File name:

4363463463464363463463463.bin

Full analysis: https://app.any.run/tasks/242eb0a0-7a9b-4666-bf36-52c33b9f103a
Verdict: Malicious activity
Threats:

Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks.

Analysis date: January 11, 2024, 21:50:53
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
amadey
botnet
stealer
loader
opendir
hausbomber
rhadamanthys
phorpiex
trojan
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
MD5:

2A94F3960C58C6E70826495F76D00B85

SHA1:

E2A1A5641295F5EBF01A37AC1C170AC0814BB71A

SHA256:

2FCAD226B17131DA4274E1B9F8F31359BDD325C9568665F08FD1F6C5D06A23CE

SSDEEP:

192:2we8sGKE6MqyG7c20L7BIW12n/ePSmzkTInu8stYcFwVc03KY:9e8sGKfMqyGg20PKn/cRaInuptYcFwVY

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • Dctooux.exe (PID: 1820)
      • Dctooux.exe (PID: 2160)
    • Uses Task Scheduler to run other applications

      • Dctooux.exe (PID: 1820)
      • Dctooux.exe (PID: 2160)
    • HAUSBOMBER has been detected (YARA)

      • 4363463463464363463463463.bin.exe (PID: 2024)
      • 4363463463464363463463463.bin.exe (PID: 2472)
    • Steals credentials from Web Browsers

      • cmd.exe (PID: 3412)
    • Actions looks like stealing of personal data

      • dialer.exe (PID: 3184)
      • cmd.exe (PID: 3412)
  • SUSPICIOUS

    • Reads the Internet Settings

      • 4363463463464363463463463.bin.exe (PID: 2024)
      • newbuild.exe (PID: 696)
      • Dctooux.exe (PID: 1820)
      • 4363463463464363463463463.bin.exe (PID: 2472)
      • VLTKTanthuTN.exe (PID: 2756)
      • TaAgente.exe (PID: 2372)
      • 1tV39vm0.exe (PID: 968)
      • sipnotify.exe (PID: 1832)
      • runonce.exe (PID: 1876)
      • Dctooux.exe (PID: 2160)
      • 4363463463464363463463463.bin.exe (PID: 2596)
      • 4363463463464363463463463.bin.exe (PID: 2716)
      • asdfg.exe (PID: 2812)
      • pei.exe (PID: 3312)
      • WinLocker.exe (PID: 3300)
      • cmd.exe (PID: 3412)
    • Reads settings of System Certificates

      • 4363463463464363463463463.bin.exe (PID: 2024)
      • 4363463463464363463463463.bin.exe (PID: 2472)
      • 4363463463464363463463463.bin.exe (PID: 2596)
      • 4363463463464363463463463.bin.exe (PID: 2716)
      • sipnotify.exe (PID: 1832)
    • Adds/modifies Windows certificates

      • 4363463463464363463463463.bin.exe (PID: 2024)
    • Reads the Windows owner or organization settings

      • is-B4U2P.tmp (PID: 2904)
    • The process checks if it is being run in the virtual environment

      • dialer.exe (PID: 3184)
    • Uses NETSH.EXE to change the status of the firewall

      • cmd.exe (PID: 3412)
    • Uses ATTRIB.EXE to modify file attributes

      • cmd.exe (PID: 3412)
    • Uses REG/REGEDIT.EXE to modify registry

      • cmd.exe (PID: 3412)
    • Starts CMD.EXE for commands execution

      • WinLocker.exe (PID: 3300)
    • Executing commands from a ".bat" file

      • WinLocker.exe (PID: 3300)
    • Accesses Microsoft Outlook profiles

      • dialer.exe (PID: 3184)
    • Reads browser cookies

      • dialer.exe (PID: 3184)
    • Loads DLL from Mozilla Firefox

      • dialer.exe (PID: 3184)
    • Searches for installed software

      • dialer.exe (PID: 3184)
    • The process executes VB scripts

      • cmd.exe (PID: 3412)
  • INFO

    • Reads the machine GUID from the registry

      • 4363463463464363463463463.bin.exe (PID: 2024)
      • newbuild.exe (PID: 696)
      • Dctooux.exe (PID: 1820)
      • 4363463463464363463463463.bin.exe (PID: 2472)
      • VLTKTanthuTN.exe (PID: 2756)
      • TaAgente.exe (PID: 2372)
      • Dctooux.exe (PID: 2160)
      • 4363463463464363463463463.bin.exe (PID: 2716)
      • 4363463463464363463463463.bin.exe (PID: 2596)
      • BLduscfibj.exe (PID: 2856)
      • asdfg.exe (PID: 2812)
      • BLduscfibj.exe (PID: 2952)
      • WatchDog.exe (PID: 3208)
      • pei.exe (PID: 3312)
    • Checks supported languages

      • 4363463463464363463463463.bin.exe (PID: 2024)
      • e756885f12abdf5cc8450232691a4f55c1e524262825a4a00ced4f004a2c69c1.exe (PID: 1236)
      • newbuild.exe (PID: 696)
      • Dctooux.exe (PID: 1820)
      • e756885f12abdf5cc8450232691a4f55c1e524262825a4a00ced4f004a2c69c1.exe (PID: 1748)
      • richedit.exe (PID: 2636)
      • 4363463463464363463463463.bin.exe (PID: 2472)
      • 1e3d458e7ef866069259cb3b13b761e46f6278c3fca69ca846baca650b4e0f72.exe (PID: 568)
      • 1e3d458e7ef866069259cb3b13b761e46f6278c3fca69ca846baca650b4e0f72.exe (PID: 2688)
      • VLTKTanthuTN.exe (PID: 2756)
      • tuc2.exe (PID: 2896)
      • is-B4U2P.tmp (PID: 2904)
      • pcidevicechecker.exe (PID: 2492)
      • TaAgente.exe (PID: 2372)
      • love.exe (PID: 2860)
      • ku9wi60.exe (PID: 3064)
      • pcidevicechecker.exe (PID: 2912)
      • IZ3PZ96.exe (PID: 3072)
      • Gq4sL74.exe (PID: 3068)
      • 1tV39vm0.exe (PID: 968)
      • 2lt0020.exe (PID: 3356)
      • IMEKLMG.EXE (PID: 2132)
      • IMEKLMG.EXE (PID: 2148)
      • Dctooux.exe (PID: 2160)
      • 4363463463464363463463463.bin.exe (PID: 2716)
      • asdfg.exe (PID: 2812)
      • Dctooux.exe (PID: 2492)
      • 4363463463464363463463463.bin.exe (PID: 2596)
      • BLduscfibj.exe (PID: 2856)
      • asdfg.exe (PID: 2880)
      • BLduscfibj.exe (PID: 2952)
      • WatchDog.exe (PID: 3208)
      • WinLocker.exe (PID: 3300)
      • pei.exe (PID: 3312)
      • wmpnscfg.exe (PID: 3000)
      • wmpnscfg.exe (PID: 3080)
      • 4363463463464363463463463.bin.exe (PID: 2136)
      • 4363463463464363463463463.bin.exe (PID: 2360)
      • Dctooux.exe (PID: 2544)
    • Reads the computer name

      • 4363463463464363463463463.bin.exe (PID: 2024)
      • newbuild.exe (PID: 696)
      • Dctooux.exe (PID: 1820)
      • 4363463463464363463463463.bin.exe (PID: 2472)
      • VLTKTanthuTN.exe (PID: 2756)
      • is-B4U2P.tmp (PID: 2904)
      • pcidevicechecker.exe (PID: 2912)
      • TaAgente.exe (PID: 2372)
      • 1tV39vm0.exe (PID: 968)
      • 2lt0020.exe (PID: 3356)
      • IMEKLMG.EXE (PID: 2148)
      • Dctooux.exe (PID: 2160)
      • IMEKLMG.EXE (PID: 2132)
      • 4363463463464363463463463.bin.exe (PID: 2596)
      • 4363463463464363463463463.bin.exe (PID: 2716)
      • BLduscfibj.exe (PID: 2856)
      • BLduscfibj.exe (PID: 2952)
      • asdfg.exe (PID: 2812)
      • WatchDog.exe (PID: 3208)
      • wmpnscfg.exe (PID: 3000)
      • wmpnscfg.exe (PID: 3080)
      • pei.exe (PID: 3312)
      • WinLocker.exe (PID: 3300)
      • 4363463463464363463463463.bin.exe (PID: 2136)
      • 4363463463464363463463463.bin.exe (PID: 2360)
    • Reads Environment values

      • 4363463463464363463463463.bin.exe (PID: 2024)
      • 4363463463464363463463463.bin.exe (PID: 2472)
      • TaAgente.exe (PID: 2372)
      • VLTKTanthuTN.exe (PID: 2756)
      • 4363463463464363463463463.bin.exe (PID: 2596)
      • 4363463463464363463463463.bin.exe (PID: 2716)
    • Drops the executable file immediately after the start

      • 4363463463464363463463463.bin.exe (PID: 2024)
      • newbuild.exe (PID: 696)
      • 4363463463464363463463463.bin.exe (PID: 2472)
      • tuc2.exe (PID: 2896)
      • love.exe (PID: 2860)
      • pcidevicechecker.exe (PID: 2912)
      • is-B4U2P.tmp (PID: 2904)
      • ku9wi60.exe (PID: 3064)
      • IZ3PZ96.exe (PID: 3072)
      • Gq4sL74.exe (PID: 3068)
      • asdfg.exe (PID: 2812)
      • 4363463463464363463463463.bin.exe (PID: 2596)
      • BLduscfibj.exe (PID: 2952)
      • WinLocker.exe (PID: 3300)
    • Create files in a temporary directory

      • newbuild.exe (PID: 696)
      • tuc2.exe (PID: 2896)
      • is-B4U2P.tmp (PID: 2904)
      • love.exe (PID: 2860)
      • ku9wi60.exe (PID: 3064)
      • IZ3PZ96.exe (PID: 3072)
      • Gq4sL74.exe (PID: 3068)
      • 2lt0020.exe (PID: 3356)
      • WerFault.exe (PID: 1320)
      • asdfg.exe (PID: 2812)
      • pei.exe (PID: 3312)
    • Starts itself from another location

      • newbuild.exe (PID: 696)
    • Checks proxy server information

      • Dctooux.exe (PID: 1820)
      • Dctooux.exe (PID: 2160)
      • pei.exe (PID: 3312)
    • AMADEY has been detected (SURICATA)

      • Dctooux.exe (PID: 1820)
      • Dctooux.exe (PID: 2160)
    • Application launched itself

      • e756885f12abdf5cc8450232691a4f55c1e524262825a4a00ced4f004a2c69c1.exe (PID: 1236)
      • 1e3d458e7ef866069259cb3b13b761e46f6278c3fca69ca846baca650b4e0f72.exe (PID: 568)
      • msedge.exe (PID: 2356)
      • msedge.exe (PID: 3216)
      • msedge.exe (PID: 1028)
      • msedge.exe (PID: 2972)
      • msedge.exe (PID: 2940)
      • msedge.exe (PID: 3024)
      • msedge.exe (PID: 2880)
      • msedge.exe (PID: 2656)
      • WerFault.exe (PID: 320)
      • msedge.exe (PID: 3308)
      • msedge.exe (PID: 3132)
      • asdfg.exe (PID: 2812)
      • BLduscfibj.exe (PID: 2856)
    • Process requests binary or script from the Internet

      • 4363463463464363463463463.bin.exe (PID: 2024)
      • 4363463463464363463463463.bin.exe (PID: 2472)
    • Connects to the server without a host name

      • 4363463463464363463463463.bin.exe (PID: 2024)
      • Dctooux.exe (PID: 1820)
      • 4363463463464363463463463.bin.exe (PID: 2472)
    • Manual execution by a user

      • 4363463463464363463463463.bin.exe (PID: 2620)
      • 4363463463464363463463463.bin.exe (PID: 2472)
      • runonce.exe (PID: 1876)
      • IMEKLMG.EXE (PID: 2148)
      • IMEKLMG.EXE (PID: 2132)
      • Dctooux.exe (PID: 2160)
      • 4363463463464363463463463.bin.exe (PID: 2680)
      • 4363463463464363463463463.bin.exe (PID: 2716)
      • 4363463463464363463463463.bin.exe (PID: 2512)
      • 4363463463464363463463463.bin.exe (PID: 2596)
      • wmpnscfg.exe (PID: 3000)
      • wmpnscfg.exe (PID: 3080)
      • 4363463463464363463463463.bin.exe (PID: 4052)
      • 4363463463464363463463463.bin.exe (PID: 2136)
      • 4363463463464363463463463.bin.exe (PID: 2256)
      • 4363463463464363463463463.bin.exe (PID: 2360)
      • notepad.exe (PID: 1880)
    • Process drops legitimate windows executable

      • 4363463463464363463463463.bin.exe (PID: 2024)
      • is-B4U2P.tmp (PID: 2904)
      • love.exe (PID: 2860)
      • ku9wi60.exe (PID: 3064)
      • IZ3PZ96.exe (PID: 3072)
    • Creates files or folders in the user directory

      • is-B4U2P.tmp (PID: 2904)
      • BLduscfibj.exe (PID: 2952)
      • pei.exe (PID: 3312)
    • Connects to unusual port

      • VLTKTanthuTN.exe (PID: 2756)
      • 4363463463464363463463463.bin.exe (PID: 2716)
    • Creates files in the program directory

      • pcidevicechecker.exe (PID: 2912)
    • Drops 7-zip archiver for unpacking

      • is-B4U2P.tmp (PID: 2904)
    • Reads mouse settings

      • 1tV39vm0.exe (PID: 968)
    • The process executes via Task Scheduler

      • ctfmon.exe (PID: 1812)
      • sipnotify.exe (PID: 1832)
      • Dctooux.exe (PID: 2492)
      • powershell.exe (PID: 3752)
      • Dctooux.exe (PID: 2544)
    • Connects to FTP

      • TaAgente.exe (PID: 2372)
    • Reads the time zone

      • runonce.exe (PID: 1876)
    • Process checks whether UAC notifications are on

      • IMEKLMG.EXE (PID: 2148)
      • IMEKLMG.EXE (PID: 2132)
    • Reads security settings of Internet Explorer

      • sipnotify.exe (PID: 1832)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 3752)
    • Run PowerShell with an invisible window

      • powershell.exe (PID: 3752)
    • RHADAMANTHYS has been detected (SURICATA)

      • dialer.exe (PID: 3184)
    • PHORPIEX has been detected (SURICATA)

      • 4363463463464363463463463.bin.exe (PID: 2596)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (82.9)
.dll | Win32 Dynamic Link Library (generic) (7.4)
.exe | Win32 Executable (generic) (5.1)
.exe | Generic Win/DOS Executable (2.2)
.exe | DOS Executable Generic (2.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:12:22 09:29:10+01:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32
LinkerVersion: 80
CodeSize: 5632
InitializedDataSize: 4608
UninitializedDataSize: -
EntryPoint: 0x3552
OSVersion: 4
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows command line
FileVersionNumber: 0.0.0.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
FileDescription:
FileVersion: 0.0.0.0
InternalName: 4363463463464363463463463.exe
LegalCopyright:
OriginalFileName: 4363463463464363463463463.exe
ProductVersion: 0.0.0.0
AssemblyVersion: 0.0.0.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
211
Monitored processes
91
Malicious processes
14
Suspicious processes
2

Behavior graph

Click at the process to see the details
start #HAUSBOMBER 4363463463464363463463463.bin.exe e756885f12abdf5cc8450232691a4f55c1e524262825a4a00ced4f004a2c69c1.exe no specs newbuild.exe no specs #AMADEY dctooux.exe schtasks.exe no specs e756885f12abdf5cc8450232691a4f55c1e524262825a4a00ced4f004a2c69c1.exe no specs richedit.exe no specs 4363463463464363463463463.bin.exe no specs #HAUSBOMBER 4363463463464363463463463.bin.exe 1e3d458e7ef866069259cb3b13b761e46f6278c3fca69ca846baca650b4e0f72.exe no specs 1e3d458e7ef866069259cb3b13b761e46f6278c3fca69ca846baca650b4e0f72.exe no specs vltktanthutn.exe tuc2.exe no specs is-b4u2p.tmp no specs net.exe no specs pcidevicechecker.exe no specs net1.exe no specs pcidevicechecker.exe no specs taagente.exe love.exe no specs ku9wi60.exe no specs iz3pz96.exe no specs gq4sl74.exe no specs 1tv39vm0.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs 2lt0020.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs ctfmon.exe no specs sipnotify.exe runonce.exe werfault.exe no specs werfault.exe no specs imeklmg.exe no specs imeklmg.exe no specs #AMADEY dctooux.exe schtasks.exe no specs dctooux.exe no specs 4363463463464363463463463.bin.exe no specs #PHORPIEX 4363463463464363463463463.bin.exe 4363463463464363463463463.bin.exe no specs 4363463463464363463463463.bin.exe asdfg.exe no specs blduscfibj.exe no specs asdfg.exe blduscfibj.exe no specs wmpnscfg.exe no specs wmpnscfg.exe no specs #RHADAMANTHYS dialer.exe watchdog.exe winlocker.exe no specs pei.exe cmd.exe netsh.exe no specs attrib.exe no specs reg.exe no specs reg.exe no specs ntvdm.exe powershell.exe no specs 4363463463464363463463463.bin.exe no specs 4363463463464363463463463.bin.exe 4363463463464363463463463.bin.exe no specs 4363463463464363463463463.bin.exe wscript.exe no specs dctooux.exe no specs notepad.exe no specs 4363463463464363463463463.bin.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
320"C:\Windows\System32\WerFault.exe" -k -rqC:\Windows\System32\WerFault.exerunonce.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Problem Reporting
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
568"C:\Users\admin\Desktop\Files\1e3d458e7ef866069259cb3b13b761e46f6278c3fca69ca846baca650b4e0f72.exe" C:\Users\admin\Desktop\Files\1e3d458e7ef866069259cb3b13b761e46f6278c3fca69ca846baca650b4e0f72.exe4363463463464363463463463.bin.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\desktop\files\1e3d458e7ef866069259cb3b13b761e46f6278c3fca69ca846baca650b4e0f72.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imm32.dll
696"C:\Users\admin\Desktop\Files\newbuild.exe" C:\Users\admin\Desktop\Files\newbuild.exe4363463463464363463463463.bin.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\desktop\files\newbuild.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
844"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Dctooux.exe /TR "C:\Users\admin\AppData\Local\Temp\2154552ab1\Dctooux.exe" /FC:\Windows\System32\schtasks.exeDctooux.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Manages scheduled tasks
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\ole32.dll
908"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1308 --field-trial-handle=1400,i,2180189480726049770,14199472981518624583,131072 /prefetch:2C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
968C:\Users\admin\AppData\Local\Temp\IXP003.TMP\1tV39vm0.exeC:\Users\admin\AppData\Local\Temp\IXP003.TMP\1tV39vm0.exeGq4sL74.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\ixp003.tmp\1tv39vm0.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\version.dll
1028"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.linkedin.com/loginC:\Program Files\Microsoft\Edge\Application\msedge.exe1tV39vm0.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\apphelp.dll
c:\windows\apppatch\aclayers.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
1072"C:\Users\admin\Desktop\4363463463464363463463463.bin.exe" C:\Users\admin\Desktop\4363463463464363463463463.bin.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
3221226540
Version:
0.0.0.0
Modules
Images
c:\users\admin\desktop\4363463463464363463463463.bin.exe
c:\windows\system32\ntdll.dll
1236"C:\Users\admin\Desktop\Files\e756885f12abdf5cc8450232691a4f55c1e524262825a4a00ced4f004a2c69c1.exe" C:\Users\admin\Desktop\Files\e756885f12abdf5cc8450232691a4f55c1e524262825a4a00ced4f004a2c69c1.exe4363463463464363463463463.bin.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\desktop\files\e756885f12abdf5cc8450232691a4f55c1e524262825a4a00ced4f004a2c69c1.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imm32.dll
1320C:\Windows\System32\WerFault.exe -k -qC:\Windows\System32\WerFault.exeWerFault.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Problem Reporting
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
Total events
29 266
Read events
28 901
Write events
362
Delete events
3

Modification events

(PID) Process:(2024) 4363463463464363463463463.bin.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2024) 4363463463464363463463463.bin.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD
Operation:writeName:Blob
Value:
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
(PID) Process:(2024) 4363463463464363463463463.bin.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD
Operation:writeName:Blob
Value:
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
(PID) Process:(2024) 4363463463464363463463463.bin.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2024) 4363463463464363463463463.bin.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(2024) 4363463463464363463463463.bin.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(2024) 4363463463464363463463463.bin.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(696) newbuild.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(696) newbuild.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(696) newbuild.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
Executable files
100
Suspicious files
21
Text files
25
Unknown types
0

Dropped files

PID
Process
Filename
Type
2896tuc2.exeC:\Users\admin\AppData\Local\Temp\is-TG899.tmp\is-B4U2P.tmpexecutable
MD5:856BCE6609A05646759555E24A534467
SHA256:2E7E5E01FA3D18A2A76E33DD139DBF251F1DD2AB77ABA843B7EF09E51CD86C1A
20244363463463464363463463463.bin.exeC:\Users\admin\Desktop\Files\richedit.exeexecutable
MD5:B89786DCAB1DC0B2C71D410C73A9BF8D
SHA256:C41CFBF30BA7BCC2E7D12562B82AB474911F73F12944DF0E3C6865F5AE3E2A0F
2904is-B4U2P.tmpC:\Users\admin\AppData\Local\PCI Device Checker\bin\x86\basscd.dllexecutable
MD5:F0F973781B6A66ADF354B04A36C5E944
SHA256:04AB613C895B35044AF8A9A98A372A5769C80245CC9D6BF710A94C5BC42FA1B3
696newbuild.exeC:\Users\admin\AppData\Local\Temp\2154552ab1\Dctooux.exeexecutable
MD5:51D74FA113EE4EFAE8E73626E9277DFF
SHA256:E24F84235D063A70EDBD6965A5E3639368E87A6AB7CCCD661E49C07A0439D0BD
2904is-B4U2P.tmpC:\Users\admin\AppData\Local\PCI Device Checker\is-AJPK5.tmpexecutable
MD5:68B83A1899B815CB858BB5388BFA40C9
SHA256:1580CBF293C8624DEB19DAFCC9E8F02ECA16EAAAC61A6D520B41D0AB704226A5
2904is-B4U2P.tmpC:\Users\admin\AppData\Local\Temp\is-B30KM.tmp\_isetup\_shfoldr.dllexecutable
MD5:92DC6EF532FBB4A5C3201469A5B5EB63
SHA256:9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87
20244363463463464363463463463.bin.exeC:\Users\admin\Desktop\Files\e756885f12abdf5cc8450232691a4f55c1e524262825a4a00ced4f004a2c69c1.exeexecutable
MD5:B32FAB896F5E701C1E816CD8C31C0FF5
SHA256:E756885F12ABDF5CC8450232691A4F55C1E524262825A4A00CED4F004A2C69C1
2904is-B4U2P.tmpC:\Users\admin\AppData\Local\PCI Device Checker\bin\x86\is-4VCCM.tmpexecutable
MD5:F0F973781B6A66ADF354B04A36C5E944
SHA256:04AB613C895B35044AF8A9A98A372A5769C80245CC9D6BF710A94C5BC42FA1B3
2904is-B4U2P.tmpC:\Users\admin\AppData\Local\PCI Device Checker\bin\x86\is-TIVFJ.tmpexecutable
MD5:9FF783BB73F8868FA6599CDE65ED21D7
SHA256:E0234AF5F71592C472439536E710BA8105D62DFA68722965DF87FED50BAB1816
2904is-B4U2P.tmpC:\Users\admin\AppData\Local\Temp\is-B30KM.tmp\_iscrypt.dllexecutable
MD5:A69559718AB506675E907FE49DEB71E9
SHA256:2F6294F9AA09F59A574B5DCD33BE54E16B39377984F3D5658CDA44950FA0F8FC
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
21
TCP/UDP connections
50
DNS requests
28
Threats
68

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2596
4363463463464363463463463.bin.exe
GET
200
185.172.128.8:80
http://185.172.128.8/ma.exe
unknown
executable
4.58 Mb
unknown
2024
4363463463464363463463463.bin.exe
GET
200
5.42.66.0:80
http://5.42.66.0/newbuild.exe
unknown
executable
418 Kb
unknown
2024
4363463463464363463463463.bin.exe
GET
200
64.34.75.145:80
http://cynorix.com/netTimer.exe
unknown
executable
1.73 Mb
unknown
1820
Dctooux.exe
POST
200
5.42.66.0:80
http://5.42.66.0/f7Vkbh7X/index.php
unknown
text
7 b
unknown
1820
Dctooux.exe
POST
200
5.42.66.0:80
http://5.42.66.0/f7Vkbh7X/index.php
unknown
text
2 b
unknown
2024
4363463463464363463463463.bin.exe
GET
200
103.255.237.239:80
http://kimyen.net/upload/VLTKTanthuTN.exe
unknown
executable
1.92 Mb
unknown
2472
4363463463464363463463463.bin.exe
GET
200
188.114.97.3:80
http://still.topteamlife.com/order/tuc2.exe
unknown
executable
3.91 Mb
unknown
2024
4363463463464363463463463.bin.exe
GET
200
36.248.64.77:80
http://d1.udashi.com/soft/dnyx/20812/richedit.exe
unknown
executable
405 Kb
unknown
2024
4363463463464363463463463.bin.exe
GET
200
109.107.182.3:80
http://109.107.182.3/some/love.exe
unknown
executable
4.97 Mb
unknown
2472
4363463463464363463463463.bin.exe
GET
200
162.248.54.77:80
http://apps.saintsoporte.com/TaAgente.exe
unknown
executable
1.03 Mb
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
2024
4363463463464363463463463.bin.exe
151.101.194.49:443
urlhaus.abuse.ch
FASTLY
US
unknown
2024
4363463463464363463463463.bin.exe
140.82.121.4:443
github.com
GITHUB
US
unknown
1080
svchost.exe
224.0.0.252:5355
unknown
2024
4363463463464363463463463.bin.exe
185.199.109.133:443
raw.githubusercontent.com
FASTLY
US
unknown
2024
4363463463464363463463463.bin.exe
5.42.66.0:80
CJSC Kolomna-Sviaz TV
RU
unknown
2024
4363463463464363463463463.bin.exe
64.34.75.145:80
cynorix.com
COGECO-PEER1
CA
unknown
1820
Dctooux.exe
5.42.66.0:80
CJSC Kolomna-Sviaz TV
RU
unknown
2024
4363463463464363463463463.bin.exe
36.248.64.77:80
d1.udashi.com
CHINA UNICOM China169 Backbone
CN
unknown

DNS requests

Domain
IP
Reputation
urlhaus.abuse.ch
  • 151.101.194.49
  • 151.101.130.49
  • 151.101.66.49
  • 151.101.2.49
whitelisted
github.com
  • 140.82.121.4
  • 140.82.121.3
shared
raw.githubusercontent.com
  • 185.199.109.133
  • 185.199.110.133
  • 185.199.111.133
  • 185.199.108.133
shared
cynorix.com
  • 64.34.75.145
malicious
d1.udashi.com
  • 36.248.64.77
  • 42.177.83.78
  • 42.177.83.63
  • 42.177.83.82
  • 42.177.83.224
  • 123.6.2.133
  • 42.177.83.214
  • 42.177.83.87
  • 110.249.196.62
  • 113.201.158.139
  • 42.177.83.115
  • 61.243.13.101
  • 116.153.45.250
malicious
kimyen.net
  • 103.255.237.239
unknown
still.topteamlife.com
  • 188.114.97.3
  • 188.114.96.3
malicious
apps.saintsoporte.com
  • 162.248.54.77
malicious
utcnist.colorado.edu
  • 128.138.140.44
whitelisted
time.ien.it
  • 193.204.114.105
unknown

Threats

PID
Process
Class
Message
2024
4363463463464363463463463.bin.exe
Potential Corporate Privacy Violation
AV POLICY HTTP request for .exe file with no User-Agent
2024
4363463463464363463463463.bin.exe
Potentially Bad Traffic
ET INFO Executable Download from dotted-quad Host
2024
4363463463464363463463463.bin.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
2024
4363463463464363463463463.bin.exe
Potentially Bad Traffic
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
2024
4363463463464363463463463.bin.exe
Potentially Bad Traffic
ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response
2024
4363463463464363463463463.bin.exe
Potential Corporate Privacy Violation
AV POLICY HTTP request for .exe file with no User-Agent
1820
Dctooux.exe
Malware Command and Control Activity Detected
BOTNET [ANY.RUN] Amadey
2024
4363463463464363463463463.bin.exe
Potentially Bad Traffic
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
2024
4363463463464363463463463.bin.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
2024
4363463463464363463463463.bin.exe
Potential Corporate Privacy Violation
AV POLICY HTTP request for .exe file with no User-Agent
7 ETPRO signatures available at the full report
Process
Message
4363463463464363463463463.bin.exe
The specified executable is not a valid application for this OS platform.