Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
5Static
static
130663f0574...0.appx
windows7-x64
30663f0574...0.appx
windows10-2004-x64
PsfLauncher32.exe
windows7-x64
1PsfLauncher32.exe
windows10-2004-x64
3PsfLauncher64.exe
windows7-x64
1PsfLauncher64.exe
windows10-2004-x64
1PsfRunDll32.exe
windows7-x64
1PsfRunDll32.exe
windows10-2004-x64
3PsfRunDll64.exe
windows7-x64
1PsfRunDll64.exe
windows10-2004-x64
1PsfRuntime32.dll
windows7-x64
3PsfRuntime32.dll
windows10-2004-x64
3PsfRuntime64.dll
windows7-x64
1PsfRuntime64.dll
windows10-2004-x64
1StartingSc...er.ps1
windows7-x64
3StartingSc...er.ps1
windows10-2004-x64
3TMjeHPwgTlKMK.ps1
windows7-x64
3TMjeHPwgTlKMK.ps1
windows10-2004-x64
3VFS/Progra...sk.exe
windows7-x64
5VFS/Progra...sk.exe
windows10-2004-x64
5Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 01:15
Static task
static1
Behavioral task
behavioral1
Sample
30663f0574cd075b83fe01ed7e639000029132536a493ed88cdc1f2f2c012890.appx
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
30663f0574cd075b83fe01ed7e639000029132536a493ed88cdc1f2f2c012890.appx
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
PsfLauncher32.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
PsfLauncher32.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
PsfLauncher64.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
PsfLauncher64.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
PsfRunDll32.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
PsfRunDll32.exe
Resource
win10v2004-20240910-en
Behavioral task
behavioral9
Sample
PsfRunDll64.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
PsfRunDll64.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
PsfRuntime32.dll
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
PsfRuntime32.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
PsfRuntime64.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
PsfRuntime64.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
StartingScriptWrapper.ps1
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
StartingScriptWrapper.ps1
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
TMjeHPwgTlKMK.ps1
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
TMjeHPwgTlKMK.ps1
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
VFS/Programs/AnyDesk.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
VFS/Programs/AnyDesk.exe
Resource
win10v2004-20240802-en
General
-
Target
VFS/Programs/AnyDesk.exe
-
Size
5.0MB
-
MD5
a21768190f3b9feae33aaef660cb7a83
-
SHA1
24780657328783ef50ae0964b23288e68841a421
-
SHA256
55e4ce3fe726043070ecd7de5a74b2459ea8bed19ef2a36ce7884b2ab0863047
-
SHA512
ca6da822072cb0d3797221e578780b19c8953e4207729a002a64a00ced134059c0ed21b02572c43924e4ba3930c0e88cd2cdb309259e3d0dcfb0c282f1832d62
-
SSDEEP
98304:NzTZ3cINQscs0m++LNkT6OpwDGUUH57yvZ/49Mr8EO3QhA9Kq:Nzt3cINQscNmvLCwDkHEvZ/4R79x
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation AnyDesk.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation AnyDesk.exe -
Loads dropped DLL 2 IoCs
pid Process 2716 AnyDesk.exe 456 AnyDesk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AnyDesk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AnyDesk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AnyDesk.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AnyDesk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString AnyDesk.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 456 AnyDesk.exe 456 AnyDesk.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2716 AnyDesk.exe 2716 AnyDesk.exe 2716 AnyDesk.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2716 AnyDesk.exe 2716 AnyDesk.exe 2716 AnyDesk.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 960 wrote to memory of 456 960 AnyDesk.exe 82 PID 960 wrote to memory of 456 960 AnyDesk.exe 82 PID 960 wrote to memory of 456 960 AnyDesk.exe 82 PID 960 wrote to memory of 2716 960 AnyDesk.exe 83 PID 960 wrote to memory of 2716 960 AnyDesk.exe 83 PID 960 wrote to memory of 2716 960 AnyDesk.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\VFS\Programs\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\VFS\Programs\AnyDesk.exe"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Users\Admin\AppData\Local\Temp\VFS\Programs\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\VFS\Programs\AnyDesk.exe" --local-service2⤵
- Checks computer location settings
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:456
-
-
C:\Users\Admin\AppData\Local\Temp\VFS\Programs\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\VFS\Programs\AnyDesk.exe" --local-control2⤵
- Checks computer location settings
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD51ce7d5a1566c8c449d0f6772a8c27900
SHA160854185f6338e1bfc7497fd41aa44c5c00d8f85
SHA25673170761d6776c0debacfbbc61b6988cb8270a20174bf5c049768a264bb8ffaf
SHA5127e3411be8614170ae91db1626c452997dc6db663d79130872a124af982ee1d457cefba00abd7f5269adce3052403be31238aecc3934c7379d224cb792d519753
-
Filesize
9KB
MD571af938e23659305441e56791fb00200
SHA19c2d95a84459e5339c19b4cd8c4eba778ce68903
SHA2562130b3dfec8028f039e3f975857f3892c6c1d72fed0bad496ec1b0bd9572d548
SHA51244d2338c1bfcefb1df72199a3d963b2602479bd693a0558f0ab37106884e96d5f004665ccdd14f50b30c7a350aa521b548292f8eace6f9c74cce4489bde8703f
-
Filesize
9KB
MD592a81d40ff51264aee049be3d3e2091b
SHA1692a8f2bc7167cfe17f7e17dd8396c77068e33b6
SHA2564b97613523a1a4c379f42eed3796dc6e128c59b9dee3bafcfdf54047c5ba1377
SHA512313835b031f4734baac15da720f321dfee311be3cb5670090030f308e2ffe0811c2ef61cd945e8a096acc5038ce546b7dbd0a101b13888e67203435f24af622f
-
Filesize
2KB
MD53c6bbee54b81986e4b87e724e9913a31
SHA1b066df5b366682c906d6697ce75748fe8d6f120f
SHA256e924ee65b047c4984b620014dbb33769e799e2278b30f6fdc0ea709b9196a5cd
SHA512072711aa5aae20f768444c91f532d636d20cd2533757cfd42a07145055a8fca656843aaea9ec008600a6003c03acf52133a10665d8306b6e525af82f7d194a98
-
Filesize
2KB
MD5c1deda3efc287d3a2e62ada043ada7a8
SHA1b57ab2b0498952a7dd24de8989ceee178c3db95e
SHA2565a7649bdedec31c49fbe33515e92f87735fb6bb8b74fb916671227a22103c55a
SHA512a860870479d230c456f408fb15f0216772209bf9c9492c75f72702c93a1ddbb4eca8ff570129a51e6c5d6840bc2c86890fab16b97c35d44432ed35eb63b6fdd9
-
Filesize
612B
MD571b3362ac5bb380818a1de9d18f60efc
SHA1b3af32c3c84685e46bc5a0e717fcb7ba21f32a47
SHA256e64b5ee9336f210d0d0be3f3e2a09c4826cfe4115b0c10c45ca6e27cf89ce19c
SHA51208cef1645e3716a65c5cae3785489f8fc9d5013b4ba293ce3c06ff2ab913652fa9e07b85f0d66d43a91cf332859964b5a8c8e5f0b70e0f822c339c89d66142ac
-
Filesize
681B
MD51df2941ca74ec27cfc864b915601ca27
SHA116dc05a4a535bd0f5cbd264406c233e473bc3fac
SHA256a9cb65e532d79d6919d5233431be40d841ef210164d998bc2e7beab0cb2e585d
SHA5125381f3c5f43374221f066b44ccd5648a432d7937a5ea3a37f9a222120edddd11e04474ce77685cc4f355cfc71f9a8a6ba5ba1b5ad4b0c30caff27ced5fe06529
-
Filesize
738B
MD599713e01ee92898f305bb4fd29efc36f
SHA1b34de5ca036bf132144ca68365e90ba150d5072a
SHA256ad54fcbb468eec693542710130c96e3c9aa2df066ae6823f6584a5df0b33f66d
SHA512747316c02beb1488b8196309aac5ace3d747533daa5b840a4f73fac80e890e9b892bcad5407074614bedf2e3a0c645355c9acba81a86d3963ad225fa8aead405
-
Filesize
312B
MD50c04ad1083dc5c7c45e3ee2cd344ae38
SHA1f1cf190f8ca93000e56d49732e9e827e2554c46f
SHA2566452273c017db7cbe0ffc5b109bbf3f8d3282fb91bfa3c5eabc4fb8f1fc98cb0
SHA5126c414b39bbc1f1f08446c6c6da6f6e1ceb9303bbf183ae279c872d91641ea8d67ec5e5c4e0824da3837eca73ec29fe70e92b72c09458c8ce50fa6f08791d1492
-
Filesize
424B
MD5638098bcda35b57968fb8cce45ba37c4
SHA13c8e4ee55f91b7d56d356723dfab21d9e4a61ddc
SHA256e005ca8b368b9ab41a38aa96ee681ba1ee8a2b5ef3f8aac5d9bae07b2e818552
SHA51267f21f38c87e0b8476f0058112b342e62a0c248f7df5599605c7ec2cadae6bbf20ceaff4729f081570fa7cc8b24ec5be8086c29a2b0bc02419262cc2941485c9
-
Filesize
2KB
MD588d071db21a069ac9153b6f9cfe785b5
SHA1f787bbf6814a1c458be21fa720a1cc2a5521e94d
SHA256bc3601a4eb89fb6784ee3c13ce7d75b788e5db694a6422ca2a04a4e10243d9b5
SHA512851d89512d05ac9dd57ea89c8d391d0f050f193a32832331368ad126bb3609171756ac50468c0f431368cbe1231dfb56e67a9bf0e0732ca7cc94492e095e81e9
-
Filesize
3KB
MD539172c9360329d811935335b8d429e7e
SHA18a702830c05d423bc4a70826746c680fed3cf823
SHA256cd4865b1d38ca4ea8fd95a4e7472ccf5c7a187bfc77b6536d24d9db4ccd398f1
SHA5122e617b16a320910079947ab195885260ef39f8852a9944dfe563809665ab8a9e252147aad80a7a74cbe3a87bd923b510fc99ce7091a03429c8d9c74d4721424b
-
Filesize
1KB
MD51271aa5ac5ed7269e72e49b970383336
SHA1d4320f97b04d28ec2ca8a8cdefd9f67b257fbebf
SHA256bd8b2d6b39b60316f5626a3336aa3921f33c06ecce014456620bde8dedafde42
SHA512d0eae70237fdb4d5315d41cea34ce3d6d33038db0102991d1974d1ed3c1a34a964a5d249b0a75de63f62a921dd9dfa894afa20189e6485c4b326fa3508f1113a
-
Filesize
3KB
MD5b47ba8e3853021273717a59ce6d0fee5
SHA12d881a39cb3778970547a4e8b4fb93ad75fc7934
SHA256fc623ad688371eda36a83c664108fbebe310399b8750af4e3dc3b5c27ddcd51c
SHA5123b762274c8d480cd2cdbabaf3ec19547f7cac23a82f80e00e87d91162e4a311400dd948f09def99404427b530a902cb11b4ca5feda16abddf4d7cb5a3217f12a
-
Filesize
7KB
MD5fd0dc987c0f0911aee85bc507fbc2335
SHA173ee9491baddb48cfea561a380a602fab443f169
SHA25689121547f462fbc0088d10de2134fc58b48f6adffab6e67f0bce055f5ef700e8
SHA512cc0ab94d8636465a9f1fd89167467463e18aa42c38b9f232984d3ed30e684662b9bff57a358b8e33f944fa56ef5850dc3a9c1efaf0bb0254741526891c9130aa
-
Filesize
6KB
MD533c420f15e2d6f192812a87320f0b4c3
SHA19a4dd5d5bde2f353d4bdd6bda33cf6067375778a
SHA256f5f8369d17f2e641fbbca7f9ba4df6cfceba85c2771ec78b360e5005f6668e50
SHA512ba4bcc6635ecb1680ecec6c35ec7643e8e7e471b1154bc0c62247224b26f56ce76943a1c8daee3ceecd3d6f96bb0d7df88b1e95e306bef732a1834d0731a7fa5
-
Filesize
7KB
MD585f04692fd936d836722ee367cddd75b
SHA18f06852325ac4bb15a26faf01d2c1f88d3031ff5
SHA25690255efd07c55784dec6330eea816774045b2eba6977667c6914d8237b296c10
SHA5120dff52482ec3fd519b6848e226f864e4a58805b9b26ba4545fbcbf5941140333db0f89e19f339fc085c0773e28cdacd859c7ef80f79d2496a9e32607f0b024b1
-
Filesize
1KB
MD5fea089fafa6e43461adc1e72c37752f6
SHA1416f0ff9235dd0d1625b911717ad087dd11158d2
SHA256add4a22b63085eb1724df44d42a6b2b243b7fa716156bce738b7ee162444c2aa
SHA512e38db507b2aa1b4fe49efc7d47378f918c448d944f6226b7dff49a99849072b71f24d93a94dc8c116088a410f1830c787aa46c83eb471c4d5256941d9bf05798
-
Filesize
1KB
MD5735a1053df5b83d6ad97bcfd431f3c92
SHA1e55bdfe92562cfb3fd31938e17691c83aacb4ebb
SHA256bf74362c28ba747f4d4e638a6fe7c4e7695fc4fbb79d959cfa3f0658c89c132d
SHA5123b284fceef2bc98f5f198e2418af234345ac16c30cea67ac28e2af9dff3adb9cc03bd77fb8720b39aee6d7ded6d8996f8d11d0a28c936ac15c23e858d787fcd2