| File name: | 1ec09530c1153453b1bd0989af58808bc44e069c4608c878a64530bb08fa8840.exe |
| Full analysis: | https://app.any.run/tasks/3d8fadba-a088-4158-acbd-422a2bca4f85 |
| Verdict: | Malicious activity |
| Threats: | Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks. |
| Analysis date: | April 30, 2024, 05:18:05 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | F70A70F653AE553A805FD21BC3092B13 |
| SHA1: | 095FF30ABDFDEAA91018556AB4EC92566AD708D4 |
| SHA256: | 1EC09530C1153453B1BD0989AF58808BC44E069C4608C878A64530BB08FA8840 |
| SSDEEP: | 98304:AFI5z1Mf0TjjgzB7J25XW3+5Q97hZacNw0XjAWvlgtQL1THbuUJyt6FuZJzIZf3H:Af |
| .dll | | | Win32 Dynamic Link Library (generic) (43.5) |
|---|---|---|
| .exe | | | Win32 Executable (generic) (29.8) |
| .exe | | | Generic Win/DOS Executable (13.2) |
| .exe | | | DOS Executable Generic (13.2) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2024:03:03 06:02:23+00:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 14.24 |
| CodeSize: | 329216 |
| InitializedDataSize: | 108032 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x32d000 |
| OSVersion: | 6 |
| ImageVersion: | - |
| SubsystemVersion: | 6 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 560 | "C:\Users\admin\1000062002\94905f6096.exe" | C:\Users\admin\1000062002\94905f6096.exe | — | explorha.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 588 | "C:\Users\admin\AppData\Local\Temp\1000056001\300ab8057c.exe" | C:\Users\admin\AppData\Local\Temp\1000056001\300ab8057c.exe | explorha.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: CrossDeviceSettingsHost.exe Exit code: 0 Version: 0.24032.58.0 Modules
| |||||||||||||||
| 948 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --disable-quic --mojo-platform-channel-handle=1552 --field-trial-handle=1104,i,9890173630396074907,2735642200966965143,131072 /prefetch:8 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 4294967295 Version: 109.0.5414.120 Modules
| |||||||||||||||
| 1060 | schtasks /create /f /RU "admin" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST | C:\Windows\System32\schtasks.exe | — | 300ab8057c.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Manages scheduled tasks Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1200 | C:\Users\admin\AppData\Local\Temp\1000150001\NewB.exe | C:\Users\admin\AppData\Local\Temp\1000150001\NewB.exe | — | taskeng.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 1344 | "C:\Users\admin\AppData\Local\Temp\spanv5lkkXKbcFyq\jbc_xRuJlF_oyVDuzrXe.exe" | C:\Users\admin\AppData\Local\Temp\spanv5lkkXKbcFyq\jbc_xRuJlF_oyVDuzrXe.exe | 300ab8057c.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 1576 | schtasks /create /f /RU "admin" /tr "C:\ProgramData\MSIUpdaterV131_999e43077df71fdfc52bd5232a22cf9d\MSIUpdaterV131.exe" /tn "MSIUpdaterV131_999e43077df71fdfc52bd5232a22cf9d LG" /sc ONLOGON /rl HIGHEST | C:\Windows\System32\schtasks.exe | — | explorha.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Manages scheduled tasks Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1652 | "C:\Program Files\Windows Media Player\wmpnscfg.exe" | C:\Program Files\Windows Media Player\wmpnscfg.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Media Player Network Sharing Service Configuration Application Exit code: 0 Version: 12.0.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1948 | "C:\Users\admin\AppData\Local\Temp\09fd851a4f\explorha.exe" | C:\Users\admin\AppData\Local\Temp\09fd851a4f\explorha.exe | explorha.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
| 2008 | C:\Users\admin\AppData\Local\Temp\1000150001\NewB.exe | C:\Users\admin\AppData\Local\Temp\1000150001\NewB.exe | — | taskeng.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| (PID) Process: | (3976) 1ec09530c1153453b1bd0989af58808bc44e069c4608c878a64530bb08fa8840.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (3976) 1ec09530c1153453b1bd0989af58808bc44e069c4608c878a64530bb08fa8840.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (3976) 1ec09530c1153453b1bd0989af58808bc44e069c4608c878a64530bb08fa8840.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (3976) 1ec09530c1153453b1bd0989af58808bc44e069c4608c878a64530bb08fa8840.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (2108) explorha.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (2108) explorha.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (2108) explorha.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (2108) explorha.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
| Operation: | write | Name: | ProxyEnable |
Value: 0 | |||
| (PID) Process: | (2108) explorha.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
| Operation: | delete value | Name: | ProxyServer |
Value: | |||
| (PID) Process: | (2108) explorha.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
| Operation: | delete value | Name: | ProxyOverride |
Value: | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2108 | explorha.exe | C:\Users\admin\AppData\Local\Temp\1000056001\300ab8057c.exe | — | |
MD5:— | SHA256:— | |||
| 2560 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old~RF10959b.TMP | — | |
MD5:— | SHA256:— | |||
| 2560 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old | — | |
MD5:— | SHA256:— | |||
| 2108 | explorha.exe | C:\Users\admin\1000062002\94905f6096.exe | executable | |
MD5:16EF58799E98E0ADD3B504DA264354AE | SHA256:AEBC423D1511A0FCB868AAD7134343B9D991274F5BF75A6D6010480B13850310 | |||
| 2108 | explorha.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z2BCOUL\amert[1].exe | executable | |
MD5:FDB5D35B4DAF6D8406FB18B893427C6D | SHA256:690595177F8C0B812A0A0FBB040DE6A71EEF9C3374DCFD1FD6212C9DF510215F | |||
| 2108 | explorha.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\random[1].exe | executable | |
MD5:16EF58799E98E0ADD3B504DA264354AE | SHA256:AEBC423D1511A0FCB868AAD7134343B9D991274F5BF75A6D6010480B13850310 | |||
| 3976 | 1ec09530c1153453b1bd0989af58808bc44e069c4608c878a64530bb08fa8840.exe | C:\Users\admin\AppData\Local\Temp\09fd851a4f\explorha.exe | executable | |
MD5:F70A70F653AE553A805FD21BC3092B13 | SHA256:1EC09530C1153453B1BD0989AF58808BC44E069C4608C878A64530BB08FA8840 | |||
| 2556 | powershell.exe | C:\Users\admin\AppData\Local\Temp\ait0hlbi.dyt.psm1 | binary | |
MD5:C4CA4238A0B923820DCC509A6F75849B | SHA256:— | |||
| 3976 | 1ec09530c1153453b1bd0989af58808bc44e069c4608c878a64530bb08fa8840.exe | C:\Windows\Tasks\explorha.job | binary | |
MD5:D05BDD5E91573ADAEA70057FCC14D470 | SHA256:3297B05525AB4592D4AB1BF16C3B8FD9E13641A8D298E6EEDF8A3EC1A7A2FB3D | |||
| 2108 | explorha.exe | C:\Users\admin\AppData\Local\Temp\1000059001\amert.exe | executable | |
MD5:FDB5D35B4DAF6D8406FB18B893427C6D | SHA256:690595177F8C0B812A0A0FBB040DE6A71EEF9C3374DCFD1FD6212C9DF510215F | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2108 | explorha.exe | POST | 200 | 193.233.132.56:80 | http://193.233.132.56/Pneh2sXQk0/index.php | unknown | — | — | unknown |
2108 | explorha.exe | POST | 200 | 193.233.132.56:80 | http://193.233.132.56/Pneh2sXQk0/index.php | unknown | — | — | unknown |
2108 | explorha.exe | GET | 200 | 193.233.132.167:80 | http://193.233.132.167/cost/random.exe | unknown | — | — | unknown |
2108 | explorha.exe | POST | 200 | 193.233.132.56:80 | http://193.233.132.56/Pneh2sXQk0/index.php | unknown | — | — | unknown |
2108 | explorha.exe | GET | 200 | 193.233.132.167:80 | http://193.233.132.167/cost/sarra.exe | unknown | — | — | unknown |
2108 | explorha.exe | GET | 200 | 193.233.132.167:80 | http://193.233.132.167/mine/amert.exe | unknown | — | — | unknown |
2108 | explorha.exe | POST | 200 | 193.233.132.56:80 | http://193.233.132.56/Pneh2sXQk0/index.php | unknown | — | — | unknown |
2108 | explorha.exe | GET | 200 | 193.233.132.167:80 | http://193.233.132.167/mine/random.exe | unknown | — | — | unknown |
2108 | explorha.exe | POST | 200 | 193.233.132.56:80 | http://193.233.132.56/Pneh2sXQk0/index.php | unknown | — | — | unknown |
2108 | explorha.exe | GET | 200 | 193.233.132.56:80 | http://193.233.132.56/Pneh2sXQk0/Plugins/cred.dll | unknown | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | unknown |
— | — | 224.0.0.252:5355 | — | — | — | unknown |
2108 | explorha.exe | 193.233.132.56:80 | — | ATT-INTERNET4 | US | malicious |
2108 | explorha.exe | 193.233.132.167:80 | — | ATT-INTERNET4 | US | malicious |
2264 | rundll32.exe | 193.233.132.56:80 | — | ATT-INTERNET4 | US | malicious |
2560 | chrome.exe | 239.255.255.250:1900 | — | — | — | unknown |
2376 | chrome.exe | 216.58.206.35:443 | clientservices.googleapis.com | GOOGLE | US | whitelisted |
2376 | chrome.exe | 142.250.185.110:443 | www.youtube.com | GOOGLE | US | whitelisted |
2376 | chrome.exe | 74.125.133.84:443 | accounts.google.com | GOOGLE | US | unknown |
Domain | IP | Reputation |
|---|---|---|
clientservices.googleapis.com |
| whitelisted |
www.youtube.com |
| whitelisted |
accounts.google.com |
| shared |
consent.youtube.com |
| whitelisted |
www.gstatic.com |
| whitelisted |
fonts.googleapis.com |
| whitelisted |
fonts.gstatic.com |
| whitelisted |
www.google.com |
| whitelisted |
update.googleapis.com |
| unknown |
optimizationguide-pa.googleapis.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2108 | explorha.exe | Misc Attack | ET DROP Spamhaus DROP Listed Traffic Inbound group 37 |
2108 | explorha.exe | Malware Command and Control Activity Detected | BOTNET [ANY.RUN] Amadey HTTP POST Request (st=s) |
2108 | explorha.exe | Misc Attack | ET DROP Spamhaus DROP Listed Traffic Inbound group 37 |
2108 | explorha.exe | Potential Corporate Privacy Violation | AV POLICY HTTP request for .exe file with no User-Agent |
2108 | explorha.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
2108 | explorha.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
2108 | explorha.exe | Potentially Bad Traffic | ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response |
2108 | explorha.exe | Potentially Bad Traffic | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |
— | — | A Network Trojan was detected | ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 |
— | — | Potential Corporate Privacy Violation | AV POLICY HTTP request for .exe file with no User-Agent |
Process | Message |
|---|---|
1ec09530c1153453b1bd0989af58808bc44e069c4608c878a64530bb08fa8840.exe |
%s------------------------------------------------
--- Themida Professional ---
--- (c)2012 Oreans Technologies ---
------------------------------------------------
|
explorha.exe |
%s------------------------------------------------
--- Themida Professional ---
--- (c)2012 Oreans Technologies ---
------------------------------------------------
|
300ab8057c.exe |
%s------------------------------------------------
--- Themida Professional ---
--- (c)2012 Oreans Technologies ---
------------------------------------------------
|
explorha.exe |
%s------------------------------------------------
--- Themida Professional ---
--- (c)2012 Oreans Technologies ---
------------------------------------------------
|
amert.exe |
%s------------------------------------------------
--- Themida Professional ---
--- (c)2012 Oreans Technologies ---
------------------------------------------------
|
explorha.exe | Dk43l_dwmk438* |
explorha.exe | td ydrthrhfty |
explorha.exe | ewetwertyer eytdryrtdy |
300ab8057c.exe | Dk43l_dwmk438* |
300ab8057c.exe | ewetwertyer eytdryrtdy |