| File name: | mtk.exe |
| Full analysis: | https://app.any.run/tasks/4d56e33a-9ae5-42a1-9c42-e01674b85e09 |
| Verdict: | Malicious activity |
| Threats: | Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks. |
| Analysis date: | October 24, 2023, 20:15:04 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32+ executable (console) x86-64, for MS Windows |
| MD5: | 0DBAFF61A0D7EB35C23542FE980C8E30 |
| SHA1: | A65BCE229A1F0143C6F5C86A205DA15D74652335 |
| SHA256: | 0771DDC1515150CF7BB2EAED7CE17DB58BF1F3F963EC60B28E29266763C92594 |
| SSDEEP: | 49152:5hkVUncRtu1kPxXzEgDH/0nl0efk6e4Ath5+hY7hYKJ+NFK2Z0N/eEDNIGuWFlva:qxJDhlEF0N/e06Wrghxt |
| .exe | | | Win64 Executable (generic) (87.3) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (6.3) |
| .exe | | | DOS Executable Generic (6.3) |
| Subsystem: | Windows command line |
|---|---|
| SubsystemVersion: | 6 |
| ImageVersion: | - |
| OSVersion: | 6 |
| EntryPoint: | 0x28032c |
| UninitializedDataSize: | - |
| InitializedDataSize: | 1511936 |
| CodeSize: | 2664960 |
| LinkerVersion: | 14.37 |
| PEType: | PE32+ |
| ImageFileCharacteristics: | Executable, Large address aware |
| TimeStamp: | 2023:10:24 19:43:43+00:00 |
| MachineType: | AMD AMD64 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 308 | "C:\Users\admin\AppData\Local\Temp\.tmpGcwzRs\64442cceb7d618e70c62d461cfaafdb8e653b8d98ac4765a6b3d8fd1ea3bce15.exe.exe" | C:\Users\admin\AppData\Local\Temp\.tmpGcwzRs\64442cceb7d618e70c62d461cfaafdb8e653b8d98ac4765a6b3d8fd1ea3bce15.exe.exe | — | mtk.exe | |||||||||||
User: admin Company: Microsoft Integrity Level: MEDIUM Exit code: 0 Version: 1.00 | |||||||||||||||
| 364 | "C:\Users\admin\AppData\Local\Temp\.tmpGcwzRs\07529fae9e74be81fd302d022603d9f0796b4b9120b0d6131f75d41b979bbca5.exe.exe" | C:\Users\admin\AppData\Local\Temp\.tmpGcwzRs\07529fae9e74be81fd302d022603d9f0796b4b9120b0d6131f75d41b979bbca5.exe.exe | — | mtk.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Help Service Exit code: 0 Version: 2, 0, 0, 2 Modules
| |||||||||||||||
| 416 | "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Public\Video\movie.mp4" | C:\Program Files\VideoLAN\VLC\vlc.exe | — | 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe.exe | |||||||||||
User: admin Company: VideoLAN Integrity Level: MEDIUM Description: VLC media player Exit code: 0 Version: 2.2.6 | |||||||||||||||
| 588 | "C:\Users\admin\AppData\Local\Temp\.tmpGcwzRs\8c213b3707b0b042d769fdf543c6e8bd7c127cea6a9bc989eaf241a1505d1ed9.exe.exe" | C:\Users\admin\AppData\Local\Temp\.tmpGcwzRs\8c213b3707b0b042d769fdf543c6e8bd7c127cea6a9bc989eaf241a1505d1ed9.exe.exe | — | mtk.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 | |||||||||||||||
| 600 | C:\Windows\system32\net1 stop BackupExecJobEngine /y | C:\Windows\SysWOW64\net1.exe | — | net.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Net Command Exit code: 2 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | |||||||||||||||
| 752 | "net.exe" stop CASAD2DWebSvc /y | C:\Windows\SysWOW64\net.exe | — | 5d40615701c48a122e44f831e7c8643d07765629a83b15d090587f469c77693d.exe.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Net Command Exit code: 2 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | |||||||||||||||
| 792 | "C:\Users\admin\AppData\Local\Temp\.tmpGcwzRs\21.exe.exe" | C:\Users\admin\AppData\Local\Temp\.tmpGcwzRs\21.exe.exe | — | mtk.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 3221226540 Modules
| |||||||||||||||
| 984 | "net.exe" stop ccSetMgr /y | C:\Windows\SysWOW64\net.exe | — | 5d40615701c48a122e44f831e7c8643d07765629a83b15d090587f469c77693d.exe.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Net Command Exit code: 2 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | |||||||||||||||
| 984 | C:\Windows\system32\net1 stop PDVFSService /y | C:\Windows\SysWOW64\net1.exe | — | net.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Net Command Exit code: 2 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | |||||||||||||||
| 992 | "C:\Users\admin\AppData\Local\Temp\.tmpGcwzRs\03641e5632673615f23b2a8325d7355c4499a40f47b6ae094606a73c56e24ad0.exe.exe" | C:\Users\admin\AppData\Local\Temp\.tmpGcwzRs\03641e5632673615f23b2a8325d7355c4499a40f47b6ae094606a73c56e24ad0.exe.exe | — | mtk.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Help Service Exit code: 0 Version: 2, 0, 0, 2 Modules
| |||||||||||||||
| (PID) Process: | (2612) mtk.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\156\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (2004) 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (2004) 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (2004) 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (2004) 0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (3016) 0468127a19daf4c7bc41015c5640fe1f.exe.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
| Operation: | write | Name: | ProxyEnable |
Value: 0 | |||
| (PID) Process: | (3016) 0468127a19daf4c7bc41015c5640fe1f.exe.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections |
| Operation: | write | Name: | SavedLegacySettings |
Value: 46000000C1000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
| (PID) Process: | (3016) 0468127a19daf4c7bc41015c5640fe1f.exe.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (3016) 0468127a19daf4c7bc41015c5640fe1f.exe.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (2468) cmd.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2612 | mtk.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506 | binary | |
MD5:26B8C301554A9D8BCCCF4DD93016E383 | SHA256:AA84904EB011D4EA7CC847AB1E70617FB2654B6CD491876D49F67931E7364225 | |||
| 2612 | mtk.exe | C:\Users\admin\AppData\Local\Temp\TarCD00.tmp | binary | |
MD5:9441737383D21192400ECA82FDA910EC | SHA256:BC3A6E84E41FAEB57E7C21AA3B60C2A64777107009727C5B7C0ED8FE658909E5 | |||
| 2612 | mtk.exe | C:\Users\admin\AppData\Local\Temp\.tmpGcwzRs\01259a104a0199b794b0c61fcfc657eb766b2caeae68d5c6b164a53a97874257.exe.exe | executable | |
MD5:460B288A581CDEB5F831D102CB6D198B | SHA256:01259A104A0199B794B0C61FCFC657EB766B2CAEAE68D5C6B164A53A97874257 | |||
| 2612 | mtk.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506 | compressed | |
MD5:F3441B8572AAE8801C04F3060B550443 | SHA256:6720349E7D82EE0A8E73920D3C2B7CB2912D9FCF2EDB6FD98F2F12820158B0BF | |||
| 2612 | mtk.exe | C:\Users\admin\AppData\Local\Temp\.tmpGcwzRs\0dc2ab0ccf783fb39028326a7e8b0ba4eaa148020ec05fc26313ef2bf70f700f.exe.exe | executable | |
MD5:77B645EF1C599F289F3D462A09048C49 | SHA256:0DC2AB0CCF783FB39028326A7E8B0BA4EAA148020EC05FC26313EF2BF70F700F | |||
| 2612 | mtk.exe | C:\Users\admin\AppData\Local\Temp\.tmpGcwzRs\0cfc34fa76228b1afc7ce63e284a23ce1cd2927e6159b9dea9702ad9cb2a6300.exe.exe | executable | |
MD5:34409ABA1F76045AA0255E49DE16D586 | SHA256:0CFC34FA76228B1AFC7CE63E284A23CE1CD2927E6159B9DEA9702AD9CB2A6300 | |||
| 2612 | mtk.exe | C:\Users\admin\AppData\Local\Temp\.tmpGcwzRs\03641e5632673615f23b2a8325d7355c4499a40f47b6ae094606a73c56e24ad0.exe.exe | executable | |
MD5:2B9106E8DF3AA98C3654A4E0733D83E7 | SHA256:03641E5632673615F23B2A8325D7355C4499A40F47B6AE094606A73C56E24AD0 | |||
| 2612 | mtk.exe | C:\Users\admin\AppData\Local\Temp\.tmpGcwzRs\0d7d4dc173c88c4f72c8f9f419ae8473d044f4b3e8f32e4a0f34fe4bbc698776.exe.exe | executable | |
MD5:60D083B7C74CC84F38074A5D02A2C07C | SHA256:0D7D4DC173C88C4F72C8F9F419AE8473D044F4B3E8F32E4A0F34FE4BBC698776 | |||
| 2612 | mtk.exe | C:\Users\admin\AppData\Local\Temp\CabCCFF.tmp | compressed | |
MD5:F3441B8572AAE8801C04F3060B550443 | SHA256:6720349E7D82EE0A8E73920D3C2B7CB2912D9FCF2EDB6FD98F2F12820158B0BF | |||
| 2612 | mtk.exe | C:\Users\admin\AppData\Local\Temp\.tmpGcwzRs\08fd696873ed9df967a991fb397fe11e54a4367c81c6660575e1413b440c3af2.exe.exe | executable | |
MD5:C4DE3FEA790F8FF6452016DB5D7AA33F | SHA256:08FD696873ED9DF967A991FB397FE11E54A4367C81C6660575E1413B440C3AF2 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
— | — | GET | 404 | 188.40.187.155:80 | http://mynexa.io/hfv23svj2/plugins/scr.dll | unknown | — | — | unknown |
— | — | GET | 404 | 123.57.60.215:80 | http://123.57.60.215/DotNetLoader40.exe | unknown | text | 19 b | unknown |
— | — | GET | 404 | 123.57.60.215:80 | http://123.57.60.215/beacon.txt | unknown | text | 19 b | unknown |
— | — | GET | 404 | 123.57.60.215:80 | http://123.57.60.215/beacon.txt | unknown | text | 19 b | unknown |
2612 | mtk.exe | GET | 200 | 209.197.3.8:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?e5937c9360690284 | unknown | compressed | 61.6 Kb | unknown |
— | — | GET | 404 | 123.57.60.215:80 | http://123.57.60.215/DotNetLoader40.exe | unknown | text | 19 b | unknown |
— | — | GET | 200 | 13.248.169.48:80 | http://yumproject.com/wp-content/uploads/2014/11/questd.pdf | unknown | html | 12.1 Kb | unknown |
— | — | GET | 404 | 58.158.177.102:80 | http://flash-update.buyonebuy.top/flach.php | unknown | html | 207 b | unknown |
— | — | GET | 200 | 13.248.169.48:80 | http://yumproject.com/wp-content/uploads/2014/11/questd.pdf | unknown | html | 12.1 Kb | unknown |
— | — | GET | 200 | 132.226.8.169:80 | http://checkip.dyndns.org/ | unknown | html | 106 b | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | unknown |
324 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
2612 | mtk.exe | 45.67.85.72:443 | m.crep.vip | — | US | unknown |
2612 | mtk.exe | 209.197.3.8:80 | ctldl.windowsupdate.com | STACKPATH-CDN | US | whitelisted |
1956 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
2892 | 0d7d4dc173c88c4f72c8f9f419ae8473d044f4b3e8f32e4a0f34fe4bbc698776.exe.exe | 58.158.177.102:443 | flash-update.buyonebuy.top | ARTERIA Networks Corporation | JP | unknown |
3016 | 0468127a19daf4c7bc41015c5640fe1f.exe.exe | 193.135.12.107:80 | — | LLC Baxet | RU | malicious |
2452 | utilview.exe | 132.226.8.169:80 | checkip.dyndns.org | ORACLE-BMC-31898 | JP | unknown |
— | — | 95.181.46.38:14307 | — | E-Light-Telecom Ltd. | RU | unknown |
Domain | IP | Reputation |
|---|---|---|
m.crep.vip |
| unknown |
ctldl.windowsupdate.com |
| whitelisted |
flash-update.buyonebuy.top |
| unknown |
checkip.dyndns.org |
| shared |
www.microsoft.com |
| whitelisted |
www.google.com |
| whitelisted |
exusin.ru |
| unknown |
imagisp.ru |
| unknown |
cudgewit.ru |
| unknown |
mynexa.io |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
324 | svchost.exe | Potentially Bad Traffic | ET DNS Query to a *.top domain - Likely Hostile |
324 | svchost.exe | Device Retrieving External IP Address Detected | ET INFO External IP Lookup Domain in DNS Query (checkip .dyndns .org) |
324 | svchost.exe | Misc activity | AV INFO Query to checkip.dyndns. Domain |
— | — | A Network Trojan was detected | ET MALWARE Common Upatre Header Structure 2 |
— | — | Device Retrieving External IP Address Detected | ET MALWARE Upatre External IP Check |
— | — | A Network Trojan was detected | ET MALWARE Mazilla Suspicious User-Agent Jan 15 2015 |
— | — | Device Retrieving External IP Address Detected | ET POLICY External IP Lookup - checkip.dyndns.org |
2892 | 0d7d4dc173c88c4f72c8f9f419ae8473d044f4b3e8f32e4a0f34fe4bbc698776.exe.exe | Domain Observed Used for C2 Detected | ET MALWARE Malicious SSL certificate detected (Possible Sinkhole) |
— | — | A Network Trojan was detected | ET MALWARE Common Upatre Header Structure 2 |
— | — | A Network Trojan was detected | ET MALWARE Mazilla Suspicious User-Agent Jan 15 2015 |
Process | Message |
|---|---|
vlc.exe | core libvlc: one instance mode ENABLED
|
7249b1a5082c9d9654d9fac3bb5e965ea23e395554d3351b77dd4f29677426fe.exe.exe | Script Error |
7249b1a5082c9d9654d9fac3bb5e965ea23e395554d3351b77dd4f29677426fe.exe.exe | Run OK |