| File name: | SecuriteInfo.com.Win32.Evo-gen.25528.31768 |
| Full analysis: | https://app.any.run/tasks/2b2e9d81-09ef-46b3-a7eb-b8aa371e9077 |
| Verdict: | Malicious activity |
| Threats: | Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks. |
| Analysis date: | July 26, 2025, 19:21:22 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections |
| MD5: | 9568D883B40FE309F0E072FDF0562DE6 |
| SHA1: | 6C56315100E4AB596C5C770F81CFDB88EB6CDECF |
| SHA256: | 1967625692921A306F4D8565B67E1EDF9C1DA2988D67A76C93659F5A91D546F5 |
| SSDEEP: | 6144:3ugbfowURCrMbxMW5fTHjlqRmHb0/Mli0M8jimYmcCQd:3uAfRr0xz5fTHjYmHY/uNsn |
| .exe | | | Generic CIL Executable (.NET, Mono, etc.) (82.9) |
|---|---|---|
| .dll | | | Win32 Dynamic Link Library (generic) (7.4) |
| .exe | | | Win32 Executable (generic) (5.1) |
| .exe | | | Generic Win/DOS Executable (2.2) |
| .exe | | | DOS Executable Generic (2.2) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2025:07:26 17:55:28+00:00 |
| ImageFileCharacteristics: | Executable, Large address aware, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 11 |
| CodeSize: | 291840 |
| InitializedDataSize: | 2048 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x4926e |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 1.0.0.0 |
| ProductVersionNumber: | 1.0.0.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| Comments: | - |
| CompanyName: | - |
| FileDescription: | DownloaderApp |
| FileVersion: | 1.0.0.0 |
| InternalName: | DownloaderApp.exe |
| LegalCopyright: | Copyright © 2025 |
| LegalTrademarks: | - |
| OriginalFileName: | DownloaderApp.exe |
| ProductName: | DownloaderApp |
| ProductVersion: | 1.0.0.0 |
| AssemblyVersion: | 1.0.0.0 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 512 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 620 | "PowerShell.exe" -NoProfile -NonInteractive -Command - | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | regsvr32.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 632 | "C:\Program Files\Google\Chrome\Application\chrome.exe" | C:\Program Files\Google\Chrome\Application\chrome.exe | — | explorer.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: MEDIUM Description: Google Chrome Exit code: 21 Version: 133.0.6943.127 Modules
| |||||||||||||||
| 864 | "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=renderer --log-severity=disable --user-agent-product="ReaderServices/23.1.20093 Chrome/105.0.0.0" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --touch-events=enabled --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1768 --field-trial-handle=1644,i,3275181678895515611,2714572304330829550,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:1 | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe | — | AcroCEF.exe | |||||||||||
User: admin Company: Adobe Systems Incorporated Integrity Level: LOW Description: Adobe AcroCEF Exit code: 0 Version: 23.1.20093.0 Modules
| |||||||||||||||
| 1036 | "C:\WINDOWS\system32\regsvr32.exe" /s /i:googlechromebusiness.msi "C:\Users\admin\AppData\Local\LightSlateGray2.pfx" | C:\Windows\SysWOW64\regsvr32.exe | — | J2CPKV6.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft(C) Register Server Exit code: 3221225477 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1128 | "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | — | MSBuild.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Edge Exit code: 0 Version: 133.0.3065.92 Modules
| |||||||||||||||
| 1128 | "C:\Users\admin\AppData\Local\Temp\10209120101\ea742eec0b.exe" | C:\Users\admin\AppData\Local\Temp\10209120101\ea742eec0b.exe | — | ea742eec0b.exe | |||||||||||
User: admin Integrity Level: MEDIUM | |||||||||||||||
| 1136 | "C:\Users\admin\AppData\Local\Temp\10209120101\ea742eec0b.exe" | C:\Users\admin\AppData\Local\Temp\10209120101\ea742eec0b.exe | — | IhsE9b0j.fUNA | |||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
| 1156 | "cmd.exe" /c icacls "C:\Users\admin\Desktop\IhsE9b0j.fUNA" /inheritance:r /grant SYSTEM:F /grant Everyone:RX | C:\Windows\SysWOW64\cmd.exe | — | SecuriteInfo.com.Win32.Evo-gen.25528.31768.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1268 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=2388,i,4380079522719876771,2358125912034967026,262144 --variations-seed-version --mojo-platform-channel-handle=4684 /prefetch:1 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 133.0.6943.127 Modules
| |||||||||||||||
| (PID) Process: | (3768) IhsE9b0j.fUNA | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (3768) IhsE9b0j.fUNA | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (3768) IhsE9b0j.fUNA | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (2508) 7rpIPkQ.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Spurdo |
| Operation: | write | Name: | language |
Value: en | |||
| (PID) Process: | (2508) 7rpIPkQ.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Spurdo |
| Operation: | write | Name: | system_optimization |
Value: 1 | |||
| (PID) Process: | (2508) 7rpIPkQ.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Spurdo |
| Operation: | write | Name: | auto_start |
Value: 1 | |||
| (PID) Process: | (2508) 7rpIPkQ.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Spurdo |
| Operation: | write | Name: | alternative_injector |
Value: 48 | |||
| (PID) Process: | (2508) 7rpIPkQ.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Spurdo |
| Operation: | write | Name: | path |
Value: C:\Spurdo\ | |||
| (PID) Process: | (4844) WerFault.exe | Key: | \REGISTRY\A\{ce54583c-c435-70ae-2393-ae9d83a78251}\Root\InventoryApplicationFile |
| Operation: | write | Name: | WritePermissionsCheck |
Value: 1 | |||
| (PID) Process: | (4844) WerFault.exe | Key: | \REGISTRY\A\{ce54583c-c435-70ae-2393-ae9d83a78251}\Root\InventoryApplicationFile\PermissionsCheckTestKey |
| Operation: | delete key | Name: | (default) |
Value: | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3844 | SecuriteInfo.com.Win32.Evo-gen.25528.31768.exe | C:\Users\admin\Desktop\IhsE9b0j.fUNA | executable | |
MD5:156F4A8F006779A3493D9D476F1E8DDA | SHA256:C36ED034D523DA1F54D43176334D4BDA9F9ADCB940948646B43902A620EBDA45 | |||
| 3768 | IhsE9b0j.fUNA | C:\Users\admin\AppData\Local\Temp\10208970101\generateLoader.exe | text | |
MD5:56322E566B91147558A76562C31570A2 | SHA256:4AA23BD348B44D7EC05E8FA15A22530360950A357FB5AE2F98B4552F1EFB622F | |||
| 1336 | J2CPKV6.exe | C:\Users\admin\AppData\Local\Temp\is-0IOOI.tmp\J2CPKV6.tmp | executable | |
MD5:E119C945C3F94D46BC73E2A17A52897C | SHA256:D9432AEA01FC2D6C4D2F39D03DA1CE5B19F6E35B2F8DD000D9FA3836D81601A0 | |||
| 3768 | IhsE9b0j.fUNA | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B46811C17859FFB409CF0E904A4AA8F8 | binary | |
MD5:1FBB37F79B317A9A248E7C4CE4F5BAC5 | SHA256:9BF639C595FE335B6F694EE35990BEFD2123F5E07FD1973FF619E3FC88F5F49F | |||
| 3768 | IhsE9b0j.fUNA | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12 | binary | |
MD5:FCA9E8A069C38A0210D3E0C88B32CE6C | SHA256:E2A8DE9AAF85EE266DA8D57564C739B33E7882D2C42511231746483CA9468DA2 | |||
| 3768 | IhsE9b0j.fUNA | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8 | binary | |
MD5:8C0AD3C8CBA5C21DF20F5379DC66EAE7 | SHA256:B2457AAA652DADFE187E382BF750A40099B387602E59A33EF85183283C962C93 | |||
| 3768 | IhsE9b0j.fUNA | C:\Users\admin\AppData\Local\Temp\10208980101\cheat.exe | html | |
MD5:4A0DE87C37EA7F3FC444D751532565B0 | SHA256:0E3DF7A54DD34A7443D94FED130D5ABD7C441C7671E411F93B9767920B003D34 | |||
| 6816 | J2CPKV6.exe | C:\Users\admin\AppData\Local\Temp\is-N7465.tmp\J2CPKV6.tmp | executable | |
MD5:E119C945C3F94D46BC73E2A17A52897C | SHA256:D9432AEA01FC2D6C4D2F39D03DA1CE5B19F6E35B2F8DD000D9FA3836D81601A0 | |||
| 2508 | 7rpIPkQ.exe | C:\Users\admin\AppData\Local\Temp\loader.log | text | |
MD5:877B5B8B61CEC42521A8DD78C865B555 | SHA256:15F4327A7CD1E9D9DA6753A56F866D5D37C2B6D442F2520A587FE5D51FCD89F5 | |||
| 3768 | IhsE9b0j.fUNA | C:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\KCV3KQBA\7rpIPkQ[1].exe | executable | |
MD5:04B05C8FFD76A0E2BE304AD14401428F | SHA256:A71252457565CDB9D490D0CFED81A41EFC32935BE8063EE6DE23EEE98857C5B2 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3768 | IhsE9b0j.fUNA | GET | 200 | 176.46.158.8:80 | http://176.46.158.8/app/random.exe | unknown | — | — | unknown |
3768 | IhsE9b0j.fUNA | POST | 200 | 94.154.35.25:80 | http://94.154.35.25/di9ku38f/index.php | unknown | — | — | unknown |
3768 | IhsE9b0j.fUNA | POST | 200 | 94.154.35.25:80 | http://94.154.35.25/di9ku38f/index.php | unknown | — | — | unknown |
1268 | svchost.exe | GET | 200 | 23.55.110.211:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
1268 | svchost.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
3768 | IhsE9b0j.fUNA | POST | 200 | 94.154.35.25:80 | http://94.154.35.25/di9ku38f/index.php | unknown | — | — | unknown |
3768 | IhsE9b0j.fUNA | GET | 200 | 142.250.184.195:80 | http://c.pki.goog/r/gsr1.crl | unknown | — | — | whitelisted |
3768 | IhsE9b0j.fUNA | POST | 200 | 94.154.35.25:80 | http://94.154.35.25/di9ku38f/index.php | unknown | — | — | unknown |
3768 | IhsE9b0j.fUNA | GET | 200 | 142.250.184.195:80 | http://c.pki.goog/r/r4.crl | unknown | — | — | whitelisted |
3948 | svchost.exe | GET | 200 | 2.17.190.73:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
5944 | MoUsoCoreWorker.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
1268 | svchost.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
1976 | RUXIMICS.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
3768 | IhsE9b0j.fUNA | 94.154.35.25:80 | — | WINDSTREAM | US | unknown |
3768 | IhsE9b0j.fUNA | 176.46.158.8:80 | — | — | IR | unknown |
1268 | svchost.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
1268 | svchost.exe | 23.55.110.211:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
1268 | svchost.exe | 95.101.149.131:80 | www.microsoft.com | Akamai International B.V. | NL | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
api.spurdo.me |
| unknown |
c.pki.goog |
| whitelisted |
spurdo.me |
| unknown |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
3768 | IhsE9b0j.fUNA | Misc Attack | ET DROP Spamhaus DROP Listed Traffic Inbound group 16 |
3768 | IhsE9b0j.fUNA | Malware Command and Control Activity Detected | BOTNET [ANY.RUN] Amadey HTTP POST Request (st=s) |
3768 | IhsE9b0j.fUNA | Malware Command and Control Activity Detected | ET MALWARE Amadey CnC Response |
3768 | IhsE9b0j.fUNA | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
3768 | IhsE9b0j.fUNA | Misc Attack | ET DROP Spamhaus DROP Listed Traffic Inbound group 34 |
3768 | IhsE9b0j.fUNA | Potentially Bad Traffic | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |
3768 | IhsE9b0j.fUNA | Potentially Bad Traffic | ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response |
3768 | IhsE9b0j.fUNA | Potential Corporate Privacy Violation | ET INFO PE EXE or DLL Windows file download HTTP |
— | — | Unknown Traffic | ET USER_AGENTS Microsoft Dr Watson User-Agent (MSDW) |
3768 | IhsE9b0j.fUNA | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
Process | Message |
|---|---|
YT1For2.exe |
%s------------------------------------------------
--- Themida Professional ---
--- (c)2012 Oreans Technologies ---
------------------------------------------------
|
GyFYLGD.exe | 1959xka&2alSklh0 |