| URL: | https://boraflow.click |
| Full analysis: | https://app.any.run/tasks/32a6e71e-beff-4c72-a4d5-fadf9cc24ce6 |
| Verdict: | Malicious activity |
| Threats: | Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks. |
| Analysis date: | July 14, 2023, 23:24:27 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 64 bit) |
| Tags: | |
| Indicators: | |
| MD5: | 2F17E2573EAAAC5AD05DD98AA1DDC688 |
| SHA1: | E6522EDB1834C345E33105994EEC2537C83E1068 |
| SHA256: | 104B3CD96A1A45EC98B1A9BC98E2A39E8B4EB9F60FE9535A89F4A1D91C66103C |
| SSDEEP: | 3:N87au:29 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 148 | CACLS "..\c2868ed41c" /P "admin:R" /E | C:\Windows\SysWOW64\cacls.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Control ACLs Program Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 572 | "C:\Users\admin\AppData\Local\Temp\c2868ed41c\jbruyer.exe" | C:\Users\admin\AppData\Local\Temp\c2868ed41c\jbruyer.exe | 33485718709684821295.exe | ||||||||||||
User: admin Company: NortonLifeLock Inc. Integrity Level: MEDIUM Description: Norton Remove and Reinstall Exit code: 0 Version: 4.5.0.157 Modules
| |||||||||||||||
| 668 | "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe | Setups1.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: AddInProcess.exe Exit code: 0 Version: 4.7.2558.0 built by: NET471REL1 Modules
| |||||||||||||||
| 2120 | CACLS "jbruyer.exe" /P "admin:R" /E | C:\Windows\SysWOW64\cacls.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Control ACLs Program Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2208 | "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2456.6.1759457091\782632702" -parentBuildID 20230710165010 -prefsHandle 2908 -prefMapHandle 2912 -prefsLen 25927 -prefMapSize 242647 -appDir "C:\Program Files\Mozilla Firefox\browser" - {596a9ab1-f236-4590-8b68-c186925f3f01} 2456 "\\.\pipe\gecko-crash-server-pipe.2456" 2892 1d0e1f58 rdd | C:\Program Files\Mozilla Firefox\firefox.exe | — | firefox.exe | |||||||||||
User: admin Company: Mozilla Corporation Integrity Level: LOW Description: Firefox Exit code: 0 Version: 115.0.2 Modules
| |||||||||||||||
| 2268 | "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "jbruyer.exe" /P "admin:N"&&CACLS "jbruyer.exe" /P "admin:R" /E&&echo Y|CACLS "..\c2868ed41c" /P "admin:N"&&CACLS "..\c2868ed41c" /P "admin:R" /E&&Exit | C:\Windows\SysWOW64\cmd.exe | — | jbruyer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 2312 | "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2456.4.1609688618\136042366" -childID 3 -isForBrowser -prefsHandle 2672 -prefMapHandle 2676 -prefsLen 23517 -prefMapSize 242647 -jsInitHandle 908 -jsInitLen 240908 -parentBuildID 20230710165010 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9872fc59-eb63-467b-99f4-3bcde320b20c} 2456 "\\.\pipe\gecko-crash-server-pipe.2456" 2660 1973e858 tab | C:\Program Files\Mozilla Firefox\firefox.exe | — | firefox.exe | |||||||||||
User: admin Company: Mozilla Corporation Integrity Level: LOW Description: Firefox Exit code: 0 Version: 115.0.2 Modules
| |||||||||||||||
| 2368 | "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2456.0.1997569638\2052684237" -parentBuildID 20230710165010 -prefsHandle 1260 -prefMapHandle 1264 -prefsLen 24055 -prefMapSize 242647 -appDir "C:\Program Files\Mozilla Firefox\browser" - {25840ebb-8115-446b-aa01-0816ee76f589} 2456 "\\.\pipe\gecko-crash-server-pipe.2456" 1180 13851258 gpu | C:\Program Files\Mozilla Firefox\firefox.exe | — | firefox.exe | |||||||||||
User: admin Company: Mozilla Corporation Integrity Level: LOW Description: Firefox Exit code: 0 Version: 115.0.2 Modules
| |||||||||||||||
| 2456 | "C:\Program Files\Mozilla Firefox\firefox.exe" "https://boraflow.click" | C:\Program Files\Mozilla Firefox\firefox.exe | explorer.exe | ||||||||||||
User: admin Company: Mozilla Corporation Integrity Level: MEDIUM Description: Firefox Exit code: 0 Version: 115.0.2 Modules
| |||||||||||||||
| 2532 | "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2456.3.2076233146\481971839" -childID 2 -isForBrowser -prefsHandle 1936 -prefMapHandle 2264 -prefsLen 25822 -prefMapSize 242647 -jsInitHandle 908 -jsInitLen 240908 -parentBuildID 20230710165010 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7916fbb9-7e3a-486f-b8b8-3f1e685d7dc3} 2456 "\\.\pipe\gecko-crash-server-pipe.2456" 1564 d77c58 tab | C:\Program Files\Mozilla Firefox\firefox.exe | — | firefox.exe | |||||||||||
User: admin Company: Mozilla Corporation Integrity Level: LOW Description: Firefox Exit code: 0 Version: 115.0.2 Modules
| |||||||||||||||
| (PID) Process: | (2456) firefox.exe | Key: | HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher |
| Operation: | write | Name: | C:\Program Files\Mozilla Firefox\firefox.exe|Browser |
Value: 0000000000000000 | |||
| (PID) Process: | (2576) firefox.exe | Key: | HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher |
| Operation: | write | Name: | C:\Program Files\Mozilla Firefox\firefox.exe|Browser |
Value: 0000000000000000 | |||
| (PID) Process: | (2456) firefox.exe | Key: | HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher |
| Operation: | write | Name: | C:\Program Files\Mozilla Firefox\firefox.exe|Telemetry |
Value: 1 | |||
| (PID) Process: | (2456) firefox.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
| Operation: | write | Name: | ProxyEnable |
Value: 0 | |||
| (PID) Process: | (2456) firefox.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections |
| Operation: | write | Name: | SavedLegacySettings |
Value: 460000008F000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
| (PID) Process: | (2456) firefox.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\155\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (3716) slui.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\Activation |
| Operation: | write | Name: | LastAction |
Value: B2CBB71A03000000 | |||
| (PID) Process: | (3716) slui.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\Activation |
| Operation: | write | Name: | ActionId |
Value: 7 | |||
| (PID) Process: | (2456) firefox.exe | Key: | HKEY_CURRENT_USER\Software\Mozilla\Firefox\PreXULSkeletonUISettings |
| Operation: | write | Name: | C:\Program Files\Mozilla Firefox\firefox.exe|ScreenX |
Value: 144 | |||
| (PID) Process: | (2456) firefox.exe | Key: | HKEY_CURRENT_USER\Software\Mozilla\Firefox\PreXULSkeletonUISettings |
| Operation: | write | Name: | C:\Program Files\Mozilla Firefox\firefox.exe|ScreenY |
Value: 354 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2456 | firefox.exe | C:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\nltxvmn2.default\webappsstore.sqlite-wal | — | |
MD5:— | SHA256:— | |||
| 2456 | firefox.exe | C:\Users\admin\AppData\Roaming\Mozilla\Firefox\Crash Reports\InstallTime20230710165010 | text | |
MD5:DE06D52BB8A52819583F84E61A9C8060 | SHA256:84457865ACC5B183E63D955D936F193636D87864FD974A6BB943B08915DF8B7F | |||
| 2456 | firefox.exe | C:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\nltxvmn2.default\cookies.sqlite-wal | binary | |
MD5:CB337C69FEF6735FEC8C0DD0786AEDB6 | SHA256:F363475D9B8768312413365091FC909AEAAD79465C58B49D8A0881705AE47267 | |||
| 2456 | firefox.exe | C:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\nltxvmn2.default\compatibility.ini | text | |
MD5:C6998EF9E767E571FE74299C971B9C98 | SHA256:69C387E1BE9E3C5A5BE3B767F5734E7E31755B67C3F6F409D175FB9265D53F2E | |||
| 2456 | firefox.exe | C:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\nltxvmn2.default\permissions.sqlite-journal | binary | |
MD5:EB1091337B6DB79E11438CD4F8EB7B06 | SHA256:E95B70CF1C5D3011CD70F1089F99A1CEAB3B0BA63907FB4FFE94BBB86EDD4E11 | |||
| 2456 | firefox.exe | C:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\nltxvmn2.default\prefs-1.js | text | |
MD5:4C492605362F9EBA49973EB9950FE67E | SHA256:D8B428061A1542EAD90724585491086D188250BDFEA0F8AE358C4D5A87AEAF8D | |||
| 2456 | firefox.exe | C:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\nltxvmn2.default\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite-shm | binary | |
MD5:B7C14EC6110FA820CA6B65F5AEC85911 | SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB | |||
| 2456 | firefox.exe | C:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\nltxvmn2.default\sessionCheckpoints.json.tmp | binary | |
MD5:EA8B62857DFDBD3D0BE7D7E4A954EC9A | SHA256:792955295AE9C382986222C6731C5870BD0E921E7F7E34CC4615F5CD67F225DA | |||
| 2456 | firefox.exe | C:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\nltxvmn2.default\cookies.sqlite-shm | binary | |
MD5:0E57A98A1B758C757880D0750D77FE11 | SHA256:11D47954B63164FAE7FA41899C8EACAA36015E667EFCC6EEFB0B7915B8214D87 | |||
| 2456 | firefox.exe | C:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\nltxvmn2.default\storage\permanent\chrome\idb\3561288849sdhlie.sqlite-shm | binary | |
MD5:B7C14EC6110FA820CA6B65F5AEC85911 | SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2456 | firefox.exe | GET | 301 | 104.21.90.243:80 | http://boraflow.click/ | US | — | — | malicious |
2456 | firefox.exe | POST | 200 | 104.86.110.200:80 | http://r3.o.lencr.org/ | GB | der | 503 b | shared |
— | — | POST | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/ | US | binary | 471 b | whitelisted |
2456 | firefox.exe | POST | 200 | 104.86.110.200:80 | http://r3.o.lencr.org/ | GB | binary | 503 b | shared |
2456 | firefox.exe | POST | 200 | 104.86.110.200:80 | http://r3.o.lencr.org/ | GB | binary | 503 b | shared |
2456 | firefox.exe | POST | 200 | 104.86.110.200:80 | http://r3.o.lencr.org/ | GB | binary | 503 b | shared |
2456 | firefox.exe | POST | 200 | 142.250.185.99:80 | http://ocsp.pki.goog/gts1c3 | US | binary | 472 b | whitelisted |
2456 | firefox.exe | POST | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/ | US | binary | 471 b | whitelisted |
2456 | firefox.exe | POST | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/ | US | der | 471 b | whitelisted |
2456 | firefox.exe | POST | 200 | 142.250.185.99:80 | http://ocsp.pki.goog/gts1c3 | US | binary | 471 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
2456 | firefox.exe | 34.107.221.82:80 | detectportal.firefox.com | GOOGLE | US | whitelisted |
2456 | firefox.exe | 104.21.90.243:443 | boraflow.click | CLOUDFLARENET | — | unknown |
2456 | firefox.exe | 34.117.237.239:443 | contile.services.mozilla.com | GOOGLE-CLOUD-PLATFORM | US | suspicious |
2456 | firefox.exe | 52.55.246.60:443 | spocs.getpocket.com | AMAZON-AES | US | unknown |
2456 | firefox.exe | 34.149.100.209:443 | firefox.settings.services.mozilla.com | GOOGLE | US | suspicious |
2456 | firefox.exe | 52.222.226.205:80 | ocsp.r2m02.amazontrust.com | AMAZON-02 | US | unknown |
2456 | firefox.exe | 104.86.110.200:80 | r3.o.lencr.org | Akamai International B.V. | GB | unknown |
2456 | firefox.exe | 192.229.221.95:80 | ocsp.digicert.com | EDGECAST | US | whitelisted |
2456 | firefox.exe | 34.117.65.55:443 | push.services.mozilla.com | GOOGLE-CLOUD-PLATFORM | US | suspicious |
Domain | IP | Reputation |
|---|---|---|
detectportal.firefox.com |
| whitelisted |
boraflow.click |
| unknown |
prod.detectportal.prod.cloudops.mozgcp.net |
| whitelisted |
example.org |
| whitelisted |
ipv4only.arpa |
| whitelisted |
contile.services.mozilla.com |
| whitelisted |
spocs.getpocket.com |
| shared |
proxyserverecs-1736642167.us-east-1.elb.amazonaws.com |
| shared |
r3.o.lencr.org |
| shared |
a1887.dscq.akamai.net |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
668 | AddInProcess32.exe | Misc activity | ET INFO Observed Telegram Domain (t .me in TLS SNI) |
668 | AddInProcess32.exe | Potentially Bad Traffic | ET INFO Dotted Quad Host ZIP Request |
572 | jbruyer.exe | Malware Command and Control Activity Detected | ET MALWARE Amadey CnC Check-In |
572 | jbruyer.exe | A Network Trojan was detected | ET MALWARE Win32/Amadey Bot Activity (POST) M2 |
572 | jbruyer.exe | A Network Trojan was detected | AV TROJAN Agent.DHOA System Info Exfiltration |
572 | jbruyer.exe | Possible Social Engineering Attempted | PHISHING [ANY.RUN] Attempt to send e-mail as POST request |
572 | jbruyer.exe | A Network Trojan was detected | ET MALWARE Amadey Bot Activity (POST) M1 |
572 | jbruyer.exe | Potentially Bad Traffic | ET INFO Dotted Quad Host DLL Request |
572 | jbruyer.exe | Potential Corporate Privacy Violation | AV POLICY HTTP request for .dll file with no User-Agent |
572 | jbruyer.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |