| File name: | mtk.exe |
| Full analysis: | https://app.any.run/tasks/4d56e33a-9ae5-42a1-9c42-e01674b85e09 |
| Verdict: | Malicious activity |
| Threats: | Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks. |
| Analysis date: | October 24, 2023, 20:15:04 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32+ executable (console) x86-64, for MS Windows |
| MD5: | 0DBAFF61A0D7EB35C23542FE980C8E30 |
| SHA1: | A65BCE229A1F0143C6F5C86A205DA15D74652335 |
| SHA256: | 0771DDC1515150CF7BB2EAED7CE17DB58BF1F3F963EC60B28E29266763C92594 |
| SSDEEP: | 49152:5hkVUncRtu1kPxXzEgDH/0nl0efk6e4Ath5+hY7hYKJ+NFK2Z0N/eEDNIGuWFlva:qxJDhlEF0N/e06Wrghxt |
| .exe | | | Win64 Executable (generic) (87.3) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (6.3) |
| .exe | | | DOS Executable Generic (6.3) |
| Subsystem: | Windows command line |
|---|---|
| SubsystemVersion: | 6 |
| ImageVersion: | - |
| OSVersion: | 6 |
| EntryPoint: | 0x28032c |
| UninitializedDataSize: | - |
| InitializedDataSize: | 1511936 |
| CodeSize: | 2664960 |
| LinkerVersion: | 14.37 |
| PEType: | PE32+ |
| ImageFileCharacteristics: | Executable, Large address aware |
| TimeStamp: | 2023:10:24 19:43:43+00:00 |
| MachineType: | AMD AMD64 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 308 | "C:\Users\admin\AppData\Local\Temp\.tmpGcwzRs\64442cceb7d618e70c62d461cfaafdb8e653b8d98ac4765a6b3d8fd1ea3bce15.exe.exe" | C:\Users\admin\AppData\Local\Temp\.tmpGcwzRs\64442cceb7d618e70c62d461cfaafdb8e653b8d98ac4765a6b3d8fd1ea3bce15.exe.exe | — | mtk.exe | |||||||||||
User: admin Company: Microsoft Integrity Level: MEDIUM Exit code: 0 Version: 1.00 | |||||||||||||||
| 364 | "C:\Users\admin\AppData\Local\Temp\.tmpGcwzRs\07529fae9e74be81fd302d022603d9f0796b4b9120b0d6131f75d41b979bbca5.exe.exe" | C:\Users\admin\AppData\Local\Temp\.tmpGcwzRs\07529fae9e74be81fd302d022603d9f0796b4b9120b0d6131f75d41b979bbca5.exe.exe | — | mtk.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Help Service Exit code: 0 Version: 2, 0, 0, 2 Modules
| |||||||||||||||
| 416 | "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Public\Video\movie.mp4" | C:\Program Files\VideoLAN\VLC\vlc.exe | — | 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe.exe | |||||||||||
User: admin Company: VideoLAN Integrity Level: MEDIUM Description: VLC media player Exit code: 0 Version: 2.2.6 | |||||||||||||||
| 588 | "C:\Users\admin\AppData\Local\Temp\.tmpGcwzRs\8c213b3707b0b042d769fdf543c6e8bd7c127cea6a9bc989eaf241a1505d1ed9.exe.exe" | C:\Users\admin\AppData\Local\Temp\.tmpGcwzRs\8c213b3707b0b042d769fdf543c6e8bd7c127cea6a9bc989eaf241a1505d1ed9.exe.exe | — | mtk.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 | |||||||||||||||
| 600 | C:\Windows\system32\net1 stop BackupExecJobEngine /y | C:\Windows\SysWOW64\net1.exe | — | net.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Net Command Exit code: 2 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | |||||||||||||||
| 752 | "net.exe" stop CASAD2DWebSvc /y | C:\Windows\SysWOW64\net.exe | — | 5d40615701c48a122e44f831e7c8643d07765629a83b15d090587f469c77693d.exe.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Net Command Exit code: 2 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | |||||||||||||||
| 792 | "C:\Users\admin\AppData\Local\Temp\.tmpGcwzRs\21.exe.exe" | C:\Users\admin\AppData\Local\Temp\.tmpGcwzRs\21.exe.exe | — | mtk.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 3221226540 Modules
| |||||||||||||||
| 984 | "net.exe" stop ccSetMgr /y | C:\Windows\SysWOW64\net.exe | — | 5d40615701c48a122e44f831e7c8643d07765629a83b15d090587f469c77693d.exe.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Net Command Exit code: 2 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | |||||||||||||||
| 984 | C:\Windows\system32\net1 stop PDVFSService /y | C:\Windows\SysWOW64\net1.exe | — | net.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Net Command Exit code: 2 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | |||||||||||||||
| 992 | "C:\Users\admin\AppData\Local\Temp\.tmpGcwzRs\03641e5632673615f23b2a8325d7355c4499a40f47b6ae094606a73c56e24ad0.exe.exe" | C:\Users\admin\AppData\Local\Temp\.tmpGcwzRs\03641e5632673615f23b2a8325d7355c4499a40f47b6ae094606a73c56e24ad0.exe.exe | — | mtk.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Help Service Exit code: 0 Version: 2, 0, 0, 2 Modules
| |||||||||||||||
| (PID) Process: | (2612) mtk.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\156\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (2004) 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (2004) 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (2004) 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (2004) 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (3016) 0468127a19daf4c7bc41015c5640fe1f.exe.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
| Operation: | write | Name: | ProxyEnable |
Value: 0 | |||
| (PID) Process: | (3016) 0468127a19daf4c7bc41015c5640fe1f.exe.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections |
| Operation: | write | Name: | SavedLegacySettings |
Value: 46000000C1000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
| (PID) Process: | (3016) 0468127a19daf4c7bc41015c5640fe1f.exe.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (3016) 0468127a19daf4c7bc41015c5640fe1f.exe.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (2468) cmd.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2612 | mtk.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506 | compressed | |
MD5:F3441B8572AAE8801C04F3060B550443 | SHA256:6720349E7D82EE0A8E73920D3C2B7CB2912D9FCF2EDB6FD98F2F12820158B0BF | |||
| 2612 | mtk.exe | C:\Users\admin\AppData\Local\Temp\CabCCFF.tmp | compressed | |
MD5:F3441B8572AAE8801C04F3060B550443 | SHA256:6720349E7D82EE0A8E73920D3C2B7CB2912D9FCF2EDB6FD98F2F12820158B0BF | |||
| 2612 | mtk.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506 | binary | |
MD5:26B8C301554A9D8BCCCF4DD93016E383 | SHA256:AA84904EB011D4EA7CC847AB1E70617FB2654B6CD491876D49F67931E7364225 | |||
| 2612 | mtk.exe | C:\Users\admin\AppData\Local\Temp\.tmpGcwzRs\01259a104a0199b794b0c61fcfc657eb766b2caeae68d5c6b164a53a97874257.exe.exe | executable | |
MD5:460B288A581CDEB5F831D102CB6D198B | SHA256:01259A104A0199B794B0C61FCFC657EB766B2CAEAE68D5C6B164A53A97874257 | |||
| 2612 | mtk.exe | C:\Users\admin\AppData\Local\Temp\TarCD00.tmp | binary | |
MD5:9441737383D21192400ECA82FDA910EC | SHA256:BC3A6E84E41FAEB57E7C21AA3B60C2A64777107009727C5B7C0ED8FE658909E5 | |||
| 2612 | mtk.exe | C:\Users\admin\AppData\Local\Temp\.tmpGcwzRs\0eb038e7e5edd6ac1b4eee8dd1c51b6d94da24d02ba705e7e7f10b41edf701c2.exe.exe | executable | |
MD5:6B8EA12D811ACF88F94B734BF5CFBFB3 | SHA256:0EB038E7E5EDD6AC1B4EEE8DD1C51B6D94DA24D02BA705E7E7F10B41EDF701C2 | |||
| 2612 | mtk.exe | C:\Users\admin\AppData\Local\Temp\.tmpGcwzRs\0cfc34fa76228b1afc7ce63e284a23ce1cd2927e6159b9dea9702ad9cb2a6300.exe.exe | executable | |
MD5:34409ABA1F76045AA0255E49DE16D586 | SHA256:0CFC34FA76228B1AFC7CE63E284A23CE1CD2927E6159B9DEA9702AD9CB2A6300 | |||
| 2612 | mtk.exe | C:\Users\admin\AppData\Local\Temp\.tmpGcwzRs\0442cfabb3212644c4b894a7e4a7e84c00fd23489cc4f96490f9988e6074b6ab.exe.exe | executable | |
MD5:2AEA3B217E6A3D08EF684594192CAFC8 | SHA256:0442CFABB3212644C4B894A7E4A7E84C00FD23489CC4F96490F9988E6074B6AB | |||
| 2612 | mtk.exe | C:\Users\admin\AppData\Local\Temp\.tmpGcwzRs\0008065861f5b09195e51add72dacd3c4bbce6444711320ad349c7dab5bb97fb.exe.exe | executable | |
MD5:D2074D6273F41C34E8BA370AA9AF46AD | SHA256:0008065861F5B09195E51ADD72DACD3C4BBCE6444711320AD349C7DAB5BB97FB | |||
| 2612 | mtk.exe | C:\Users\admin\AppData\Local\Temp\.tmpGcwzRs\027cc450ef5f8c5f653329641ec1fed9.exe.exe | executable | |
MD5:71B6A493388E7D0B40C83CE903BC6B04 | SHA256:027CC450EF5F8C5F653329641EC1FED91F694E0D229928963B30F6B0D7D3A745 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
— | — | GET | 404 | 188.40.187.155:80 | http://mynexa.io/hfv23svj2/plugins/cred.dll | unknown | — | — | unknown |
— | — | GET | 404 | 188.40.187.155:80 | http://mynexa.io/hfv23svj2/plugins/scr.dll | unknown | — | — | unknown |
2452 | utilview.exe | GET | 200 | 132.226.8.169:80 | http://checkip.dyndns.org/ | unknown | html | 106 b | unknown |
— | — | GET | 200 | 132.226.8.169:80 | http://checkip.dyndns.org/ | unknown | html | 106 b | unknown |
— | — | POST | 404 | 188.40.187.155:80 | http://mynexa.io/hfv23svj2/index.php | unknown | — | — | unknown |
— | — | GET | 404 | 123.57.60.215:80 | http://123.57.60.215/beacon.txt | unknown | text | 19 b | unknown |
— | — | GET | 404 | 123.57.60.215:80 | http://123.57.60.215/beacon.txt | unknown | text | 19 b | unknown |
— | — | GET | 301 | 13.107.246.60:80 | http://api.nuget.org/packages/taskscheduler.2.5.23.nupkg | unknown | — | — | unknown |
2612 | mtk.exe | GET | 200 | 209.197.3.8:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?e5937c9360690284 | unknown | compressed | 61.6 Kb | unknown |
— | — | GET | 200 | 132.226.8.169:80 | http://checkip.dyndns.org/ | unknown | html | 106 b | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | unknown |
324 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
2612 | mtk.exe | 45.67.85.72:443 | m.crep.vip | — | US | unknown |
2612 | mtk.exe | 209.197.3.8:80 | ctldl.windowsupdate.com | STACKPATH-CDN | US | whitelisted |
1956 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
2892 | 0d7d4dc173c88c4f72c8f9f419ae8473d044f4b3e8f32e4a0f34fe4bbc698776.exe.exe | 58.158.177.102:443 | flash-update.buyonebuy.top | ARTERIA Networks Corporation | JP | unknown |
3016 | 0468127a19daf4c7bc41015c5640fe1f.exe.exe | 193.135.12.107:80 | — | LLC Baxet | RU | malicious |
2452 | utilview.exe | 132.226.8.169:80 | checkip.dyndns.org | ORACLE-BMC-31898 | JP | unknown |
— | — | 95.181.46.38:14307 | — | E-Light-Telecom Ltd. | RU | unknown |
Domain | IP | Reputation |
|---|---|---|
m.crep.vip |
| unknown |
ctldl.windowsupdate.com |
| whitelisted |
flash-update.buyonebuy.top |
| unknown |
checkip.dyndns.org |
| shared |
www.microsoft.com |
| whitelisted |
www.google.com |
| whitelisted |
exusin.ru |
| unknown |
imagisp.ru |
| unknown |
cudgewit.ru |
| unknown |
mynexa.io |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
324 | svchost.exe | Potentially Bad Traffic | ET DNS Query to a *.top domain - Likely Hostile |
324 | svchost.exe | Device Retrieving External IP Address Detected | ET INFO External IP Lookup Domain in DNS Query (checkip .dyndns .org) |
324 | svchost.exe | Misc activity | AV INFO Query to checkip.dyndns. Domain |
— | — | A Network Trojan was detected | ET MALWARE Common Upatre Header Structure 2 |
— | — | Device Retrieving External IP Address Detected | ET MALWARE Upatre External IP Check |
— | — | A Network Trojan was detected | ET MALWARE Mazilla Suspicious User-Agent Jan 15 2015 |
— | — | Device Retrieving External IP Address Detected | ET POLICY External IP Lookup - checkip.dyndns.org |
2892 | 0d7d4dc173c88c4f72c8f9f419ae8473d044f4b3e8f32e4a0f34fe4bbc698776.exe.exe | Domain Observed Used for C2 Detected | ET MALWARE Malicious SSL certificate detected (Possible Sinkhole) |
— | — | A Network Trojan was detected | ET MALWARE Common Upatre Header Structure 2 |
— | — | A Network Trojan was detected | ET MALWARE Mazilla Suspicious User-Agent Jan 15 2015 |
Process | Message |
|---|---|
vlc.exe | core libvlc: one instance mode ENABLED
|
7249b1a5082c9d9654d9fac3bb5e965ea23e395554d3351b77dd4f29677426fe.exe.exe | Script Error |
7249b1a5082c9d9654d9fac3bb5e965ea23e395554d3351b77dd4f29677426fe.exe.exe | Run OK |