Analysis

  • max time kernel
    143s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    05-09-2024 08:33

General

  • Target

    AnyDesk.exe

  • Size

    5.2MB

  • MD5

    17069fd6aafd857bf9ded67a6db7708a

  • SHA1

    32dd5d10187b4428970c52f0d74004edcca4d269

  • SHA256

    9628c360c683c89c70f74c8f55c46fece6f7375932f107bc0137ae1f7257d41c

  • SHA512

    a0295703dd030c8f87424aa4aef063c9f63e70983de5334e4ba9739facaa6f5920ce90b70d4207e67cd149428cdf145284aadae32783295bb6e3fdb3014d8851

  • SSDEEP

    98304:nLbb4p55b6I8ajCR+V1H06rt7yUEt0wpqy258hTGLxuya1AkycZWW3b3cmDk02Ex:nLbM5UIAQx06Z7ct1qN5SGLxuAkycZ9p

Malware Config

Signatures

  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 16 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1192
      • C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe
        "C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"
        2⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Modifies system certificate store
        • Suspicious use of WriteProcessMemory
        PID:2448
        • C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe
          C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1736
        • C:\Users\Admin\AppData\Local\Temp\AnyDeskAnquan.exe
          "C:\Users\Admin\AppData\Local\Temp\AnyDeskAnquan.exe" "C:\Users\Admin\AppData\Local\Temp\config.ini"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:680
        • C:\Users\Admin\AppData\Local\Temp\AnyDeskAnquan.exe
          "C:\Users\Admin\AppData\Local\Temp\AnyDeskAnquan.exe" "C:\Users\Admin\AppData\Local\Temp\ADK_config.ini"
          3⤵
          • Suspicious use of NtCreateUserProcessOtherParentProcess
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:400
      • C:\Windows\SysWOW64\dialer.exe
        "C:\Windows\system32\dialer.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:544
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {0BFBB016-E127-4286-AF8A-9315BE32B2A3} S-1-5-21-1506706701-1246725540-2219210854-1000:MUYDDIIS\Admin:Interactive:[1]
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:2880
      • C:\Users\Admin\AppData\Local\Temp\AnyDeskAnquan.exe
        C:\Users\Admin\AppData\Local\Temp\AnyDeskAnquan.exe "C:\Users\Admin\AppData\Local\Temp\config.ini"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2524

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\ADK_config.ini

      Filesize

      636KB

      MD5

      cbfe27aa3e60624788de23628081df65

      SHA1

      0808539331da7149306a271d635880d179bc8006

      SHA256

      5e7dbe94e2c7a813e98ccd2128c08448c578c3452feba2db583b4e5570c1f0fa

      SHA512

      f27359c45935a06738f3f4581507e19e5f2e2e7b1b89c3260e8922437cb7052a1696ceb5b9b55204c7a2a5d9ca44c6257a3f43c87d222cfeab79ac7002601926

    • C:\Users\Admin\AppData\Local\Temp\config.ini

      Filesize

      910KB

      MD5

      ae2bb0a84eb09656a88e6e1d4737f25f

      SHA1

      cb658ac4932c196edafe21830d138a9184a02e24

      SHA256

      07f268e382051fe80098180d9d9464d244a5b95bc3bdd68c81b032f40aa9cf18

      SHA512

      1c9d495f6ba687fadd98946e5834b1536a0a7836d5d9fb71153c9ab2b8a75ada55a3ea9dee5f86e5ed7577752cc9579f2fbee6ff44cd55a5bde8423f120404d4

    • C:\Users\Admin\AppData\Local\Temp\lua5.1.dll

      Filesize

      164KB

      MD5

      24a0d2ef5b931a2a13341a2503b1de80

      SHA1

      6201347d1ded92d365126a1225768e11c33ee818

      SHA256

      fbbe7ee073d0290ac13c98b92a8405ea04dcc6837b4144889885dd70679e933f

      SHA512

      5e06f88bb3920cef40a4941efb3b4d3012edf868cc3042f9dbc1989c76b410b4e2da12c20ae2fbcffe5525b43aeca8875e51167d0ce041864d546fdb2e1fecd2

    • \Users\Admin\AppData\Local\Temp\AnyDesk.exe

      Filesize

      5.2MB

      MD5

      17069fd6aafd857bf9ded67a6db7708a

      SHA1

      32dd5d10187b4428970c52f0d74004edcca4d269

      SHA256

      9628c360c683c89c70f74c8f55c46fece6f7375932f107bc0137ae1f7257d41c

      SHA512

      a0295703dd030c8f87424aa4aef063c9f63e70983de5334e4ba9739facaa6f5920ce90b70d4207e67cd149428cdf145284aadae32783295bb6e3fdb3014d8851

    • \Users\Admin\AppData\Local\Temp\AnyDeskAnquan.exe

      Filesize

      14KB

      MD5

      426dfd5ece3b41970773031637cd5539

      SHA1

      d0fe14f8dab89aaddac8b1c89b1cee48396ec636

      SHA256

      737f08702f00e78dbe78acbeda63b73d04c1f8e741c5282a9aa1409369b6efa8

      SHA512

      5c66ea3360115d6dcc71f6d624a886f3c992c5d30338880b0ba48db77dd7fa744b60a3d65fed63427ebb3a8bcf9b204e9ba1521d8c9f0e804ce0db76befa8935

    • \Users\Admin\AppData\Local\Temp\alien\core.dll

      Filesize

      25KB

      MD5

      24b6950afd8663a46246044e6b09add8

      SHA1

      6444dab57d93ce987c22da66b3706d5d7fc226da

      SHA256

      9aa3ca96a84eb5606694adb58776c9e926020ef184828b6f7e6f9b50498f7071

      SHA512

      e1967e7e8c3d64b61451254da281415edf9946a6c8a46006f39ae091609c65666c376934b1bdcbd2a7f73adea7aa68e557694f804bf3bc3ce7854fa527e91740

    • \Users\Admin\AppData\Local\Temp\nsy4932.tmp\INetC.dll

      Filesize

      25KB

      MD5

      40d7eca32b2f4d29db98715dd45bfac5

      SHA1

      124df3f617f562e46095776454e1c0c7bb791cc7

      SHA256

      85e03805f90f72257dd41bfdaa186237218bbb0ec410ad3b6576a88ea11dccb9

      SHA512

      5fd4f516ce23fb7e705e150d5c1c93fc7133694ba495fb73101674a528883a013a34ab258083aa7ce6072973b067a605158316a4c9159c1b4d765761f91c513d

    • memory/400-72-0x0000000001EF0000-0x00000000022F0000-memory.dmp

      Filesize

      4.0MB

    • memory/400-71-0x0000000001EF0000-0x00000000022F0000-memory.dmp

      Filesize

      4.0MB

    • memory/400-70-0x0000000000290000-0x0000000000299000-memory.dmp

      Filesize

      36KB

    • memory/400-76-0x0000000075BB0000-0x0000000075BF7000-memory.dmp

      Filesize

      284KB

    • memory/400-75-0x0000000077130000-0x0000000077240000-memory.dmp

      Filesize

      1.1MB

    • memory/400-74-0x0000000077B30000-0x0000000077CD9000-memory.dmp

      Filesize

      1.7MB

    • memory/544-77-0x00000000000C0000-0x00000000000C9000-memory.dmp

      Filesize

      36KB

    • memory/544-80-0x0000000001BF0000-0x0000000001FF0000-memory.dmp

      Filesize

      4.0MB

    • memory/544-81-0x0000000077B30000-0x0000000077CD9000-memory.dmp

      Filesize

      1.7MB

    • memory/544-83-0x0000000075BB0000-0x0000000075BF7000-memory.dmp

      Filesize

      284KB

    • memory/680-73-0x0000000000410000-0x0000000000449000-memory.dmp

      Filesize

      228KB

    • memory/680-79-0x0000000004670000-0x00000000046D8000-memory.dmp

      Filesize

      416KB

    • memory/680-84-0x00000000051C0000-0x00000000051C7000-memory.dmp

      Filesize

      28KB