Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10bin/antvms.dll
windows7-x64
1bin/antvms.dll
windows10-2004-x64
1bin/debug/AnyDesk.exe
windows7-x64
5bin/debug/AnyDesk.exe
windows10-2004-x64
5bin/debug/...in.exe
windows7-x64
10bin/debug/...in.exe
windows10-2004-x64
10bin/releas...se.exe
windows7-x64
10bin/releas...se.exe
windows10-2004-x64
10bin/traffi...or.dll
windows7-x64
1bin/traffi...or.dll
windows10-2004-x64
1bin/xfcmain.dll
windows7-x64
1bin/xfcmain.dll
windows10-2004-x64
1bin/xfcstart.dll
windows7-x64
1bin/xfcstart.dll
windows10-2004-x64
1debugger.exe
windows7-x64
10debugger.exe
windows10-2004-x64
10execution.dll
windows7-x64
1execution.dll
windows10-2004-x64
1injectprint.dll
windows10-2004-x64
3lz4.dll
windows7-x64
1lz4.dll
windows10-2004-x64
1offsets.dll
windows7-x64
1offsets.dll
windows10-2004-x64
1topware.inject.js
windows7-x64
3topware.inject.js
windows10-2004-x64
3topware.py
windows7-x64
3topware.py
windows10-2004-x64
3xxhash.dll
windows7-x64
1xxhash.dll
windows10-2004-x64
1zinl1.dll
windows7-x64
1zinl1.dll
windows10-2004-x64
1zlib1.dll
windows7-x64
1Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
07/07/2024, 03:20
Behavioral task
behavioral1
Sample
bin/antvms.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bin/antvms.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
bin/debug/AnyDesk.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
bin/debug/AnyDesk.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral5
Sample
bin/debug/debug.main.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
bin/debug/debug.main.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral7
Sample
bin/release/release.exe
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
bin/release/release.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral9
Sample
bin/trafficencryptor.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
bin/trafficencryptor.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
bin/xfcmain.dll
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
bin/xfcmain.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral13
Sample
bin/xfcstart.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
bin/xfcstart.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral15
Sample
debugger.exe
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
debugger.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral17
Sample
execution.dll
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
execution.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral19
Sample
injectprint.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral20
Sample
lz4.dll
Resource
win7-20240508-en
Behavioral task
behavioral21
Sample
lz4.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral22
Sample
offsets.dll
Resource
win7-20240704-en
Behavioral task
behavioral23
Sample
offsets.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral24
Sample
topware.inject.js
Resource
win7-20240221-en
Behavioral task
behavioral25
Sample
topware.inject.js
Resource
win10v2004-20240704-en
Behavioral task
behavioral26
Sample
topware.py
Resource
win7-20240705-en
Behavioral task
behavioral27
Sample
topware.py
Resource
win10v2004-20240704-en
Behavioral task
behavioral28
Sample
xxhash.dll
Resource
win7-20240704-en
Behavioral task
behavioral29
Sample
xxhash.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral30
Sample
zinl1.dll
Resource
win7-20240704-en
Behavioral task
behavioral31
Sample
zinl1.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral32
Sample
zlib1.dll
Resource
win7-20240705-en
General
-
Target
bin/debug/AnyDesk.exe
-
Size
5.1MB
-
MD5
aee6801792d67607f228be8cec8291f9
-
SHA1
bf6ba727ff14ca2fddf619f292d56db9d9088066
-
SHA256
1cdafbe519f60aaadb4a92e266fff709129f86f0c9ee595c45499c66092e0499
-
SHA512
09d9fc8702ab6fa4fc9323c37bc970b8a7dd180293b0dbf337de726476b0b9515a4f383fa294ba084eccf0698d1e3cb5a39d0ff9ea3ba40c8a56acafce3add4f
-
SSDEEP
98304:G5WW6KEdJxfpDVOMdq2668yIv1//nvkYCRThGXBJdicotUgwoAo5beyjF:y3vEbxfjf4Y8yofvktkLdurH5iyR
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Control Panel\International\Geo\Nation AnyDesk.exe Key value queried \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Control Panel\International\Geo\Nation AnyDesk.exe -
Loads dropped DLL 2 IoCs
pid Process 2740 AnyDesk.exe 2736 AnyDesk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AnyDesk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString AnyDesk.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2736 AnyDesk.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2740 AnyDesk.exe 2740 AnyDesk.exe 2740 AnyDesk.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2740 AnyDesk.exe 2740 AnyDesk.exe 2740 AnyDesk.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2436 wrote to memory of 2736 2436 AnyDesk.exe 30 PID 2436 wrote to memory of 2736 2436 AnyDesk.exe 30 PID 2436 wrote to memory of 2736 2436 AnyDesk.exe 30 PID 2436 wrote to memory of 2736 2436 AnyDesk.exe 30 PID 2436 wrote to memory of 2740 2436 AnyDesk.exe 31 PID 2436 wrote to memory of 2740 2436 AnyDesk.exe 31 PID 2436 wrote to memory of 2740 2436 AnyDesk.exe 31 PID 2436 wrote to memory of 2740 2436 AnyDesk.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\bin\debug\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\bin\debug\AnyDesk.exe"1⤵
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\bin\debug\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\bin\debug\AnyDesk.exe" --local-service2⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2736
-
-
C:\Users\Admin\AppData\Local\Temp\bin\debug\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\bin\debug\AnyDesk.exe" --local-control2⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD57943cff491d8ec50dce922431b3ed38b
SHA112d2f34c05ce46d6eef0dec433e0184f5d979651
SHA256aa411cb2fc39c85c8a0f6e789d3ca8ed4a85453521e4718a63ddc198d79d8625
SHA51286f8f8980a42995447f61389f917a48c5c4e1613d21de775d66b843cf12ea74ebdbc6f4e684597fa749b885370cce4ccd092f9600e7e9e881456f19c753f9dfe
-
Filesize
2KB
MD58d56874defedf514958cb37674c74915
SHA1dd22186040546e1a542e1887a0613fa7127c7f98
SHA256a5058b629d827dd54249e389fd4e3dd15c1299fc0139a3a111970d7c1e7cdf27
SHA5121b791e6eb95364a7e1e399b34ca7a7c94b5d53bac2b7d7e0f527a2dab34279aa42ae67347c25e5bb003eeac6bf2e68bff43363119052ed64c34ea45b7ddb406e
-
Filesize
2KB
MD5902f2ade8192cc590be8e94143aa3c5a
SHA1daee45176e747aedb20b3117751fd5a5f361060b
SHA256a73569da40c3cb8792eaed9f8e481f1978cd2391ef0d401d12ce7f28d663595f
SHA512d4e2b50d31c0694b49355756e2275e317639d735680e63320aeb33d4f7847a97fbd83b98db6ab8ce11533f6b4a53cb9b2946cbb4942ce598d5e760d29858adcc
-
Filesize
632B
MD5268f61b928154c4cffc1367d75a8f59e
SHA1ca46406f5d7fecd8af237d146923932abb1ffc35
SHA2568e8ddea00e16557f3c67532f3d443e938a6e92465a354aa4f69d19724197621d
SHA512ad8f33bbba60b09931c123c8104ee7ec91aa957a50755ed6ec590deddabd2fed233af80440800fc2896102b57efe567db0700f0925ff4dbdeb768716d3c80a80
-
Filesize
689B
MD5ddd54453040b4c494456d9e410cd7cb1
SHA1eed8b22b82849a32767f283386bf8653d4ca116c
SHA2569cc4fec0bf03b8e8ecc5eecd23332bd341befd4280aa2677c230cbf56acacbb7
SHA512661c3b52dd8aa95563a30d93935bd3bcc4611e010d88ca4f655c5fe5f474b717b42f6158eb131834420b1fcc01714366b42adcd7473103f6e12d063373a92861
-
Filesize
758B
MD5d74510768fb4b625f5da0282a68c440b
SHA1ed5166782d662d19076b52164ebe5a29f0e9972b
SHA256536ee353d31d48e93e9c7dfcb32db30354dc2c7de4aae3602dae967644bb8ddb
SHA5127652bb61faf39f09802576c123c456f8b6e160a2e6658ce8f7486466444b128ed33204c31de90bf4991e9e416c2f02cb1e29a7d8d3277344b9a792c026424305
-
Filesize
312B
MD50c04ad1083dc5c7c45e3ee2cd344ae38
SHA1f1cf190f8ca93000e56d49732e9e827e2554c46f
SHA2566452273c017db7cbe0ffc5b109bbf3f8d3282fb91bfa3c5eabc4fb8f1fc98cb0
SHA5126c414b39bbc1f1f08446c6c6da6f6e1ceb9303bbf183ae279c872d91641ea8d67ec5e5c4e0824da3837eca73ec29fe70e92b72c09458c8ce50fa6f08791d1492
-
Filesize
424B
MD529ac00fe39f21d673b2c6db88abfc534
SHA1bf3f0b0a9f17ada024828e2c89707a1f992766c8
SHA25622e5a618c2e4196addf9f5a0a0571319e522d168320ff0ae6fbb97c495a679c3
SHA512c5a702da8f35c841b869f63daf11dad716d7932ada1051ef39c68eb3520e0ca5ed80a9e414f2e78358f929a3a27fd4020bfcf8bc92473ea4ec7dbad50500e4fe
-
Filesize
2KB
MD5c6a23b21174f4dfe3f312976b717c891
SHA1e45cc4fe8568a588780afce1276691c36fde645d
SHA256319504e2219415db119e73c2139a6a60f745cd35185c71184798e962bd05f781
SHA51287aac477fcb861014990c29520b386fedb135f1ae64ec77b051ce5640735ca75a84db36bd410340157bf834d409fbc4e933753b7e03734fc8bdcbf1e29d8127c
-
Filesize
1KB
MD58856bb3b1b3c0ccfcbb1bc2294953a55
SHA13ba92562ba2dfff7863c6899e26c446772ed6903
SHA256580d66640c039635d8a95cf0d8ba59ee00d3a0df14a53f794f023063cb3cce58
SHA5122e5d703d740a2a13a1e952bed9564e511f7c26067276f404465f69e77a904f06edaca3ea37b6fc9c238ad0ca150eb28add575c207eee73b77e272da446bd87a1
-
Filesize
6KB
MD5ffd39a83274c0d4b45e7eda778e5f08c
SHA15a9e326fdc0f04ca43eb173a85bf432aa0ac7123
SHA256249e6d7fc800ce764a934afdb58299b9222a56baea35519904dd0c5393a1250e
SHA512f1c211c8b5c21c6d6dc7bd74b4a3e4fcfa3a49f3f3f38b2b3d4782f281b90b43944de91a68c0072787909942548fd54905a46dc2a14f88d1e23d788fbb5ba9a7
-
Filesize
6KB
MD579b475f6bef0b507c4274b5191e8f107
SHA13a2ed7f216c6660772aa42c507af86a4341c8ac3
SHA2566152dbb8833b67cbcce66d1e7f87a3814a14928f5df8a8a3368bc2c02272b0d6
SHA51216b13cb22df2f617c82f80f9c08122b5220ccbbef2c3181afeed369cfadd1d4d9e8b9147c940aa75e7087ca5cc5d4ed093485044fc32061dad3ce59050498339
-
Filesize
6KB
MD534ee38c33f1bcf86ce45336e4a4f48d3
SHA1e974e4c75c3dabcdd27f67f5629aee42c53b64a4
SHA2560ca15eedb52d359f0b469faeafbf03c0a7774f7e543aa7bcf32860e1560ce231
SHA512b2aea091547ab1f64361c7daa732b76499dc75db7a7693abcc367312992d8ca1c686591b671076e023889bc43ec378ea9e65da6e9557479839b2cdb0cffe1522
-
Filesize
1KB
MD5c98336c4e5f23c79ef85508dda1c43e1
SHA1b84851163d130c3fdfdc7f9b9eb273f57770e33a
SHA256cfa51d0853292087a8d937ea1f335573a48af728259300a917f5cf44abc3af52
SHA5125d9892f758f4b8dc915dfa57f3653348f3036740a8cb301dea30d595e8dff8707bc1fa959c098335fe68e336d8aa72e1c01820e45f8e6333d392a6fb02dd43ed
-
Filesize
6KB
MD5461c7e39dc44ba55e2aad55759c485f3
SHA11e52ae9242b2fefdb3210d114e47538e3069908f
SHA25637ac9ba5342a91d94d0976b28ed64f571522633db5e2b4c131c10803f2db0d4f
SHA512c0f1f9f508f4d38f11e752968679a07707be93d5604c2337171c2be479cf5a0aecc52963a079724beefd217caec2c8632243ad2dd297c9fbf520b4126870b9c8
-
Filesize
7KB
MD54281aadcbf0bd1c9dff811b07aabd8f2
SHA1888c73a64a2bd7985222a0209d2751f82c2bbbd4
SHA2561231ee1620b8c93661e97708ba32225d5116fabf175e8aef9a89398309a7e82b
SHA5120e0d7c97c0bf8d0c4a23d41dff6dd8c08e7c9c03706c0d02aad4a178d9d3f517ae8ee6d866d3749fb5e4f8eba61ac78d78d7de6628bd683eb7e525e625b5863d
-
Filesize
1KB
MD5532f4c6d9d34ca898c330f62fbb4fe9b
SHA11f4b652d3dc45cedd296d5082aca1466b12ef28c
SHA256de08a4bbf23425c6b46eb07aabaddf6e6bf23b2ec3875898bde197adf6caf8d2
SHA512d30d8be090bcbaa877aa411ac08c3951f6a5888741559d5924ad3cd2e2735f9d89d5cb38dd93839ae64cd4e10e684cd249936eaa6036e43e455532cc14f08000
-
Filesize
385KB
MD51ce7d5a1566c8c449d0f6772a8c27900
SHA160854185f6338e1bfc7497fd41aa44c5c00d8f85
SHA25673170761d6776c0debacfbbc61b6988cb8270a20174bf5c049768a264bb8ffaf
SHA5127e3411be8614170ae91db1626c452997dc6db663d79130872a124af982ee1d457cefba00abd7f5269adce3052403be31238aecc3934c7379d224cb792d519753