Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
05-09-2024 08:33
Static task
static1
Behavioral task
behavioral1
Sample
AnyDesk.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
AnyDesk.exe
Resource
win10v2004-20240802-en
General
-
Target
AnyDesk.exe
-
Size
5.2MB
-
MD5
17069fd6aafd857bf9ded67a6db7708a
-
SHA1
32dd5d10187b4428970c52f0d74004edcca4d269
-
SHA256
9628c360c683c89c70f74c8f55c46fece6f7375932f107bc0137ae1f7257d41c
-
SHA512
a0295703dd030c8f87424aa4aef063c9f63e70983de5334e4ba9739facaa6f5920ce90b70d4207e67cd149428cdf145284aadae32783295bb6e3fdb3014d8851
-
SSDEEP
98304:nLbb4p55b6I8ajCR+V1H06rt7yUEt0wpqy258hTGLxuya1AkycZWW3b3cmDk02Ex:nLbM5UIAQx06Z7ct1qN5SGLxuAkycZ9p
Malware Config
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
AnyDeskAnquan.exedescription pid Process procid_target PID 400 created 1192 400 AnyDeskAnquan.exe 21 -
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
Processes:
AnyDesk.exeAnyDeskAnquan.exeAnyDeskAnquan.exeAnyDeskAnquan.exepid Process 1736 AnyDesk.exe 680 AnyDeskAnquan.exe 400 AnyDeskAnquan.exe 2524 AnyDeskAnquan.exe -
Loads dropped DLL 16 IoCs
Processes:
AnyDesk.exeAnyDeskAnquan.exeAnyDeskAnquan.exeAnyDeskAnquan.exepid Process 2448 AnyDesk.exe 2448 AnyDesk.exe 2448 AnyDesk.exe 2448 AnyDesk.exe 2448 AnyDesk.exe 2448 AnyDesk.exe 2448 AnyDesk.exe 2448 AnyDesk.exe 2448 AnyDesk.exe 2448 AnyDesk.exe 680 AnyDeskAnquan.exe 680 AnyDeskAnquan.exe 400 AnyDeskAnquan.exe 400 AnyDeskAnquan.exe 2524 AnyDeskAnquan.exe 2524 AnyDeskAnquan.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
AnyDesk.exeAnyDesk.exeAnyDeskAnquan.exeAnyDeskAnquan.exedialer.exeAnyDeskAnquan.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AnyDesk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AnyDesk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AnyDeskAnquan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AnyDeskAnquan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AnyDeskAnquan.exe -
Processes:
AnyDesk.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 AnyDesk.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 AnyDesk.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
AnyDeskAnquan.exedialer.exepid Process 400 AnyDeskAnquan.exe 400 AnyDeskAnquan.exe 544 dialer.exe 544 dialer.exe 544 dialer.exe 544 dialer.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
AnyDeskAnquan.exeAnyDeskAnquan.exedescription pid Process Token: SeDebugPrivilege 680 AnyDeskAnquan.exe Token: SeDebugPrivilege 2524 AnyDeskAnquan.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
AnyDesk.exeAnyDeskAnquan.exetaskeng.exedescription pid Process procid_target PID 2448 wrote to memory of 1736 2448 AnyDesk.exe 31 PID 2448 wrote to memory of 1736 2448 AnyDesk.exe 31 PID 2448 wrote to memory of 1736 2448 AnyDesk.exe 31 PID 2448 wrote to memory of 1736 2448 AnyDesk.exe 31 PID 2448 wrote to memory of 680 2448 AnyDesk.exe 32 PID 2448 wrote to memory of 680 2448 AnyDesk.exe 32 PID 2448 wrote to memory of 680 2448 AnyDesk.exe 32 PID 2448 wrote to memory of 680 2448 AnyDesk.exe 32 PID 2448 wrote to memory of 400 2448 AnyDesk.exe 33 PID 2448 wrote to memory of 400 2448 AnyDesk.exe 33 PID 2448 wrote to memory of 400 2448 AnyDesk.exe 33 PID 2448 wrote to memory of 400 2448 AnyDesk.exe 33 PID 400 wrote to memory of 544 400 AnyDeskAnquan.exe 34 PID 400 wrote to memory of 544 400 AnyDeskAnquan.exe 34 PID 400 wrote to memory of 544 400 AnyDeskAnquan.exe 34 PID 400 wrote to memory of 544 400 AnyDeskAnquan.exe 34 PID 400 wrote to memory of 544 400 AnyDeskAnquan.exe 34 PID 400 wrote to memory of 544 400 AnyDeskAnquan.exe 34 PID 2880 wrote to memory of 2524 2880 taskeng.exe 36 PID 2880 wrote to memory of 2524 2880 taskeng.exe 36 PID 2880 wrote to memory of 2524 2880 taskeng.exe 36 PID 2880 wrote to memory of 2524 2880 taskeng.exe 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exeC:\Users\Admin\AppData\Local\Temp\AnyDesk.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1736
-
-
C:\Users\Admin\AppData\Local\Temp\AnyDeskAnquan.exe"C:\Users\Admin\AppData\Local\Temp\AnyDeskAnquan.exe" "C:\Users\Admin\AppData\Local\Temp\config.ini"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:680
-
-
C:\Users\Admin\AppData\Local\Temp\AnyDeskAnquan.exe"C:\Users\Admin\AppData\Local\Temp\AnyDeskAnquan.exe" "C:\Users\Admin\AppData\Local\Temp\ADK_config.ini"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:400
-
-
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:544
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {0BFBB016-E127-4286-AF8A-9315BE32B2A3} S-1-5-21-1506706701-1246725540-2219210854-1000:MUYDDIIS\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\AnyDeskAnquan.exeC:\Users\Admin\AppData\Local\Temp\AnyDeskAnquan.exe "C:\Users\Admin\AppData\Local\Temp\config.ini"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
636KB
MD5cbfe27aa3e60624788de23628081df65
SHA10808539331da7149306a271d635880d179bc8006
SHA2565e7dbe94e2c7a813e98ccd2128c08448c578c3452feba2db583b4e5570c1f0fa
SHA512f27359c45935a06738f3f4581507e19e5f2e2e7b1b89c3260e8922437cb7052a1696ceb5b9b55204c7a2a5d9ca44c6257a3f43c87d222cfeab79ac7002601926
-
Filesize
910KB
MD5ae2bb0a84eb09656a88e6e1d4737f25f
SHA1cb658ac4932c196edafe21830d138a9184a02e24
SHA25607f268e382051fe80098180d9d9464d244a5b95bc3bdd68c81b032f40aa9cf18
SHA5121c9d495f6ba687fadd98946e5834b1536a0a7836d5d9fb71153c9ab2b8a75ada55a3ea9dee5f86e5ed7577752cc9579f2fbee6ff44cd55a5bde8423f120404d4
-
Filesize
164KB
MD524a0d2ef5b931a2a13341a2503b1de80
SHA16201347d1ded92d365126a1225768e11c33ee818
SHA256fbbe7ee073d0290ac13c98b92a8405ea04dcc6837b4144889885dd70679e933f
SHA5125e06f88bb3920cef40a4941efb3b4d3012edf868cc3042f9dbc1989c76b410b4e2da12c20ae2fbcffe5525b43aeca8875e51167d0ce041864d546fdb2e1fecd2
-
Filesize
5.2MB
MD517069fd6aafd857bf9ded67a6db7708a
SHA132dd5d10187b4428970c52f0d74004edcca4d269
SHA2569628c360c683c89c70f74c8f55c46fece6f7375932f107bc0137ae1f7257d41c
SHA512a0295703dd030c8f87424aa4aef063c9f63e70983de5334e4ba9739facaa6f5920ce90b70d4207e67cd149428cdf145284aadae32783295bb6e3fdb3014d8851
-
Filesize
14KB
MD5426dfd5ece3b41970773031637cd5539
SHA1d0fe14f8dab89aaddac8b1c89b1cee48396ec636
SHA256737f08702f00e78dbe78acbeda63b73d04c1f8e741c5282a9aa1409369b6efa8
SHA5125c66ea3360115d6dcc71f6d624a886f3c992c5d30338880b0ba48db77dd7fa744b60a3d65fed63427ebb3a8bcf9b204e9ba1521d8c9f0e804ce0db76befa8935
-
Filesize
25KB
MD524b6950afd8663a46246044e6b09add8
SHA16444dab57d93ce987c22da66b3706d5d7fc226da
SHA2569aa3ca96a84eb5606694adb58776c9e926020ef184828b6f7e6f9b50498f7071
SHA512e1967e7e8c3d64b61451254da281415edf9946a6c8a46006f39ae091609c65666c376934b1bdcbd2a7f73adea7aa68e557694f804bf3bc3ce7854fa527e91740
-
Filesize
25KB
MD540d7eca32b2f4d29db98715dd45bfac5
SHA1124df3f617f562e46095776454e1c0c7bb791cc7
SHA25685e03805f90f72257dd41bfdaa186237218bbb0ec410ad3b6576a88ea11dccb9
SHA5125fd4f516ce23fb7e705e150d5c1c93fc7133694ba495fb73101674a528883a013a34ab258083aa7ce6072973b067a605158316a4c9159c1b4d765761f91c513d