91641ea8d67ec5e5c4e0824da3837eca73ec29fe70e92b72c09458c8ce50fa6f08791d1492
-
Filesize
424B
MD506c5291dc181e8382f4d38648d2620bc
SHA1a29c6dd8c09ce63a3a8924da019882544389f033
SHA256a7c3a6b6136af54cc157d343e4d76f3eb9ad50c542cf89d11e6d067caa989142
SHA512fdfa0629d4ed8160cb0222459707b77abef74cc7ae7f012ac5bdae406340f143e531a01e62cc44d01ff8fe46df47803f47ba13b453f370a510d95fdd485e5556
-
Filesize
2KB
MD5a4f1a2763f4827b2e8f687e28b0b808d
SHA196a4d7a07f2462d8cdbc4a563c92bae1b1202afa
SHA2565b79b0bcb297c011781596dabf78e09ab37026e186e304352100e66914d47fb8
SHA512c94de4041cfc6b1c9fc80e560510ecd050b3959cfa30d1d6437e0b92f0460d49d7059ba5b7a772c02ccf5eb79f09fda93c6cdc11e3d336ebbb8862acf8556562
-
Filesize
2KB
MD54783a0c1775185bb98b6da744910f884
SHA121210b987d91079c8a8a0f5563e1f5c3b38a61bd
SHA2563bf142943878096014c7beaa7b17b18bb7aad463060eb780ef54a66947f1db8d
SHA512477266504cb7aaf8d216d15bd128b84110e80aa4a76ffa681ebeee65f47df5ccabb44acb8d3226e2888baa63680129d8bfde185b3bb2fbb0fdaeb3b7bb722188
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
3KB
MD548c823ac9928c07ef95a6ed762132efe
SHA174b3483f958d71c502962b16deb7cde4585f85ff
SHA2569675aca4ae3772cf746e730a94d05ab0cfe96cb2f965fbdfe87936482c5c0cc9
SHA5124ea3ce56c6bbba44049e2caeae4c13544dc19306ca65fa41c2d3f262c7a0dd7b4db7efbc3676545fd8ea7ad5fd37674b41a67e5f13827807057e88f4e8fc28d5
-
Filesize
1KB
MD5e1a56e451c3006d07c915256de11f5b8
SHA17335ae12c97135a83489e49a3b261e1e262e13cc
SHA2562e41437a59ab9b4cd4b594ff6e1119d39e65a1eda04a031dd8af5d71061c35ad
SHA512279dc67c68cd591d1945efb21a3ec5b8438cb763aeb418d8044a03e2a012897e027de06ed0b399cf7355dbb8c433b04728c7343aa5ca4da6ba3d3018805a8743
-
Filesize
3KB
MD5006de6325ca558f466f1b86678f329ce
SHA18b8dfad51c1cae1d67af3a0f8e667a4af1f307e9
SHA25643b55faa94a6b01fced0283ea7b15fa1c80b4d88a2bd0d97b99afddb3bf294c1
SHA51242bec8246dfd9f8f1164e00916cf81301412d7e7dc2e168c0d107cc386944d9dcd61efbfb709b4d774c240ef14ec9c58688f35e39a4a208ad805d7a48fdbed3c
-
Filesize
6KB
MD5ca111fc8590a12e43896917b905d7ed0
SHA160077eccf04ee13f6ec86d10229b77aadfe7ea27
SHA2565fde9fa354d90a16a0430422d0adab8148a3f4459ea970ab71316e76dc6176ab
SHA512d010dc163c616b22f8df2c69e2ebf298849013a26d9ba386e0e4ebd4f32ac3d6321eeff59e8db2574e91e109fe498e995228b163d8da5d3f4059763df9787f81
-
Filesize
6KB
MD55b1f82e9bbb0e83d040e5a54b0dac514
SHA1a4e52d975f4ff6ca010e8864bbfc39b58663d71d
SHA25697faafdff3c91f71dbd9077682bc64ca97fef2c603e368adfd8806a05aae9142
SHA51215adaa5736f1c47b84dee8606ef89d755c78ab5d79ce92b1e524fa7f558bdd2af5695e0cc3ee32e9a1a6395e5ee6e65425f6c80cf3af1fa914fa9e464e5f4d96
-
Filesize
6KB
MD5209f5e2800a5e53e609741b358d658be
SHA1ece36760971ab166253a1434301bb054899eebf6
SHA2565a055df03610e1546343d24d28d6d92dc7f407054930d49a592d33e381342c58
SHA5125460912c5f055a7188b63e44579d0e3f466f0d1cfbf8c426c3cc3752147bf9a2d56ec5c9eabf43b9bb5df76493e6cafe924be1544a3e7253b7ec37a4aa26fad6
-
Filesize
7KB
MD5b81634e1a5b3d80e0bd7ef5107467366
SHA1bbafe0e1e975ae26a26a4ef8e0c26f6ae3d30a09
SHA256d0e471b7e640f6cc763f74a95666f5d5260add9a5840ed9cbefb2227bbae867b
SHA5124586f6326be7d22c517ab616c17a1ef0203bf3b25cc19f59c3c09ca60d3476e8fa075981325560a417fd78681f467d6774db821208cc6d22746b9f4efaf74115
-
Filesize
1KB
MD56cd40453304b0b79d37646cfcf57c43a
SHA1d39386ecceae86ee9e853118b1b30e8fa472a9e6
SHA2561c2e22ae47b2e15b0f9f12b6cc15e2a3344ac2248f9d5367f6e2bebebecc3125
SHA5127bf6aea4b4b8f13555df755add01cd64cbc5b1715ee40de0416702f5b2be26e8c9b48a98383fec256d10f8ec3434743fdc2acdf40117b5e1eb771d8d8314b462
-
Filesize
7KB
MD5789dba68797273535ceac46c35cae401
SHA1fe2a3da4451c75a5b1cee121ac540234cd9ea3f7
SHA256a323c4ea341e4351768622b20c2575f0757e7fa280367f837276c71571ce14a1
SHA5129780b917aade220d9412464e452c0aaf8599ed53729d11bb94dcbd2170390c253cb47b72d2bc2229c2b0a78365b9ac503aaebbd7f890382cdd7c1eeffa910004
-
Filesize
7KB
MD57bcf6607483210c9d472a15e8d350ede
SHA17308608ef023ed710e9890abe184abb7c0620c74
SHA25631fee0428cbf6c0f3321ca62278398310ee9f5b6f62f2bb238e0250e34bf8b43
SHA512a095718faca1fc93bf61d370c5a3c8b0f163c474c06a81e62d5be79a5d198fe91c5410d309f97a8f39ecac5320777f88327409c72e97eeca82300fec186dbee0
-
Filesize
7KB
MD570ddb47999c303a74a98a72d64834048
SHA1ad382368cd1f04730af5d65cd5831b54701f67b6
SHA256071444071359354234d014872287ff406deb909dd698a8918964b6b60c310ee8
SHA5125d345b6cf3fbfa32b2549be549fed58d6063fe9ba23be9deb3daeea8243cf52fab4a73c74c928c910e5361a557d8b5786ec27f6846d978f0a1a0d33d72414824
-
Filesize
7KB
MD5f13a17f27efceacf8dd07ad0b84e58e8
SHA1a391609f7b3619b874af0cb33b0438313ab2935d
SHA2564b1d123abe40b22c2af21c6ecc277f29c4d433a6b6757fa1d45aadd860061e2d
SHA5120e96dfa73e880d43df8babd37aeee63f1ee5d21b100fa672a9e6fab98eb370e66730670bf8dd078f1b0206407582d24154f79cdc6d7ac3c691562364e51fc09a
-
Filesize
1KB
MD5c65ba40d4bcbcebd3c56ffb4d1e56a91
SHA1461619ff77888be8e72eb0926630b80ebe52bce4
SHA256a97b28ef0e7cc63506b06fd4e03115da2890d546bb0eab8852d2bcaffce5b75e
SHA512489a7df174b7e78bfb85601df9566f9c4e7874395b680ae6b76f3b3946581ccc7975213e03e458476aa3b347993c1331091691a0fa70ab12dc5321e9170ae16b
-
Filesize
1KB
MD52fc997493c41272f2f88ed25aa67bb50
SHA122dc96981b6ebf36eb2e1eb8a92405c18859b0d8
SHA256eaa4a37272c84fda94dda0dce242c66ae1c657bfdb9ab319ce47c53cbd38f54a
SHA512e582377d71fe07e73d14523bc5c9366a6bf5fffb596e852b5221e14b7b4d7af7c941bce9de3a36bb081a9c267e532c01cddbd0d9cb266f1ace8741afe036ad5c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\75fdacd8330bac18.customDestinations-ms
Filesize3KB
MD5c3f468bd3c1f3b70b7fb3aa5535c6bf8
SHA1ec7b0d0e8cf33c3c81d65bbfba1b69aede30730a
SHA25698675a1baefc3ed3f1fae4c3a95196dfa7f2bb0347899a59795b9672646acf3b
SHA51214fca57575eda3881a67c0dac2f7e8837acd0cf724122eab4971de996daca4a338e99809f01177f605452a3dfe5db372afe1ea39ffb94c6a3393d9cb2a5c9119
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\75fdacd8330bac18.customDestinations-ms
Filesize3KB
MD5c01cabeef4558fa8055cba07cc489fe0
SHA1db8cb1f1636f2c57425ab61471cd47e47671f7f4
SHA2564e081d660f2add291cc4a7d8da30121b2991fce82d02432cf30441787cc7934f
SHA512025961c63d6505ddcfb8c4d9d57ba92402bd13d233e5534d6a84c1bc44732cdc9709d745a97634a690b596fbb46b3cbc4490f7a4665aa302345d0a6e115e2cd3