File name:

2025-05-26_087296e84b7705ae74c07e8860103c3a_amadey_black-basta_elex_floxif_hellokitty_luca-stealer

Full analysis: https://app.any.run/tasks/9be3397e-7ee5-4f05-9973-5d0598352710
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: May 26, 2025, 22:26:55
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
loader
upx
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

087296E84B7705AE74C07E8860103C3A

SHA1:

B2382ED57FC187CFD7772E2126558316917BD751

SHA256:

12CCABDFA17FA6374C1EC132F8C9768C6CF1154775E2D14C1F76A2AB5E3FADFE

SSDEEP:

49152:7qOp6gLi430ChI8W4GnSimtW43arpxrngS38TY5aStT5X8w0NMVoJQA5Jy8F5IEp:uOsO3jhXnEbmtT3ar7gSsSPMw0NMVZA3

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • 2025-05-26_087296e84b7705ae74c07e8860103c3a_amadey_black-basta_elex_floxif_hellokitty_luca-stealer.exe (PID: 1128)
      • GoogleUpdateSetup.exe (PID: 6436)
    • Connects to the CnC server

      • 2025-05-26_087296e84b7705ae74c07e8860103c3a_amadey_black-basta_elex_floxif_hellokitty_luca-stealer.exe (PID: 1128)
      • GoogleUpdateSetup.exe (PID: 6436)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • 2025-05-26_087296e84b7705ae74c07e8860103c3a_amadey_black-basta_elex_floxif_hellokitty_luca-stealer.exe (PID: 1128)
      • GoogleUpdateSetup.exe (PID: 6436)
    • Executable content was dropped or overwritten

      • 2025-05-26_087296e84b7705ae74c07e8860103c3a_amadey_black-basta_elex_floxif_hellokitty_luca-stealer.exe (PID: 1128)
      • GoogleUpdateSetup.exe (PID: 6436)
      • 137.0.7151.41_chrome_installer.exe (PID: 8104)
    • Reads security settings of Internet Explorer

      • 2025-05-26_087296e84b7705ae74c07e8860103c3a_amadey_black-basta_elex_floxif_hellokitty_luca-stealer.exe (PID: 1128)
      • GoogleUpdate.exe (PID: 7148)
      • GoogleUpdateSetup.exe (PID: 6436)
      • GoogleUpdate.exe (PID: 6072)
      • GoogleUpdate.exe (PID: 7240)
    • Starts itself from another location

      • GoogleUpdate.exe (PID: 6072)
    • Contacting a server suspected of hosting an CnC

      • 2025-05-26_087296e84b7705ae74c07e8860103c3a_amadey_black-basta_elex_floxif_hellokitty_luca-stealer.exe (PID: 1128)
      • GoogleUpdateSetup.exe (PID: 6436)
    • There is functionality for taking screenshot (YARA)

      • GoogleUpdate.exe (PID: 7148)
      • GoogleUpdate.exe (PID: 7240)
      • GoogleUpdate.exe (PID: 6072)
    • Potential Corporate Privacy Violation

      • svchost.exe (PID: 6488)
    • Process requests binary or script from the Internet

      • svchost.exe (PID: 6488)
    • Application launched itself

      • setup.exe (PID: 1096)
  • INFO

    • The sample compiled with english language support

      • 2025-05-26_087296e84b7705ae74c07e8860103c3a_amadey_black-basta_elex_floxif_hellokitty_luca-stealer.exe (PID: 1128)
      • GoogleUpdateSetup.exe (PID: 6436)
      • svchost.exe (PID: 6488)
      • 137.0.7151.41_chrome_installer.exe (PID: 8104)
    • Checks supported languages

      • 2025-05-26_087296e84b7705ae74c07e8860103c3a_amadey_black-basta_elex_floxif_hellokitty_luca-stealer.exe (PID: 1128)
      • GoogleUpdate.exe (PID: 7148)
      • GoogleUpdateSetup.exe (PID: 6436)
      • GoogleUpdate.exe (PID: 6072)
      • GoogleUpdate.exe (PID: 6456)
      • GoogleUpdate.exe (PID: 6828)
      • GoogleUpdate.exe (PID: 7240)
      • setup.exe (PID: 1096)
      • 137.0.7151.41_chrome_installer.exe (PID: 8104)
      • setup.exe (PID: 7996)
    • The sample compiled with arabic language support

      • 2025-05-26_087296e84b7705ae74c07e8860103c3a_amadey_black-basta_elex_floxif_hellokitty_luca-stealer.exe (PID: 1128)
      • GoogleUpdateSetup.exe (PID: 6436)
    • Failed to create an executable file in Windows directory

      • 2025-05-26_087296e84b7705ae74c07e8860103c3a_amadey_black-basta_elex_floxif_hellokitty_luca-stealer.exe (PID: 1128)
    • Reads the computer name

      • 2025-05-26_087296e84b7705ae74c07e8860103c3a_amadey_black-basta_elex_floxif_hellokitty_luca-stealer.exe (PID: 1128)
      • GoogleUpdate.exe (PID: 7148)
      • GoogleUpdateSetup.exe (PID: 6436)
      • GoogleUpdate.exe (PID: 6072)
      • GoogleUpdate.exe (PID: 6456)
      • GoogleUpdate.exe (PID: 6828)
      • GoogleUpdate.exe (PID: 7240)
      • 137.0.7151.41_chrome_installer.exe (PID: 8104)
      • setup.exe (PID: 1096)
    • The sample compiled with czech language support

      • 2025-05-26_087296e84b7705ae74c07e8860103c3a_amadey_black-basta_elex_floxif_hellokitty_luca-stealer.exe (PID: 1128)
      • GoogleUpdateSetup.exe (PID: 6436)
    • The sample compiled with bulgarian language support

      • 2025-05-26_087296e84b7705ae74c07e8860103c3a_amadey_black-basta_elex_floxif_hellokitty_luca-stealer.exe (PID: 1128)
      • GoogleUpdateSetup.exe (PID: 6436)
    • The sample compiled with french language support

      • 2025-05-26_087296e84b7705ae74c07e8860103c3a_amadey_black-basta_elex_floxif_hellokitty_luca-stealer.exe (PID: 1128)
      • GoogleUpdateSetup.exe (PID: 6436)
    • The sample compiled with Italian language support

      • 2025-05-26_087296e84b7705ae74c07e8860103c3a_amadey_black-basta_elex_floxif_hellokitty_luca-stealer.exe (PID: 1128)
      • GoogleUpdateSetup.exe (PID: 6436)
    • The sample compiled with german language support

      • 2025-05-26_087296e84b7705ae74c07e8860103c3a_amadey_black-basta_elex_floxif_hellokitty_luca-stealer.exe (PID: 1128)
      • GoogleUpdateSetup.exe (PID: 6436)
    • The sample compiled with japanese language support

      • 2025-05-26_087296e84b7705ae74c07e8860103c3a_amadey_black-basta_elex_floxif_hellokitty_luca-stealer.exe (PID: 1128)
      • GoogleUpdateSetup.exe (PID: 6436)
    • The sample compiled with Indonesian language support

      • 2025-05-26_087296e84b7705ae74c07e8860103c3a_amadey_black-basta_elex_floxif_hellokitty_luca-stealer.exe (PID: 1128)
      • GoogleUpdateSetup.exe (PID: 6436)
    • The sample compiled with korean language support

      • 2025-05-26_087296e84b7705ae74c07e8860103c3a_amadey_black-basta_elex_floxif_hellokitty_luca-stealer.exe (PID: 1128)
      • GoogleUpdateSetup.exe (PID: 6436)
    • The sample compiled with portuguese language support

      • 2025-05-26_087296e84b7705ae74c07e8860103c3a_amadey_black-basta_elex_floxif_hellokitty_luca-stealer.exe (PID: 1128)
      • GoogleUpdateSetup.exe (PID: 6436)
    • Create files in a temporary directory

      • 2025-05-26_087296e84b7705ae74c07e8860103c3a_amadey_black-basta_elex_floxif_hellokitty_luca-stealer.exe (PID: 1128)
      • GoogleUpdateSetup.exe (PID: 6436)
      • GoogleUpdate.exe (PID: 7240)
      • svchost.exe (PID: 6488)
    • The sample compiled with russian language support

      • 2025-05-26_087296e84b7705ae74c07e8860103c3a_amadey_black-basta_elex_floxif_hellokitty_luca-stealer.exe (PID: 1128)
      • GoogleUpdateSetup.exe (PID: 6436)
    • The sample compiled with polish language support

      • 2025-05-26_087296e84b7705ae74c07e8860103c3a_amadey_black-basta_elex_floxif_hellokitty_luca-stealer.exe (PID: 1128)
      • GoogleUpdateSetup.exe (PID: 6436)
    • The sample compiled with slovak language support

      • 2025-05-26_087296e84b7705ae74c07e8860103c3a_amadey_black-basta_elex_floxif_hellokitty_luca-stealer.exe (PID: 1128)
      • GoogleUpdateSetup.exe (PID: 6436)
    • The sample compiled with chinese language support

      • 2025-05-26_087296e84b7705ae74c07e8860103c3a_amadey_black-basta_elex_floxif_hellokitty_luca-stealer.exe (PID: 1128)
      • GoogleUpdateSetup.exe (PID: 6436)
    • The sample compiled with turkish language support

      • 2025-05-26_087296e84b7705ae74c07e8860103c3a_amadey_black-basta_elex_floxif_hellokitty_luca-stealer.exe (PID: 1128)
      • GoogleUpdateSetup.exe (PID: 6436)
    • The sample compiled with swedish language support

      • 2025-05-26_087296e84b7705ae74c07e8860103c3a_amadey_black-basta_elex_floxif_hellokitty_luca-stealer.exe (PID: 1128)
      • GoogleUpdateSetup.exe (PID: 6436)
    • Process checks computer location settings

      • GoogleUpdate.exe (PID: 7148)
      • GoogleUpdate.exe (PID: 6072)
    • Checks proxy server information

      • 2025-05-26_087296e84b7705ae74c07e8860103c3a_amadey_black-basta_elex_floxif_hellokitty_luca-stealer.exe (PID: 1128)
      • GoogleUpdateSetup.exe (PID: 6436)
      • GoogleUpdate.exe (PID: 6828)
      • GoogleUpdate.exe (PID: 7240)
      • slui.exe (PID: 7932)
    • Creates files in the program directory

      • GoogleUpdate.exe (PID: 6072)
      • GoogleUpdateSetup.exe (PID: 6436)
      • GoogleUpdate.exe (PID: 6828)
      • GoogleUpdate.exe (PID: 7240)
      • 137.0.7151.41_chrome_installer.exe (PID: 8104)
      • setup.exe (PID: 1096)
    • Reads the software policy settings

      • GoogleUpdate.exe (PID: 7240)
      • GoogleUpdate.exe (PID: 6828)
      • slui.exe (PID: 7932)
    • Reads the machine GUID from the registry

      • GoogleUpdate.exe (PID: 6828)
      • GoogleUpdate.exe (PID: 7240)
    • Creates files or folders in the user directory

      • GoogleUpdate.exe (PID: 7240)
    • UPX packer has been detected

      • 2025-05-26_087296e84b7705ae74c07e8860103c3a_amadey_black-basta_elex_floxif_hellokitty_luca-stealer.exe (PID: 1128)
      • GoogleUpdateSetup.exe (PID: 6436)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (76.4)
.exe | Win32 Executable (generic) (12.4)
.exe | Generic Win/DOS Executable (5.5)
.exe | DOS Executable Generic (5.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2020:11:18 23:04:24+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.2
CodeSize: 83456
InitializedDataSize: 1213440
UninitializedDataSize: -
EntryPoint: 0x4f17
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 1.3.36.52
ProductVersionNumber: 1.3.36.52
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: Google LLC
FileDescription: Google Update Setup
FileVersion: 1.3.36.52
InternalName: Google Update Setup
LegalCopyright: Copyright 2018 Google LLC
OriginalFileName: GoogleUpdateSetup.exe
ProductName: Google Update
ProductVersion: 1.3.36.52
LanguageId: en
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
136
Monitored processes
12
Malicious processes
3
Suspicious processes
1

Behavior graph

Click at the process to see the details
start 2025-05-26_087296e84b7705ae74c07e8860103c3a_amadey_black-basta_elex_floxif_hellokitty_luca-stealer.exe googleupdate.exe no specs googleupdatesetup.exe googleupdate.exe no specs googleupdate.exe no specs googleupdate.exe googleupdate.exe svchost.exe slui.exe 137.0.7151.41_chrome_installer.exe setup.exe no specs setup.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1096"C:\Program Files (x86)\Google\Update\Install\{0E94C0A2-BE0C-4A48-BD2D-26C37ED74593}\CR_9E3B0.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Google\Update\Install\{0E94C0A2-BE0C-4A48-BD2D-26C37ED74593}\CR_9E3B0.tmp\CHROME.PACKED.7Z" --verbose-logging --do-not-launch-chrome --channel=stable --system-level /installerdata="C:\Program Files (x86)\Google\Update\Install\{0E94C0A2-BE0C-4A48-BD2D-26C37ED74593}\gui11F2.tmp"C:\Program Files (x86)\Google\Update\Install\{0E94C0A2-BE0C-4A48-BD2D-26C37ED74593}\CR_9E3B0.tmp\setup.exe137.0.7151.41_chrome_installer.exe
User:
admin
Company:
Google LLC
Integrity Level:
HIGH
Description:
Google Chrome Installer
Version:
137.0.7151.41
Modules
Images
c:\program files (x86)\google\update\install\{0e94c0a2-be0c-4a48-bd2d-26c37ed74593}\cr_9e3b0.tmp\setup.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\acgenral.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1128"C:\Users\admin\Desktop\2025-05-26_087296e84b7705ae74c07e8860103c3a_amadey_black-basta_elex_floxif_hellokitty_luca-stealer.exe" C:\Users\admin\Desktop\2025-05-26_087296e84b7705ae74c07e8860103c3a_amadey_black-basta_elex_floxif_hellokitty_luca-stealer.exe
explorer.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Update Setup
Version:
1.3.36.52
Modules
Images
c:\users\admin\desktop\2025-05-26_087296e84b7705ae74c07e8860103c3a_amadey_black-basta_elex_floxif_hellokitty_luca-stealer.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\shlwapi.dll
6072"C:\Program Files (x86)\Google\Temp\GUME4EE.tmp\GoogleUpdate.exe" /installsource taggedmi /install "appguid={8A69D345-D564-463C-AFF1-A69D9E530F96}&iid={7F82B9D2-D4B8-FCAF-3A19-9CF8DD0FDA41}&lang=en&browser=4&usagestats=0&appname=Google%20Chrome&needsadmin=prefers&ap=x64-stable-statsdef_1&brand=CHBD&installdataindex=empty" /installelevatedC:\Program Files (x86)\Google\Temp\GUME4EE.tmp\GoogleUpdate.exeGoogleUpdateSetup.exe
User:
admin
Company:
Google LLC
Integrity Level:
HIGH
Description:
Google Installer
Version:
1.3.36.51
Modules
Images
c:\program files (x86)\google\temp\gume4ee.tmp\googleupdate.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
6436"C:\Users\admin\AppData\Local\Temp\GUMD5EB.tmp\GoogleUpdateSetup.exe" /installsource taggedmi /install "appguid={8A69D345-D564-463C-AFF1-A69D9E530F96}&iid={7F82B9D2-D4B8-FCAF-3A19-9CF8DD0FDA41}&lang=en&browser=4&usagestats=0&appname=Google%20Chrome&needsadmin=prefers&ap=x64-stable-statsdef_1&brand=CHBD&installdataindex=empty" /installelevated /nomitagC:\Users\admin\AppData\Local\Temp\GUMD5EB.tmp\GoogleUpdateSetup.exe
GoogleUpdate.exe
User:
admin
Company:
Google LLC
Integrity Level:
HIGH
Description:
Google Update Setup
Version:
1.3.36.52
Modules
Images
c:\users\admin\appdata\local\temp\gumd5eb.tmp\googleupdatesetup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\shlwapi.dll
6456"C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /healthcheckC:\Program Files (x86)\Google\Update\GoogleUpdate.exeGoogleUpdate.exe
User:
admin
Company:
Google LLC
Integrity Level:
HIGH
Description:
Google Installer
Exit code:
0
Version:
1.3.36.51
Modules
Images
c:\program files (x86)\google\update\googleupdate.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
6488C:\WINDOWS\System32\svchost.exe -k netsvcs -p -s BITSC:\Windows\System32\svchost.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
6828"C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4zNi41MiIgc2hlbGxfdmVyc2lvbj0iMS4zLjM2LjUxIiBpc21hY2hpbmU9IjEiIHNlc3Npb25pZD0iezlBNzYzQUE5LTk2ODAtNDhFRC04QzMyLTQzRDUzMTUzOEU4OX0iIGluc3RhbGxzb3VyY2U9InRhZ2dlZG1pIiByZXF1ZXN0aWQ9IntDQ0IyMjc3Ny05MEUwLTQ2ODYtQTI0OS05NkQ3RjJEQzJEOTV9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IHBoeXNtZW1vcnk9IjQiIHNzZT0iMSIgc3NlMj0iMSIgc3NlMz0iMSIgc3NzZTM9IjEiIHNzZTQxPSIxIiBzc2U0Mj0iMSIgYXZ4PSIxIi8-PG9zIHBsYXRmb3JtPSJ3aW4iIHZlcnNpb249IjEwLjAuMTkwNDUuNDA0NiIgc3A9IiIgYXJjaD0ieDY0Ii8-PGFwcCBhcHBpZD0iezQzMEZENEQwLUI3MjktNEY2MS1BQTM0LTkxNTI2NDgxNzk5RH0iIHZlcnNpb249IjEuMy4zNi4zNzIiIG5leHR2ZXJzaW9uPSIxLjMuMzYuNTIiIGxhbmc9ImVuIiBicmFuZD0iQ0hCRCIgY2xpZW50PSIiIGlpZD0iezdGODJCOUQyLUQ0QjgtRkNBRi0zQTE5LTlDRjhERDBGREE0MX0iPjxldmVudCBldmVudHR5cGU9IjIiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIGluc3RhbGxfdGltZV9tcz0iNTMxIi8-PC9hcHA-PC9yZXF1ZXN0PgC:\Program Files (x86)\Google\Update\GoogleUpdate.exe
GoogleUpdate.exe
User:
admin
Company:
Google LLC
Integrity Level:
HIGH
Description:
Google Installer
Exit code:
0
Version:
1.3.36.51
Modules
Images
c:\program files (x86)\google\update\googleupdate.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
7148C:\Users\admin\AppData\Local\Temp\GUMD5EB.tmp\GoogleUpdate.exe /installsource taggedmi /install "appguid={8A69D345-D564-463C-AFF1-A69D9E530F96}&iid={7F82B9D2-D4B8-FCAF-3A19-9CF8DD0FDA41}&lang=en&browser=4&usagestats=0&appname=Google%20Chrome&needsadmin=prefers&ap=x64-stable-statsdef_1&brand=CHBD&installdataindex=empty"C:\Users\admin\AppData\Local\Temp\GUMD5EB.tmp\GoogleUpdate.exe2025-05-26_087296e84b7705ae74c07e8860103c3a_amadey_black-basta_elex_floxif_hellokitty_luca-stealer.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Installer
Version:
1.3.36.51
Modules
Images
c:\users\admin\appdata\local\temp\gumd5eb.tmp\googleupdate.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
7240"C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /handoff "appguid={8A69D345-D564-463C-AFF1-A69D9E530F96}&iid={7F82B9D2-D4B8-FCAF-3A19-9CF8DD0FDA41}&lang=en&browser=4&usagestats=0&appname=Google%20Chrome&needsadmin=prefers&ap=x64-stable-statsdef_1&brand=CHBD&installdataindex=empty" /installsource taggedmi /sessionid "{9A763AA9-9680-48ED-8C32-43D531538E89}"C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
GoogleUpdate.exe
User:
admin
Company:
Google LLC
Integrity Level:
HIGH
Description:
Google Installer
Version:
1.3.36.51
Modules
Images
c:\program files (x86)\google\update\googleupdate.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
7932C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
19 904
Read events
15 950
Write events
3 943
Delete events
11

Modification events

(PID) Process:(1128) 2025-05-26_087296e84b7705ae74c07e8860103c3a_amadey_black-basta_elex_floxif_hellokitty_luca-stealer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(1128) 2025-05-26_087296e84b7705ae74c07e8860103c3a_amadey_black-basta_elex_floxif_hellokitty_luca-stealer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(1128) 2025-05-26_087296e84b7705ae74c07e8860103c3a_amadey_black-basta_elex_floxif_hellokitty_luca-stealer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(7148) GoogleUpdate.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Update
Operation:delete valueName:uid
Value:
(PID) Process:(7148) GoogleUpdate.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Update
Operation:delete valueName:old-uid
Value:
(PID) Process:(6436) GoogleUpdateSetup.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(6436) GoogleUpdateSetup.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(6436) GoogleUpdateSetup.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(6072) GoogleUpdate.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:delete valueName:usagestats
Value:
(PID) Process:(6072) GoogleUpdate.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientState\{430FD4D0-B729-4F61-AA34-91526481799D}
Operation:delete valueName:UpdateAvailableCount
Value:
Executable files
152
Suspicious files
4
Text files
4
Unknown types
0

Dropped files

PID
Process
Filename
Type
11282025-05-26_087296e84b7705ae74c07e8860103c3a_amadey_black-basta_elex_floxif_hellokitty_luca-stealer.exeC:\Users\admin\AppData\Local\Temp\GUMD5EB.tmp\GoogleUpdate.exeexecutable
MD5:3AA2C853D6BC7AF7F2F9B8A934943EFD
SHA256:07034876B9EC0B59432B96FEDB7E10E332440159F9802FAAD5F5B99F01885F6B
11282025-05-26_087296e84b7705ae74c07e8860103c3a_amadey_black-basta_elex_floxif_hellokitty_luca-stealer.exeC:\Users\admin\AppData\Local\Temp\GUMD5EB.tmp\GoogleUpdateBroker.exeexecutable
MD5:F75F7FA66251839C45818040A6A37B95
SHA256:A42E52D85CE20B21D4831EAE860A8C8D05604772B2DBA24A97931C6B2054F64E
11282025-05-26_087296e84b7705ae74c07e8860103c3a_amadey_black-basta_elex_floxif_hellokitty_luca-stealer.exeC:\Users\admin\AppData\Local\Temp\conres.dllexecutable
MD5:7574CF2C64F35161AB1292E2F532AABF
SHA256:DE055A89DE246E629A8694BDE18AF2B1605E4B9B493C7E4AEF669DD67ACF5085
11282025-05-26_087296e84b7705ae74c07e8860103c3a_amadey_black-basta_elex_floxif_hellokitty_luca-stealer.exeC:\Users\admin\AppData\Local\Temp\GUMD5EB.tmp\GoogleUpdateHelper.msiexecutable
MD5:00D01757986F9699ED1776192B23879B
SHA256:255D41980163063182D9F737088D16D175674B031A92E7425FE5AEDBCBBF16E2
11282025-05-26_087296e84b7705ae74c07e8860103c3a_amadey_black-basta_elex_floxif_hellokitty_luca-stealer.exeC:\Users\admin\AppData\Local\Temp\GUMD5EB.tmp\goopdate.dllexecutable
MD5:0641DF9070EC08DD057DA0B2698D7638
SHA256:B627ADE37396D38B372917A2E24BB1B20DADBDC64203895910C9B2ED7D198447
11282025-05-26_087296e84b7705ae74c07e8860103c3a_amadey_black-basta_elex_floxif_hellokitty_luca-stealer.exeC:\Users\admin\AppData\Local\Temp\GUMD5EB.tmp\GoogleUpdateOnDemand.exeexecutable
MD5:6E07D38F57F11856BB57F8A07E3905F4
SHA256:7B5A33D5D3ECB3BD3D08139F67C38D78546EA5F2BE2814A727E82D5DAD94022F
11282025-05-26_087296e84b7705ae74c07e8860103c3a_amadey_black-basta_elex_floxif_hellokitty_luca-stealer.exeC:\Users\admin\AppData\Local\Temp\GUMD5EB.tmp\GoogleUpdateComRegisterShell64.exeexecutable
MD5:ED9A0098D3115A7A0D2A46C5BC1A2487
SHA256:13CC01C5C92A0465D7CEFF6E6B576AC001E07F29176565F38805013B252E4142
11282025-05-26_087296e84b7705ae74c07e8860103c3a_amadey_black-basta_elex_floxif_hellokitty_luca-stealer.exeC:\Users\admin\AppData\Local\Temp\GUMD5EB.tmp\psmachine.dllexecutable
MD5:A59EC6F5C4E0F5D61F35EC4423F47138
SHA256:309DD7407C9932FD7AD391CB61D41311A90B866EFC9EBF482E570307846D79D8
11282025-05-26_087296e84b7705ae74c07e8860103c3a_amadey_black-basta_elex_floxif_hellokitty_luca-stealer.exeC:\Users\admin\AppData\Local\Temp\GUMD5EB.tmp\psmachine_64.dllexecutable
MD5:2DD1579DA65CBE6DB7519E15C35EFFF6
SHA256:B2521C5A5283D79FDCB5649BBED5EEFD817C8953D69664325E7BD395AD483817
11282025-05-26_087296e84b7705ae74c07e8860103c3a_amadey_black-basta_elex_floxif_hellokitty_luca-stealer.exeC:\Users\admin\AppData\Local\Temp\GUMD5EB.tmp\psuser.dllexecutable
MD5:2B9B95A2322505B4EEEA883701BD9058
SHA256:1171C84D0C96EE61FD3FA6A5BAC5569872EB99A081201E9C73A7FA70A68A3775
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
42
TCP/UDP connections
53
DNS requests
28
Threats
15

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6800
RUXIMICS.exe
GET
200
2.16.168.114:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6800
RUXIMICS.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1128
2025-05-26_087296e84b7705ae74c07e8860103c3a_amadey_black-basta_elex_floxif_hellokitty_luca-stealer.exe
GET
76.223.54.146:80
http://www.aieov.com/logo.gif
unknown
malicious
1128
2025-05-26_087296e84b7705ae74c07e8860103c3a_amadey_black-basta_elex_floxif_hellokitty_luca-stealer.exe
GET
88.255.216.16:80
http://88.255.216.16/landpage?op=4&ms=http://www.aieov.com/logo.gif
unknown
malicious
6436
GoogleUpdateSetup.exe
GET
76.223.54.146:80
http://www.aieov.com/logo.gif
unknown
malicious
6436
GoogleUpdateSetup.exe
GET
88.255.216.16:80
http://88.255.216.16/landpage?op=4&ms=http://www.aieov.com/logo.gif
unknown
malicious
POST
200
142.250.185.67:443
https://update.googleapis.com/service/update2?cup2key=13:tqrQOgory_su4KZ8fZCqoHDeCZzZzaDAlU5A1NL6yWE&cup2hreq=a9b36755bb2bba573d2302008d1925c875152945e6d22755cfff6349e4124743
unknown
xml
701 Kb
whitelisted
GET
200
142.250.186.164:443
https://dl.google.com/update2/installers/icons/%7B8A69D345-D564-463C-AFF1-A69D9E530F96%7D.bmp
unknown
image
6.52 Kb
whitelisted
POST
200
142.250.185.67:443
https://update.googleapis.com/service/update2
unknown
xml
233 b
whitelisted
6436
GoogleUpdateSetup.exe
GET
76.223.54.146:80
http://www.aieov.com/logo.gif
unknown
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
6800
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6800
RUXIMICS.exe
2.16.168.114:80
crl.microsoft.com
Akamai International B.V.
RU
whitelisted
6800
RUXIMICS.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
1128
2025-05-26_087296e84b7705ae74c07e8860103c3a_amadey_black-basta_elex_floxif_hellokitty_luca-stealer.exe
76.223.54.146:80
www.aieov.com
AMAZON-02
US
malicious
1128
2025-05-26_087296e84b7705ae74c07e8860103c3a_amadey_black-basta_elex_floxif_hellokitty_luca-stealer.exe
88.255.216.16:80
Turk Telekom
TR
malicious
6436
GoogleUpdateSetup.exe
76.223.54.146:80
www.aieov.com
AMAZON-02
US
malicious
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6828
GoogleUpdate.exe
216.58.206.67:443
update.googleapis.com
GOOGLE
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
google.com
  • 142.250.185.110
whitelisted
crl.microsoft.com
  • 2.16.168.114
  • 2.16.168.124
  • 23.53.40.178
  • 23.53.40.176
whitelisted
5isohu.com
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 23.35.229.160
whitelisted
www.aieov.com
  • 76.223.54.146
  • 13.248.169.48
malicious
client.wns.windows.com
  • 172.211.123.248
whitelisted
update.googleapis.com
  • 216.58.206.67
whitelisted
dl.google.com
  • 142.250.186.174
whitelisted
edgedl.me.gvt1.com
  • 34.104.35.123
whitelisted

Threats

PID
Process
Class
Message
1128
2025-05-26_087296e84b7705ae74c07e8860103c3a_amadey_black-basta_elex_floxif_hellokitty_luca-stealer.exe
Malware Command and Control Activity Detected
MALWARE [ANY.RUN] Possible Floxif CnC Communication
6436
GoogleUpdateSetup.exe
Malware Command and Control Activity Detected
MALWARE [ANY.RUN] Possible Floxif CnC Communication
1128
2025-05-26_087296e84b7705ae74c07e8860103c3a_amadey_black-basta_elex_floxif_hellokitty_luca-stealer.exe
Malware Command and Control Activity Detected
MALWARE [ANY.RUN] Possible Floxif CnC Communication
6488
svchost.exe
Potential Corporate Privacy Violation
ET INFO PE EXE or DLL Windows file download HTTP
6488
svchost.exe
Misc activity
ET INFO EXE - Served Attached HTTP
6488
svchost.exe
Misc activity
ET INFO Packed Executable Download
1128
2025-05-26_087296e84b7705ae74c07e8860103c3a_amadey_black-basta_elex_floxif_hellokitty_luca-stealer.exe
Malware Command and Control Activity Detected
MALWARE [ANY.RUN] Possible Floxif CnC Communication
1128
2025-05-26_087296e84b7705ae74c07e8860103c3a_amadey_black-basta_elex_floxif_hellokitty_luca-stealer.exe
Malware Command and Control Activity Detected
MALWARE [ANY.RUN] Possible Floxif CnC Communication
1128
2025-05-26_087296e84b7705ae74c07e8860103c3a_amadey_black-basta_elex_floxif_hellokitty_luca-stealer.exe
Malware Command and Control Activity Detected
MALWARE [ANY.RUN] Possible Floxif CnC Communication
1128
2025-05-26_087296e84b7705ae74c07e8860103c3a_amadey_black-basta_elex_floxif_hellokitty_luca-stealer.exe
Malware Command and Control Activity Detected
MALWARE [ANY.RUN] Possible Floxif CnC Communication
No debug info