Analysis

  • max time kernel
    144s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-09-2024 08:33

General

  • Target

    AnyDesk.exe

  • Size

    5.2MB

  • MD5

    17069fd6aafd857bf9ded67a6db7708a

  • SHA1

    32dd5d10187b4428970c52f0d74004edcca4d269

  • SHA256

    9628c360c683c89c70f74c8f55c46fece6f7375932f107bc0137ae1f7257d41c

  • SHA512

    a0295703dd030c8f87424aa4aef063c9f63e70983de5334e4ba9739facaa6f5920ce90b70d4207e67cd149428cdf145284aadae32783295bb6e3fdb3014d8851

  • SSDEEP

    98304:nLbb4p55b6I8ajCR+V1H06rt7yUEt0wpqy258hTGLxuya1AkycZWW3b3cmDk02Ex:nLbM5UIAQx06Z7ct1qN5SGLxuAkycZ9p

Malware Config

Signatures

  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 26 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
    1⤵
      PID:2464
      • C:\Windows\SysWOW64\openwith.exe
        "C:\Windows\system32\openwith.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:5036
      • C:\Windows\SysWOW64\openwith.exe
        "C:\Windows\system32\openwith.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4324
      • C:\Windows\SysWOW64\openwith.exe
        "C:\Windows\system32\openwith.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:3360
    • C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe
      "C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"
      1⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4076
      • C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe
        C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3584
        • C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe
          C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3800
          • C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe
            C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:1992
          • C:\Users\Admin\AppData\Local\Temp\AnyDeskAnquan.exe
            "C:\Users\Admin\AppData\Local\Temp\AnyDeskAnquan.exe" "C:\Users\Admin\AppData\Local\Temp\config.ini"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:860
          • C:\Users\Admin\AppData\Local\Temp\AnyDeskAnquan.exe
            "C:\Users\Admin\AppData\Local\Temp\AnyDeskAnquan.exe" "C:\Users\Admin\AppData\Local\Temp\ADK_config.ini"
            4⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:4488
        • C:\Users\Admin\AppData\Local\Temp\AnyDeskAnquan.exe
          "C:\Users\Admin\AppData\Local\Temp\AnyDeskAnquan.exe" "C:\Users\Admin\AppData\Local\Temp\config.ini"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:2528
        • C:\Users\Admin\AppData\Local\Temp\AnyDeskAnquan.exe
          "C:\Users\Admin\AppData\Local\Temp\AnyDeskAnquan.exe" "C:\Users\Admin\AppData\Local\Temp\ADK_config.ini"
          3⤵
          • Suspicious use of NtCreateUserProcessOtherParentProcess
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1760
      • C:\Users\Admin\AppData\Local\Temp\AnyDeskAnquan.exe
        "C:\Users\Admin\AppData\Local\Temp\AnyDeskAnquan.exe" "C:\Users\Admin\AppData\Local\Temp\config.ini"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1504
      • C:\Users\Admin\AppData\Local\Temp\AnyDeskAnquan.exe
        "C:\Users\Admin\AppData\Local\Temp\AnyDeskAnquan.exe" "C:\Users\Admin\AppData\Local\Temp\ADK_config.ini"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1132
    • C:\Users\Admin\AppData\Local\Temp\AnyDeskAnquan.exe
      C:\Users\Admin\AppData\Local\Temp\AnyDeskAnquan.exe "C:\Users\Admin\AppData\Local\Temp\config.ini"
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:3544

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AnyDeskAnquan.exe.log

      Filesize

      521B

      MD5

      82fd1c0a56b8af6ad97d973328281509

      SHA1

      5b4d01cb01d2e5e62dd3026de96dcf37f5713b89

      SHA256

      a57a4a3a9e484a52872a0c105ac939bf91e97033f4e40c21e5fd03f0bf8bc548

      SHA512

      3ced1456093d84e9617e630d06128da646b41720e873822c37cb40b4698919c4c543250ab9f191d73d6aac1109206655faa179dd781a578e1f778fe92b9a4b08

    • C:\Users\Admin\AppData\Local\Temp\ADK_config.ini

      Filesize

      636KB

      MD5

      cbfe27aa3e60624788de23628081df65

      SHA1

      0808539331da7149306a271d635880d179bc8006

      SHA256

      5e7dbe94e2c7a813e98ccd2128c08448c578c3452feba2db583b4e5570c1f0fa

      SHA512

      f27359c45935a06738f3f4581507e19e5f2e2e7b1b89c3260e8922437cb7052a1696ceb5b9b55204c7a2a5d9ca44c6257a3f43c87d222cfeab79ac7002601926

    • C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe

      Filesize

      5.2MB

      MD5

      17069fd6aafd857bf9ded67a6db7708a

      SHA1

      32dd5d10187b4428970c52f0d74004edcca4d269

      SHA256

      9628c360c683c89c70f74c8f55c46fece6f7375932f107bc0137ae1f7257d41c

      SHA512

      a0295703dd030c8f87424aa4aef063c9f63e70983de5334e4ba9739facaa6f5920ce90b70d4207e67cd149428cdf145284aadae32783295bb6e3fdb3014d8851

    • C:\Users\Admin\AppData\Local\Temp\AnyDeskAnquan.exe

      Filesize

      14KB

      MD5

      426dfd5ece3b41970773031637cd5539

      SHA1

      d0fe14f8dab89aaddac8b1c89b1cee48396ec636

      SHA256

      737f08702f00e78dbe78acbeda63b73d04c1f8e741c5282a9aa1409369b6efa8

      SHA512

      5c66ea3360115d6dcc71f6d624a886f3c992c5d30338880b0ba48db77dd7fa744b60a3d65fed63427ebb3a8bcf9b204e9ba1521d8c9f0e804ce0db76befa8935

    • C:\Users\Admin\AppData\Local\Temp\alien\core.dll

      Filesize

      25KB

      MD5

      24b6950afd8663a46246044e6b09add8

      SHA1

      6444dab57d93ce987c22da66b3706d5d7fc226da

      SHA256

      9aa3ca96a84eb5606694adb58776c9e926020ef184828b6f7e6f9b50498f7071

      SHA512

      e1967e7e8c3d64b61451254da281415edf9946a6c8a46006f39ae091609c65666c376934b1bdcbd2a7f73adea7aa68e557694f804bf3bc3ce7854fa527e91740

    • C:\Users\Admin\AppData\Local\Temp\config.ini

      Filesize

      910KB

      MD5

      ae2bb0a84eb09656a88e6e1d4737f25f

      SHA1

      cb658ac4932c196edafe21830d138a9184a02e24

      SHA256

      07f268e382051fe80098180d9d9464d244a5b95bc3bdd68c81b032f40aa9cf18

      SHA512

      1c9d495f6ba687fadd98946e5834b1536a0a7836d5d9fb71153c9ab2b8a75ada55a3ea9dee5f86e5ed7577752cc9579f2fbee6ff44cd55a5bde8423f120404d4

    • C:\Users\Admin\AppData\Local\Temp\lua5.1.dll

      Filesize

      164KB

      MD5

      24a0d2ef5b931a2a13341a2503b1de80

      SHA1

      6201347d1ded92d365126a1225768e11c33ee818

      SHA256

      fbbe7ee073d0290ac13c98b92a8405ea04dcc6837b4144889885dd70679e933f

      SHA512

      5e06f88bb3920cef40a4941efb3b4d3012edf868cc3042f9dbc1989c76b410b4e2da12c20ae2fbcffe5525b43aeca8875e51167d0ce041864d546fdb2e1fecd2

    • C:\Users\Admin\AppData\Local\Temp\nsqEEE6.tmp\INetC.dll

      Filesize

      25KB

      MD5

      40d7eca32b2f4d29db98715dd45bfac5

      SHA1

      124df3f617f562e46095776454e1c0c7bb791cc7

      SHA256

      85e03805f90f72257dd41bfdaa186237218bbb0ec410ad3b6576a88ea11dccb9

      SHA512

      5fd4f516ce23fb7e705e150d5c1c93fc7133694ba495fb73101674a528883a013a34ab258083aa7ce6072973b067a605158316a4c9159c1b4d765761f91c513d

    • memory/1132-52-0x00000000009D0000-0x00000000009F8000-memory.dmp

      Filesize

      160KB

    • memory/1132-48-0x0000000000A10000-0x0000000000A19000-memory.dmp

      Filesize

      36KB

    • memory/1132-55-0x00007FFF7B8D0000-0x00007FFF7BAC5000-memory.dmp

      Filesize

      2.0MB

    • memory/1132-49-0x00000000021E0000-0x00000000025E0000-memory.dmp

      Filesize

      4.0MB

    • memory/1132-54-0x00000000021E0000-0x00000000025E0000-memory.dmp

      Filesize

      4.0MB

    • memory/1132-58-0x0000000076800000-0x0000000076A15000-memory.dmp

      Filesize

      2.1MB

    • memory/1132-50-0x00000000021E0000-0x00000000025E0000-memory.dmp

      Filesize

      4.0MB

    • memory/1132-56-0x00000000021E0000-0x00000000025E0000-memory.dmp

      Filesize

      4.0MB

    • memory/1132-53-0x0000000000A10000-0x0000000000A19000-memory.dmp

      Filesize

      36KB

    • memory/1132-60-0x00000000021E0000-0x00000000025E0000-memory.dmp

      Filesize

      4.0MB

    • memory/1504-68-0x0000000004C20000-0x0000000004C27000-memory.dmp

      Filesize

      28KB

    • memory/1504-67-0x0000000004BA0000-0x0000000004BC2000-memory.dmp

      Filesize

      136KB

    • memory/1504-51-0x00000000008D0000-0x0000000000909000-memory.dmp

      Filesize

      228KB

    • memory/1504-66-0x0000000004B30000-0x0000000004B98000-memory.dmp

      Filesize

      416KB

    • memory/1760-92-0x00007FFF7B8D0000-0x00007FFF7BAC5000-memory.dmp

      Filesize

      2.0MB

    • memory/1760-91-0x0000000002110000-0x0000000002510000-memory.dmp

      Filesize

      4.0MB

    • memory/1760-94-0x0000000076800000-0x0000000076A15000-memory.dmp

      Filesize

      2.1MB

    • memory/3360-120-0x00007FFF7B8D0000-0x00007FFF7BAC5000-memory.dmp

      Filesize

      2.0MB

    • memory/3360-122-0x0000000076800000-0x0000000076A15000-memory.dmp

      Filesize

      2.1MB

    • memory/3360-119-0x00000000020E0000-0x00000000024E0000-memory.dmp

      Filesize

      4.0MB

    • memory/3544-77-0x0000000005700000-0x000000000579C000-memory.dmp

      Filesize

      624KB

    • memory/3544-78-0x00000000057B0000-0x0000000005816000-memory.dmp

      Filesize

      408KB

    • memory/4324-100-0x0000000076800000-0x0000000076A15000-memory.dmp

      Filesize

      2.1MB

    • memory/4324-97-0x0000000002BA0000-0x0000000002FA0000-memory.dmp

      Filesize

      4.0MB

    • memory/4324-98-0x00007FFF7B8D0000-0x00007FFF7BAC5000-memory.dmp

      Filesize

      2.0MB

    • memory/4488-115-0x0000000076800000-0x0000000076A15000-memory.dmp

      Filesize

      2.1MB

    • memory/4488-112-0x0000000002360000-0x0000000002760000-memory.dmp

      Filesize

      4.0MB

    • memory/4488-113-0x00007FFF7B8D0000-0x00007FFF7BAC5000-memory.dmp

      Filesize

      2.0MB

    • memory/5036-59-0x0000000001210000-0x0000000001219000-memory.dmp

      Filesize

      36KB

    • memory/5036-65-0x0000000076800000-0x0000000076A15000-memory.dmp

      Filesize

      2.1MB

    • memory/5036-62-0x0000000002E70000-0x0000000003270000-memory.dmp

      Filesize

      4.0MB

    • memory/5036-63-0x00007FFF7B8D0000-0x00007FFF7BAC5000-memory.dmp

      Filesize

      2.0MB