| download: | File_pass1234.7z |
| Full analysis: | https://app.any.run/tasks/142e399e-f83d-4a0f-a853-cf085e6f8c96 |
| Verdict: | Malicious activity |
| Threats: | Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks. |
| Analysis date: | June 13, 2023, 20:21:14 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-7z-compressed |
| File info: | 7-zip archive data, version 0.4 |
| MD5: | 5D8247884739DBFA2355697F29DFF1E5 |
| SHA1: | 93D5CF504819AD65A4B8BAC59555153F7135BA81 |
| SHA256: | 1AF498CE6C55C10486204397ECCD2F633F9169235269C99467F908B5631733D2 |
| SSDEEP: | 98304:0zwsgldyUmaUISVKKP1VF6L/YQNP+Zku0ALWAiaUqmdhsHCOq24roLvoR6fhAgFb:0zwL/lmNFKKP1vUAEP+iA1l+h0HqrGvl |
| .7z | | | 7-Zip compressed archive (v0.4) (57.1) |
|---|---|---|
| .7z | | | 7-Zip compressed archive (gen) (42.8) |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 116 | C:\Windows\SysWOW64\explorer.exe | C:\Windows\SysWOW64\explorer.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 124 | "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "admin:N"&&CACLS "oneetx.exe" /P "admin:R" /E&&echo Y|CACLS "..\207aa4515d" /P "admin:N"&&CACLS "..\207aa4515d" /P "admin:R" /E&&Exit | C:\Windows\SysWOW64\cmd.exe | — | oneetx.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 148 | schtasks /create /f /RU "admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST | C:\Windows\SysWOW64\schtasks.exe | — | HMOGkA1cbtJnGbgRByM_Y6fG.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Manages scheduled tasks Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 188 | /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\admin\AppData\Roaming\Microsoft\Network\mstsca.exe" | C:\Windows\SysWOW64\schtasks.exe | — | build3.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Manages scheduled tasks Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 272 | C:\Windows\explorer.exe | C:\Windows\explorer.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 276 | taskkill /im "Rec613.exe" /f | C:\Windows\SysWOW64\taskkill.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Terminates Processes Exit code: 128 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 280 | C:\Users\admin\AppData\Local\Temp\6A4D.exe | C:\Users\admin\AppData\Local\Temp\6A4D.exe | 6A4D.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 464 | "C:\Users\admin\AppData\Local\Temp\2a344302.exe" | C:\Users\admin\AppData\Local\Temp\2a344302.exe | LFOqf5aQugu4X88TvOj_2Mqp.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 548 | "C:\Users\admin\AppData\Local\845c4473-54f7-4b1e-b327-80f7d77e6734\build2.exe" | C:\Users\admin\AppData\Local\845c4473-54f7-4b1e-b327-80f7d77e6734\build2.exe | — | 2B5.exe | |||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 548 | C:\Users\admin\AppData\Local\Temp\430B.exe | C:\Users\admin\AppData\Local\Temp\430B.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Description: Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
| (PID) Process: | (1960) explorer.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0 |
| Operation: | write | Name: | CheckSetting |
Value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| |||
| (PID) Process: | (2436) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\14C\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (1960) explorer.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count |
| Operation: | write | Name: | {6Q809377-6NS0-444O-8957-N3773S02200R}\JvaENE\JvaENE.rkr |
Value: 000000000B000000050000001E9A0000000080BF000080BF000080BF000080BF000080BF000080BF000080BF000080BF000080BF000080BFFFFFFFFF30D9B8CEF2F1D80100000000 | |||
| (PID) Process: | (1960) explorer.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count |
| Operation: | write | Name: | HRZR_PGYFRFFVBA |
Value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| |||
| (PID) Process: | (2436) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip | |||
| (PID) Process: | (2436) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\Win7AndW2K8R2-KB3191566-x64.zip | |||
| (PID) Process: | (2436) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\Desktop\phacker.zip | |||
| (PID) Process: | (2436) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (2436) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (2436) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2436 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXb2436.17935\File.exe | — | |
MD5:— | SHA256:— | |||
| 2408 | File.exe | C:\Users\admin\Pictures\Minor Policy\ibtFpfoCTsrOvzoMhlu8ufls.exe | html | |
MD5:81F7A08F650AA005B8EC636C9E385065 | SHA256:04CBBABD3A2B199EBFE272F04EEF2EEF33B033B987E1E3B13096D7DE7988BA90 | |||
| 2408 | File.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\K78MRVB5\6523[1].exe | executable | |
MD5:3C465371B9755C67FECA54FEE5FA174B | SHA256:61BD39FF52FF66E58A3F46C49EE5F2453C1DF77E911782D163DDF06CC36E4EC8 | |||
| 2408 | File.exe | C:\Users\admin\Pictures\Minor Policy\JW4f3rUCy6X9QMYYU8sy5NJI.exe | executable | |
MD5:2A9C91D22B235EF9675F44B871A03A83 | SHA256:1FAF53A182B0295309F4E97E21469BE2867A9B0669D1E9FECA5EF45A64B82089 | |||
| 2408 | File.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BDW1XBVN\qdk2rlsncuqts[1].exe | executable | |
MD5:2A9C91D22B235EF9675F44B871A03A83 | SHA256:1FAF53A182B0295309F4E97E21469BE2867A9B0669D1E9FECA5EF45A64B82089 | |||
| 2408 | File.exe | C:\Windows\System32\GroupPolicy\gpt.ini | text | |
MD5:39DFFC602ED934569F26BE44EC645814 | SHA256:B57A88E5B1ACF3A784BE88B87FA3EE1F0991CB7C1C66DA423F3595FFC6E0C5C2 | |||
| 2408 | File.exe | C:\Users\admin\Pictures\Minor Policy\bhHfPuUtWMmk3BgmQh8i9Q_U.exe | executable | |
MD5:918731493DC265322EB7B5563061A665 | SHA256:6887704723D5A6150375AAC34FD0F2728FDF221FC064AEAC93D9A7BF5A6C0FF6 | |||
| 2408 | File.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BDW1XBVN\setup[1].exe | executable | |
MD5:90F614FE546A7695D570693A7E94C3E2 | SHA256:34E9AD66AAE30CB28066412B4BFA9C8C57943650C49B9FBDF9E65946E3DA54D1 | |||
| 2408 | File.exe | C:\Windows\System32\GroupPolicy\Machine\Registry.pol | binary | |
MD5:CDFD60E717A44C2349B553E011958B85 | SHA256:0EE08DA4DA3E4133E1809099FC646468E7156644C9A772F704B80E338015211F | |||
| 2408 | File.exe | C:\Users\admin\Pictures\Minor Policy\LFOqf5aQugu4X88TvOj_2Mqp.exe | executable | |
MD5:8A06751312436A705C6404180C8B1519 | SHA256:0875F2085B2F40B96DB96D317CFDD1D870541182D4200DE33FAE9CBEFAF07797 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2408 | File.exe | HEAD | 200 | 45.12.253.74:80 | http://45.12.253.74/pineapple.php?pub=mixinte | BG | — | — | malicious |
2408 | File.exe | HEAD | — | 176.113.115.239:80 | http://176.113.115.239:8080/4.php | RU | — | — | suspicious |
2408 | File.exe | HEAD | — | 194.169.175.124:80 | http://194.169.175.124:3002/ | US | — | — | malicious |
2408 | File.exe | HEAD | — | 83.97.73.131:80 | http://83.97.73.131/gallery/photo221.exe | unknown | — | — | malicious |
2408 | File.exe | HEAD | 403 | 188.114.96.0:80 | http://ji.jahhaega2qq.com/m/p0aw25.exe | US | — | — | malicious |
2408 | File.exe | HEAD | 200 | 45.9.74.80:80 | http://45.9.74.80/obins.exe | SC | — | — | malicious |
2408 | File.exe | HEAD | — | 91.215.85.147:80 | http://hugersi.com/dl/6523.exe | RU | — | — | suspicious |
2408 | File.exe | GET | — | 45.12.253.74:80 | http://45.12.253.74/pineapple.php?pub=mixinte | BG | — | — | malicious |
2408 | File.exe | GET | — | 194.169.175.124:3002 | http://194.169.175.124:3002/ | US | — | — | malicious |
2408 | File.exe | HEAD | 200 | 163.123.143.4:80 | http://163.123.143.4/download/Service32.exe | unknown | — | — | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
2408 | File.exe | 208.67.104.60:80 | — | Delis LLC | US | malicious |
328 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
2408 | File.exe | 104.26.8.59:443 | api.myip.com | CLOUDFLARENET | US | suspicious |
2408 | File.exe | 87.240.132.72:80 | vk.com | VKontakte Ltd | RU | suspicious |
2408 | File.exe | 87.240.132.72:443 | vk.com | VKontakte Ltd | RU | suspicious |
2408 | File.exe | 194.169.175.124:80 | — | — | US | malicious |
2408 | File.exe | 176.113.115.239:80 | — | Red Bytes LLC | RU | suspicious |
2408 | File.exe | 45.9.74.6:80 | — | Delta Ltd | SC | malicious |
2408 | File.exe | 83.97.73.131:80 | — | — | — | malicious |
Domain | IP | Reputation |
|---|---|---|
api.myip.com |
| suspicious |
ipinfo.io |
| shared |
vk.com |
| whitelisted |
teredo.ipv6.microsoft.com |
| whitelisted |
ji.jahhaega2qq.com |
| malicious |
hugersi.com |
| suspicious |
dns.msftncsi.com |
| shared |
telegram.org |
| whitelisted |
twitter.com |
| whitelisted |
yandex.ru |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2408 | File.exe | Device Retrieving External IP Address Detected | ET INFO Observed External IP Lookup Domain in TLS SNI (api .myip .com) |
2408 | File.exe | Malware Command and Control Activity Detected | ET MALWARE Win32/BeamWinHTTP CnC Activity M2 (GET) |
2408 | File.exe | Device Retrieving External IP Address Detected | ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io) |
2408 | File.exe | Misc Attack | ET DROP Spamhaus DROP Listed Traffic Inbound group 20 |
2408 | File.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
2408 | File.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
2408 | File.exe | A Network Trojan was detected | ET MALWARE Single char EXE direct download likely trojan (multiple families) |
2408 | File.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
2408 | File.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
2408 | File.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |