Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10bin/antvms.dll
windows7-x64
1bin/antvms.dll
windows10-2004-x64
1bin/debug/AnyDesk.exe
windows7-x64
5bin/debug/AnyDesk.exe
windows10-2004-x64
5bin/debug/...in.exe
windows7-x64
10bin/debug/...in.exe
windows10-2004-x64
10bin/releas...se.exe
windows7-x64
10bin/releas...se.exe
windows10-2004-x64
10bin/traffi...or.dll
windows7-x64
1bin/traffi...or.dll
windows10-2004-x64
1bin/xfcmain.dll
windows7-x64
1bin/xfcmain.dll
windows10-2004-x64
1bin/xfcstart.dll
windows7-x64
1bin/xfcstart.dll
windows10-2004-x64
1debugger.exe
windows7-x64
10debugger.exe
windows10-2004-x64
10execution.dll
windows7-x64
1execution.dll
windows10-2004-x64
1injectprint.dll
windows10-2004-x64
3lz4.dll
windows7-x64
1lz4.dll
windows10-2004-x64
1offsets.dll
windows7-x64
1offsets.dll
windows10-2004-x64
1topware.inject.js
windows7-x64
3topware.inject.js
windows10-2004-x64
3topware.py
windows7-x64
3topware.py
windows10-2004-x64
3xxhash.dll
windows7-x64
1xxhash.dll
windows10-2004-x64
1zinl1.dll
windows7-x64
1zinl1.dll
windows10-2004-x64
1zlib1.dll
windows7-x64
1Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
07/07/2024, 03:20
Behavioral task
behavioral1
Sample
bin/antvms.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bin/antvms.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
bin/debug/AnyDesk.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
bin/debug/AnyDesk.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral5
Sample
bin/debug/debug.main.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
bin/debug/debug.main.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral7
Sample
bin/release/release.exe
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
bin/release/release.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral9
Sample
bin/trafficencryptor.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
bin/trafficencryptor.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
bin/xfcmain.dll
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
bin/xfcmain.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral13
Sample
bin/xfcstart.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
bin/xfcstart.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral15
Sample
debugger.exe
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
debugger.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral17
Sample
execution.dll
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
execution.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral19
Sample
injectprint.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral20
Sample
lz4.dll
Resource
win7-20240508-en
Behavioral task
behavioral21
Sample
lz4.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral22
Sample
offsets.dll
Resource
win7-20240704-en
Behavioral task
behavioral23
Sample
offsets.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral24
Sample
topware.inject.js
Resource
win7-20240221-en
Behavioral task
behavioral25
Sample
topware.inject.js
Resource
win10v2004-20240704-en
Behavioral task
behavioral26
Sample
topware.py
Resource
win7-20240705-en
Behavioral task
behavioral27
Sample
topware.py
Resource
win10v2004-20240704-en
Behavioral task
behavioral28
Sample
xxhash.dll
Resource
win7-20240704-en
Behavioral task
behavioral29
Sample
xxhash.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral30
Sample
zinl1.dll
Resource
win7-20240704-en
Behavioral task
behavioral31
Sample
zinl1.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral32
Sample
zlib1.dll
Resource
win7-20240705-en
General
-
Target
bin/debug/AnyDesk.exe
-
Size
5.1MB
-
MD5
aee6801792d67607f228be8cec8291f9
-
SHA1
bf6ba727ff14ca2fddf619f292d56db9d9088066
-
SHA256
1cdafbe519f60aaadb4a92e266fff709129f86f0c9ee595c45499c66092e0499
-
SHA512
09d9fc8702ab6fa4fc9323c37bc970b8a7dd180293b0dbf337de726476b0b9515a4f383fa294ba084eccf0698d1e3cb5a39d0ff9ea3ba40c8a56acafce3add4f
-
SSDEEP
98304:G5WW6KEdJxfpDVOMdq2668yIv1//nvkYCRThGXBJdicotUgwoAo5beyjF:y3vEbxfjf4Y8yofvktkLdurH5iyR
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation AnyDesk.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation AnyDesk.exe -
Loads dropped DLL 2 IoCs
pid Process 1532 AnyDesk.exe 512 AnyDesk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AnyDesk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString AnyDesk.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 512 AnyDesk.exe 512 AnyDesk.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1532 AnyDesk.exe 1532 AnyDesk.exe 1532 AnyDesk.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1532 AnyDesk.exe 1532 AnyDesk.exe 1532 AnyDesk.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2368 wrote to memory of 512 2368 AnyDesk.exe 84 PID 2368 wrote to memory of 512 2368 AnyDesk.exe 84 PID 2368 wrote to memory of 512 2368 AnyDesk.exe 84 PID 2368 wrote to memory of 1532 2368 AnyDesk.exe 85 PID 2368 wrote to memory of 1532 2368 AnyDesk.exe 85 PID 2368 wrote to memory of 1532 2368 AnyDesk.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\bin\debug\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\bin\debug\AnyDesk.exe"1⤵
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\bin\debug\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\bin\debug\AnyDesk.exe" --local-service2⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:512
-
-
C:\Users\Admin\AppData\Local\Temp\bin\debug\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\bin\debug\AnyDesk.exe" --local-control2⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1532
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD51ce7d5a1566c8c449d0f6772a8c27900
SHA160854185f6338e1bfc7497fd41aa44c5c00d8f85
SHA25673170761d6776c0debacfbbc61b6988cb8270a20174bf5c049768a264bb8ffaf
SHA5127e3411be8614170ae91db1626c452997dc6db663d79130872a124af982ee1d457cefba00abd7f5269adce3052403be31238aecc3934c7379d224cb792d519753
-
Filesize
6KB
MD580077f4bcf916062bad6b43a29ed699a
SHA17783a5db62fef532fcff4ccf7d78dff91623e1fa
SHA256b9ca02117f6a92153d1bdd25c0bcd09b9295b9bef704962c7fe4ecb58a44a945
SHA512bed378a4eb88770fb66bad855e7aa5969da8d1c9509eb0c55aaf00925ee490d5d267c05f266a388c6396c1007125f37229dc6b0ebf13f2cde06e2d872de7a40b
-
Filesize
6KB
MD5e43f417885671250a2c26f910666edb8
SHA1b590ff807679346d2e702bae3567108a90ca2141
SHA256b725388668d74a2419e5617e7f3a15bf96a2519b5927ab9277f0fc5e1f4f3774
SHA512b596907c6202cd4184fa5e5771c24d1769a68a05c6d6232077af84ac3417dac823796142a4b6d8a60fc5f0bc6b4786f8cb387682c2a1d753c3f04937670b9d6f
-
Filesize
2KB
MD5d2d12c907eb4d7fb51cc744cdd864668
SHA1f9f7b31a44f566cdd9490590908a00e525e7e716
SHA2567bf810d0ea20be949a94df8df365f1ca67d8edc847d42614caa138c487ee23ed
SHA51237fb9cea95cffe1e039e6e6f47d0dc091a0d6d63c2efabc912d4a9a5cd196c68132f1c7db96963681c87ae6c72a514391a2eba19e2dd9347af92cda6149eb3b2
-
Filesize
2KB
MD524a69c6decb8ed236ce448db46b0ce99
SHA17ce298b114a4bebdca6c078bc09c6491bf1c6dd4
SHA256bcc1dafc56a6cf808af9f8b04da1e3218750a974a94053540ba10ee4fccff36d
SHA512e7d16585ab43ea48afadd912ed45c9a94c047c9c73ae516b4218689733421905c965b01cdabf9e28b69eb090e7c26569185ff22bc14ff147d1f7d2393a75d98a
-
Filesize
632B
MD5010a66b9281da8bd3d2c6e4bdd31418d
SHA17e9f3487cf2e9d6484b23ecaee5d1fd5a9b304d2
SHA256ae1466a33cbab404045b0964691c2ba4813a544610dcac3d63cd1638cad481bd
SHA512ed2b981652abd790fdfaa681784448dda0af140050b47fe0f1c5547ef321b7e1cecc510224e8cf303ffe5451abc453c62538e5d881a7bc5c9f4c594c7d81fed7
-
Filesize
689B
MD54d7607042570a7f0fac763d6f26a2dbe
SHA1998b32bdaba4bfe6a3d106f0ee2ddbb51b2d414d
SHA256841110af5425652c5537797e65e4015ec27ddd352157e692f8ecf64b7f0010b1
SHA51226983496bea2ab09c63c0b0b052bf8efa349d14e7a61908f4f8bb301ff0a41abc65d8236e382fa71d3b2bf3e37fa5af08903a65fbab5325abe3d9b5c1f8cbff0
-
Filesize
758B
MD5fc10a1fa9ef751d34cf315dc841257d8
SHA128c1eee55466b978374b2bc43d8ae149055e9670
SHA2560200f3d84f55bb9f8dd3848693bae7b09599ebc25a36aaedfb41f21122266d80
SHA5125afa4877167cb2394c7480b6a9036866ccd6e984745ea9a915433309c7870c939d526edc7b6d9345d40e6c70446dba58e3fc0a223f759b2d47362ec131af5704
-
Filesize
312B
MD50c04ad1083dc5c7c45e3ee2cd344ae38
SHA1f1cf190f8ca93000e56d49732e9e827e2554c46f
SHA2566452273c017db7cbe0ffc5b109bbf3f8d3282fb91bfa3c5eabc4fb8f1fc98cb0
SHA5126c414b39bbc1f1f08446c6c6da6f6e1ceb9303bbf183ae279c872d91641ea8d67ec5e5c4e0824da3837eca73ec29fe70e92b72c09458c8ce50fa6f08791d1492
-
Filesize
424B
MD5bfc53a40af6ba1e5dd6a11246c6ce903
SHA100866beba37509ee0af8e41675052fc2ba20076b
SHA25627b4aff1b80d53bb0ac3a92a4e91c50a098d48fa15a5575315b2eb06d4f61dff
SHA512bb7e5cc9b40668dd90a2fd4b96125dff71bbfea2e8aff5495c1f0269d3c9e5e990fc5a8ab4636fbbcc59e9410e7dfeeb7b635479bd35ce047d85aa6844c3a369
-
Filesize
3KB
MD5927f0981865689ae24a478b011aadeeb
SHA1f83c5bc85365e4fb990c75d859ab9fe6e5827099
SHA25697714a5414a323682248bfe4aa75b402e10ec62a56b69ec1b9a6a2a1d4e03049
SHA512e33c718d25d1ea673c46d98306ad79cebc3475b339c56e33718b8f1ad6c717b1d5d1fdb61fb0b922591ab9e1460a65feb4d2889fea375df071eb9245881cf67b
-
Filesize
3KB
MD58189c6a4ed46762df57ebd48c9190eff
SHA1e3758cd557ba3d5b8a7fba8905430933bc06dc4f
SHA2560dcf614573a948297af7c92182e760a1ec71e6f38ba66fa0b7e682cb7e42743d
SHA5120cf86a866bbf5112edf27b68393269c908d41ba854028e3e5c655368bfdfad6581db1b22d0721dc68a6cad64b2a61755e3f31cf668452b042c84fbcd03e0dc52
-
Filesize
7KB
MD5f016ab5f5fca34cf6b2d346ed1379964
SHA1a2c744a047ace4086b75fcf8c5ee07a6383c6b2b
SHA25613847b1aa174b18a6239bf4dc2f3eb1f6dd07ca0dd5a5662085704ef9b59db89
SHA51286c97539e0a609156d1566e24acc941b7fb5e1e25f23f18bfb3e11c093a7b6d94dd274520f903ea8933edd0442658f0d9330d39f12ceff86d4ebbc3e2974afef
-
Filesize
1KB
MD56af823dff4fb7aa7cc334a47ffd5c644
SHA15ca1f3d35e3a3d25f08c78c83e78857420a6174d
SHA2560c7dce5a3151afcab65dcdde67cf41fb310977f0690b637b17a42535e7a70ead
SHA51250b473b423788538369775ac67072300ee5e329051d657609704f1238c540363ecfca04b7238e303be6678a8678a88b6b661705378a504cc78b64bf7d82b15db
-
Filesize
7KB
MD5b74200a73a849816255478729bb699e5
SHA186dc15171ea8f2f95d0995b192f1ac32dd05bbbe
SHA2565fd56ea163dd1f5ca5e7c1103e670b1552d36e31ca51a70ff961cba7e1039784
SHA5122ad9a2751e5c0c6d56f4b75f5f55afc87a8b89788c6a3c87b6fabe74959c0923498da03f7aa6050a5c08943797e408ec74d4b9373669b33acb032578a06fe42a
-
Filesize
1KB
MD5c73d989fac04210d476938702ad44f4d
SHA16d7f3e9acfbeb13534e8e439c13850101a00a1c4
SHA25621be21e69f23b097500b60eef3f0e7778a608303c305058397159ede0b10b218
SHA5126b5d5ddc9562b04248eef0b61598808c4bffed2f0676272ae5e55fc23fe44754a025bc4a3f480b15d62a47c7492f7d9a96b326971f56bdc6757b600a663bb387
-
Filesize
1KB
MD5ceb6c4cf710da0fb644cd0f08f890988
SHA1ae0a0321554b2b64e98e3a0d59986b3cd4f58ea8
SHA2564780d7c492fc49d444c02c5c5920f8db72fd38f247131147fa113767d3e386fb
SHA512078bbaf08bee0e776f3a38a8e704f9e05d2e5480c5edfcb6de933750ae77b1122b4379b3c4c9d7c9dad501ea80379cd66c9363bf4c90269c8eb533f26f5e2d6c