| File name: | 4363463463464363463463463.bin |
| Full analysis: | https://app.any.run/tasks/242eb0a0-7a9b-4666-bf36-52c33b9f103a |
| Verdict: | Malicious activity |
| Threats: | Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks. |
| Analysis date: | January 11, 2024, 21:50:53 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows |
| MD5: | 2A94F3960C58C6E70826495F76D00B85 |
| SHA1: | E2A1A5641295F5EBF01A37AC1C170AC0814BB71A |
| SHA256: | 2FCAD226B17131DA4274E1B9F8F31359BDD325C9568665F08FD1F6C5D06A23CE |
| SSDEEP: | 192:2we8sGKE6MqyG7c20L7BIW12n/ePSmzkTInu8stYcFwVc03KY:9e8sGKfMqyGg20PKn/cRaInuptYcFwVY |
| .exe | | | Generic CIL Executable (.NET, Mono, etc.) (82.9) |
|---|---|---|
| .dll | | | Win32 Dynamic Link Library (generic) (7.4) |
| .exe | | | Win32 Executable (generic) (5.1) |
| .exe | | | Generic Win/DOS Executable (2.2) |
| .exe | | | DOS Executable Generic (2.2) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2023:12:22 09:29:10+01:00 |
| ImageFileCharacteristics: | Executable, Large address aware |
| PEType: | PE32 |
| LinkerVersion: | 80 |
| CodeSize: | 5632 |
| InitializedDataSize: | 4608 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x3552 |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 6 |
| Subsystem: | Windows command line |
| FileVersionNumber: | 0.0.0.0 |
| ProductVersionNumber: | 0.0.0.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| FileDescription: | |
| FileVersion: | 0.0.0.0 |
| InternalName: | 4363463463464363463463463.exe |
| LegalCopyright: | |
| OriginalFileName: | 4363463463464363463463463.exe |
| ProductVersion: | 0.0.0.0 |
| AssemblyVersion: | 0.0.0.0 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 320 | "C:\Windows\System32\WerFault.exe" -k -rq | C:\Windows\System32\WerFault.exe | — | runonce.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Problem Reporting Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 568 | "C:\Users\admin\Desktop\Files\1e3d458e7ef866069259cb3b13b761e46f6278c3fca69ca846baca650b4e0f72.exe" | C:\Users\admin\Desktop\Files\1e3d458e7ef866069259cb3b13b761e46f6278c3fca69ca846baca650b4e0f72.exe | — | 4363463463464363463463463.bin.exe | |||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 696 | "C:\Users\admin\Desktop\Files\newbuild.exe" | C:\Users\admin\Desktop\Files\newbuild.exe | — | 4363463463464363463463463.bin.exe | |||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 844 | "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Dctooux.exe /TR "C:\Users\admin\AppData\Local\Temp\2154552ab1\Dctooux.exe" /F | C:\Windows\System32\schtasks.exe | — | Dctooux.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Manages scheduled tasks Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 908 | "C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1308 --field-trial-handle=1400,i,2180189480726049770,14199472981518624583,131072 /prefetch:2 | C:\Program Files\Microsoft\Edge\Application\msedge.exe | — | msedge.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Microsoft Edge Exit code: 0 Version: 109.0.1518.115 | |||||||||||||||
| 968 | C:\Users\admin\AppData\Local\Temp\IXP003.TMP\1tV39vm0.exe | C:\Users\admin\AppData\Local\Temp\IXP003.TMP\1tV39vm0.exe | — | Gq4sL74.exe | |||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 1028 | "C:\Program Files\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.linkedin.com/login | C:\Program Files\Microsoft\Edge\Application\msedge.exe | — | 1tV39vm0.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft Edge Exit code: 0 Version: 109.0.1518.115 Modules
| |||||||||||||||
| 1072 | "C:\Users\admin\Desktop\4363463463464363463463463.bin.exe" | C:\Users\admin\Desktop\4363463463464363463463463.bin.exe | — | explorer.exe | |||||||||||
User: admin Integrity Level: MEDIUM Description: Exit code: 3221226540 Version: 0.0.0.0 Modules
| |||||||||||||||
| 1236 | "C:\Users\admin\Desktop\Files\e756885f12abdf5cc8450232691a4f55c1e524262825a4a00ced4f004a2c69c1.exe" | C:\Users\admin\Desktop\Files\e756885f12abdf5cc8450232691a4f55c1e524262825a4a00ced4f004a2c69c1.exe | — | 4363463463464363463463463.bin.exe | |||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 1320 | C:\Windows\System32\WerFault.exe -k -q | C:\Windows\System32\WerFault.exe | — | WerFault.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Problem Reporting Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| (PID) Process: | (2024) 4363463463464363463463463.bin.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (2024) 4363463463464363463463463.bin.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD |
| Operation: | write | Name: | Blob |
Value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| |||
| (PID) Process: | (2024) 4363463463464363463463463.bin.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD |
| Operation: | write | Name: | Blob |
Value: 040000000100000010000000C5DFB849CA051355EE2DBA1AC33EB028090000000100000054000000305206082B0601050507030206082B06010505070303060A2B0601040182370A030406082B0601050507030406082B0601050507030606082B0601050507030706082B0601050507030106082B060105050703080F00000001000000200000005229BA15B31B0C6F4CCA89C2985177974327D1B689A3B935A0BD975532AF22AB030000000100000014000000D69B561148F01C77C54578C10926DF5B856976AD1D000000010000001000000001728E1ECF7A9D86FB3CEC8948ABA9531400000001000000140000008FF04B7FA82E4524AE4D50FA639A8BDEE2DD1BBC620000000100000020000000CBB522D7B7F127AD6A0113865BDF1CD4102E7D0759AF635A7CF4720DC963C53B0B000000010000003000000047006C006F00620061006C005300690067006E00200052006F006F00740020004300410020002D002000520033000000190000000100000010000000D0FD3C9C380D7B65E26B9A3FEDD39B8F530000000100000040000000303E301F06092B06010401A032010130123010060A2B0601040182373C0101030200C0301B060567810C010330123010060A2B0601040182373C0101030200C02000000001000000630300003082035F30820247A003020102020B04000000000121585308A2300D06092A864886F70D01010B0500304C3120301E060355040B1317476C6F62616C5369676E20526F6F74204341202D20523331133011060355040A130A476C6F62616C5369676E311330110603550403130A476C6F62616C5369676E301E170D3039303331383130303030305A170D3239303331383130303030305A304C3120301E060355040B1317476C6F62616C5369676E20526F6F74204341202D20523331133011060355040A130A476C6F62616C5369676E311330110603550403130A476C6F62616C5369676E30820122300D06092A864886F70D01010105000382010F003082010A0282010100CC2576907906782216F5C083B684CA289EFD057611C5AD8872FC460243C7B28A9D045F24CB2E4BE1608246E152AB0C8147706CDD64D1EBF52CA30F823D0C2BAE97D7B614861079BB3B1380778C08E149D26A622F1F5EFA9668DF892795389F06D73EC9CB26590D73DEB0C8E9260E8315C6EF5B8BD20460CA49A628F6693BF6CBC82891E59D8A615737AC7414DC74E03AEE722F2E9CFBD0BBBFF53D00E10633E8822BAE53A63A16738CDD410E203AC0B4A7A1E9B24F902E3260E957CBB904926868E538266075B29F77FF9114EFAE2049FCAD401548D1023161195EB897EFAD77B7649A7ABF5FC113EF9B62FB0D6CE0546916A903DA6EE983937176C6698582170203010001A3423040300E0603551D0F0101FF040403020106300F0603551D130101FF040530030101FF301D0603551D0E041604148FF04B7FA82E4524AE4D50FA639A8BDEE2DD1BBC300D06092A864886F70D01010B050003820101004B40DBC050AAFEC80CEFF796544549BB96000941ACB3138686280733CA6BE674B9BA002DAEA40AD3F5F1F10F8ABF73674A83C7447B78E0AF6E6C6F03298E333945C38EE4B9576CAAFC1296EC53C62DE4246CB99463FBDC536867563E83B8CF3521C3C968FECEDAC253AACC908AE9F05D468C95DD7A58281A2F1DDECD0037418FED446DD75328977EF367041E15D78A96B4D3DE4C27A44C1B737376F41799C21F7A0EE32D08AD0A1C2CFF3CAB550E0F917E36EBC35749BEE12E2D7C608BC3415113239DCEF7326B9401A899E72C331F3A3B25D28640CE3B2C8678C9612F14BAEEDB556FDF84EE05094DBD28D872CED36250651EEB92978331D9B3B5CA47583F5F | |||
| (PID) Process: | (2024) 4363463463464363463463463.bin.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (2024) 4363463463464363463463463.bin.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (2024) 4363463463464363463463463.bin.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (2024) 4363463463464363463463463.bin.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (696) newbuild.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (696) newbuild.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (696) newbuild.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2896 | tuc2.exe | C:\Users\admin\AppData\Local\Temp\is-TG899.tmp\is-B4U2P.tmp | executable | |
MD5:856BCE6609A05646759555E24A534467 | SHA256:2E7E5E01FA3D18A2A76E33DD139DBF251F1DD2AB77ABA843B7EF09E51CD86C1A | |||
| 2024 | 4363463463464363463463463.bin.exe | C:\Users\admin\Desktop\Files\richedit.exe | executable | |
MD5:B89786DCAB1DC0B2C71D410C73A9BF8D | SHA256:C41CFBF30BA7BCC2E7D12562B82AB474911F73F12944DF0E3C6865F5AE3E2A0F | |||
| 2904 | is-B4U2P.tmp | C:\Users\admin\AppData\Local\PCI Device Checker\bin\x86\basscd.dll | executable | |
MD5:F0F973781B6A66ADF354B04A36C5E944 | SHA256:04AB613C895B35044AF8A9A98A372A5769C80245CC9D6BF710A94C5BC42FA1B3 | |||
| 696 | newbuild.exe | C:\Users\admin\AppData\Local\Temp\2154552ab1\Dctooux.exe | executable | |
MD5:51D74FA113EE4EFAE8E73626E9277DFF | SHA256:E24F84235D063A70EDBD6965A5E3639368E87A6AB7CCCD661E49C07A0439D0BD | |||
| 2904 | is-B4U2P.tmp | C:\Users\admin\AppData\Local\PCI Device Checker\is-AJPK5.tmp | executable | |
MD5:68B83A1899B815CB858BB5388BFA40C9 | SHA256:1580CBF293C8624DEB19DAFCC9E8F02ECA16EAAAC61A6D520B41D0AB704226A5 | |||
| 2904 | is-B4U2P.tmp | C:\Users\admin\AppData\Local\Temp\is-B30KM.tmp\_isetup\_shfoldr.dll | executable | |
MD5:92DC6EF532FBB4A5C3201469A5B5EB63 | SHA256:9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87 | |||
| 2024 | 4363463463464363463463463.bin.exe | C:\Users\admin\Desktop\Files\e756885f12abdf5cc8450232691a4f55c1e524262825a4a00ced4f004a2c69c1.exe | executable | |
MD5:B32FAB896F5E701C1E816CD8C31C0FF5 | SHA256:E756885F12ABDF5CC8450232691A4F55C1E524262825A4A00CED4F004A2C69C1 | |||
| 2904 | is-B4U2P.tmp | C:\Users\admin\AppData\Local\PCI Device Checker\bin\x86\is-4VCCM.tmp | executable | |
MD5:F0F973781B6A66ADF354B04A36C5E944 | SHA256:04AB613C895B35044AF8A9A98A372A5769C80245CC9D6BF710A94C5BC42FA1B3 | |||
| 2904 | is-B4U2P.tmp | C:\Users\admin\AppData\Local\PCI Device Checker\bin\x86\is-TIVFJ.tmp | executable | |
MD5:9FF783BB73F8868FA6599CDE65ED21D7 | SHA256:E0234AF5F71592C472439536E710BA8105D62DFA68722965DF87FED50BAB1816 | |||
| 2904 | is-B4U2P.tmp | C:\Users\admin\AppData\Local\Temp\is-B30KM.tmp\_iscrypt.dll | executable | |
MD5:A69559718AB506675E907FE49DEB71E9 | SHA256:2F6294F9AA09F59A574B5DCD33BE54E16B39377984F3D5658CDA44950FA0F8FC | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2596 | 4363463463464363463463463.bin.exe | GET | 200 | 185.172.128.8:80 | http://185.172.128.8/ma.exe | unknown | executable | 4.58 Mb | unknown |
2024 | 4363463463464363463463463.bin.exe | GET | 200 | 5.42.66.0:80 | http://5.42.66.0/newbuild.exe | unknown | executable | 418 Kb | unknown |
2024 | 4363463463464363463463463.bin.exe | GET | 200 | 64.34.75.145:80 | http://cynorix.com/netTimer.exe | unknown | executable | 1.73 Mb | unknown |
1820 | Dctooux.exe | POST | 200 | 5.42.66.0:80 | http://5.42.66.0/f7Vkbh7X/index.php | unknown | text | 7 b | unknown |
1820 | Dctooux.exe | POST | 200 | 5.42.66.0:80 | http://5.42.66.0/f7Vkbh7X/index.php | unknown | text | 2 b | unknown |
2024 | 4363463463464363463463463.bin.exe | GET | 200 | 103.255.237.239:80 | http://kimyen.net/upload/VLTKTanthuTN.exe | unknown | executable | 1.92 Mb | unknown |
2472 | 4363463463464363463463463.bin.exe | GET | 200 | 188.114.97.3:80 | http://still.topteamlife.com/order/tuc2.exe | unknown | executable | 3.91 Mb | unknown |
2024 | 4363463463464363463463463.bin.exe | GET | 200 | 36.248.64.77:80 | http://d1.udashi.com/soft/dnyx/20812/richedit.exe | unknown | executable | 405 Kb | unknown |
2024 | 4363463463464363463463463.bin.exe | GET | 200 | 109.107.182.3:80 | http://109.107.182.3/some/love.exe | unknown | executable | 4.97 Mb | unknown |
2472 | 4363463463464363463463463.bin.exe | GET | 200 | 162.248.54.77:80 | http://apps.saintsoporte.com/TaAgente.exe | unknown | executable | 1.03 Mb | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
2024 | 4363463463464363463463463.bin.exe | 151.101.194.49:443 | urlhaus.abuse.ch | FASTLY | US | unknown |
2024 | 4363463463464363463463463.bin.exe | 140.82.121.4:443 | github.com | GITHUB | US | unknown |
1080 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
2024 | 4363463463464363463463463.bin.exe | 185.199.109.133:443 | raw.githubusercontent.com | FASTLY | US | unknown |
2024 | 4363463463464363463463463.bin.exe | 5.42.66.0:80 | — | CJSC Kolomna-Sviaz TV | RU | unknown |
2024 | 4363463463464363463463463.bin.exe | 64.34.75.145:80 | cynorix.com | COGECO-PEER1 | CA | unknown |
1820 | Dctooux.exe | 5.42.66.0:80 | — | CJSC Kolomna-Sviaz TV | RU | unknown |
2024 | 4363463463464363463463463.bin.exe | 36.248.64.77:80 | d1.udashi.com | CHINA UNICOM China169 Backbone | CN | unknown |
Domain | IP | Reputation |
|---|---|---|
urlhaus.abuse.ch |
| whitelisted |
github.com |
| shared |
raw.githubusercontent.com |
| shared |
cynorix.com |
| malicious |
d1.udashi.com |
| malicious |
kimyen.net |
| unknown |
still.topteamlife.com |
| malicious |
apps.saintsoporte.com |
| malicious |
utcnist.colorado.edu |
| whitelisted |
time.ien.it |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
2024 | 4363463463464363463463463.bin.exe | Potential Corporate Privacy Violation | AV POLICY HTTP request for .exe file with no User-Agent |
2024 | 4363463463464363463463463.bin.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
2024 | 4363463463464363463463463.bin.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
2024 | 4363463463464363463463463.bin.exe | Potentially Bad Traffic | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |
2024 | 4363463463464363463463463.bin.exe | Potentially Bad Traffic | ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response |
2024 | 4363463463464363463463463.bin.exe | Potential Corporate Privacy Violation | AV POLICY HTTP request for .exe file with no User-Agent |
1820 | Dctooux.exe | Malware Command and Control Activity Detected | BOTNET [ANY.RUN] Amadey |
2024 | 4363463463464363463463463.bin.exe | Potentially Bad Traffic | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |
2024 | 4363463463464363463463463.bin.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
2024 | 4363463463464363463463463.bin.exe | Potential Corporate Privacy Violation | AV POLICY HTTP request for .exe file with no User-Agent |
Process | Message |
|---|---|
4363463463464363463463463.bin.exe | The specified executable is not a valid application for this OS platform.
|