Analysis
-
max time kernel
72s -
max time network
73s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-09-2024 17:32
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Anydesk.exe
Resource
win7-20240903-en
10 signatures
150 seconds
General
-
Target
Anydesk.exe
-
Size
2.6MB
-
MD5
1260f4063a10df83764899a7e2126a59
-
SHA1
56b19520b85d2847304c02c2c0cc1f6774d782b3
-
SHA256
75a16dcebfd5ceed55da11872658e7456f47141476fc44a9159a25bf76da8613
-
SHA512
0f5d2862a1f8be40cec3caa8d850412693df1199c029e5f4021cd9662e4dd467dbe0e0f668b398f109b9357f297a08abb939509abc677558ceabcead8dda0397
-
SSDEEP
49152:hmWDukvNTiP4FsDG8ryS8woCFW7ACqZ0rFQU+pK0Mk:hzikVTsgaPb87ACqZIFQU+pK0l
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral2/memory/4552-4-0x0000024EECA00000-0x0000024EECC14000-memory.dmp family_agenttesla -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions Anydesk.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\VMware, Inc.\VMware Tools Anydesk.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Anydesk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Anydesk.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum Anydesk.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 Anydesk.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Anydesk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion Anydesk.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Anydesk.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 4552 Anydesk.exe 4552 Anydesk.exe 4552 Anydesk.exe 4552 Anydesk.exe 4552 Anydesk.exe 4552 Anydesk.exe 4552 Anydesk.exe 4552 Anydesk.exe 4552 Anydesk.exe 4552 Anydesk.exe 4552 Anydesk.exe 4552 Anydesk.exe 4552 Anydesk.exe 4552 Anydesk.exe 4552 Anydesk.exe 4552 Anydesk.exe 4552 Anydesk.exe 4552 Anydesk.exe 4552 Anydesk.exe 4552 Anydesk.exe 4552 Anydesk.exe 4552 Anydesk.exe 4552 Anydesk.exe 4552 Anydesk.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4552 Anydesk.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Anydesk.exe"C:\Users\Admin\AppData\Local\Temp\Anydesk.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4552