| File name: | 4363463463464363463463463.exe |
| Full analysis: | https://app.any.run/tasks/4824bc44-3886-4849-a421-465e0e5097a3 |
| Verdict: | Malicious activity |
| Threats: | Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks. |
| Analysis date: | May 11, 2024, 10:04:09 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows |
| MD5: | 2A94F3960C58C6E70826495F76D00B85 |
| SHA1: | E2A1A5641295F5EBF01A37AC1C170AC0814BB71A |
| SHA256: | 2FCAD226B17131DA4274E1B9F8F31359BDD325C9568665F08FD1F6C5D06A23CE |
| SSDEEP: | 192:2we8sGKE6MqyG7c20L7BIW12n/ePSmzkTInu8stYcFwVc03KY:9e8sGKfMqyGg20PKn/cRaInuptYcFwVY |
| .exe | | | Generic CIL Executable (.NET, Mono, etc.) (82.9) |
|---|---|---|
| .dll | | | Win32 Dynamic Link Library (generic) (7.4) |
| .exe | | | Win32 Executable (generic) (5.1) |
| .exe | | | Generic Win/DOS Executable (2.2) |
| .exe | | | DOS Executable Generic (2.2) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2023:12:22 08:29:10+00:00 |
| ImageFileCharacteristics: | Executable, Large address aware |
| PEType: | PE32 |
| LinkerVersion: | 80 |
| CodeSize: | 5632 |
| InitializedDataSize: | 4608 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x3552 |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 6 |
| Subsystem: | Windows command line |
| FileVersionNumber: | 0.0.0.0 |
| ProductVersionNumber: | 0.0.0.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| FileDescription: | |
| FileVersion: | 0.0.0.0 |
| InternalName: | 4363463463464363463463463.exe |
| LegalCopyright: | |
| OriginalFileName: | 4363463463464363463463463.exe |
| ProductVersion: | 0.0.0.0 |
| AssemblyVersion: | 0.0.0.0 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 188 | schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 13 /tr "'C:\Recovery\345b46fe-a9f9-11e7-a83c-e8a4f72b1d33\winlogon.exe'" /rl HIGHEST /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Manages scheduled tasks Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 284 | "C:\Users\admin\Desktop\Files\svcyr.exe" | C:\Users\admin\Desktop\Files\svcyr.exe | — | 4363463463464363463463463.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Enhanced Storage Password Authentication Program Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 304 | schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Recovery\345b46fe-a9f9-11e7-a83c-e8a4f72b1d33\csrss.exe'" /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Manages scheduled tasks Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 304 | C:\Users\admin\Desktop\Files\NewB.exe | C:\Users\admin\Desktop\Files\NewB.exe | — | taskeng.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 308 | "C:\Users\admin\Desktop\Files\loader.exe" | C:\Users\admin\Desktop\Files\loader.exe | 4363463463464363463463463.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 308 | "C:\Users\admin\Desktop\Files\s.exe" | C:\Users\admin\Desktop\Files\s.exe | 4363463463464363463463463.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 316 | ICACLS "C:\Program Files\AIOC5" /grant:r Everyone:(OI)(CI)(F) | C:\Windows\System32\icacls.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 504 | "C:\Users\admin\AppData\Local\Temp\u1gc.0.exe" | C:\Users\admin\AppData\Local\Temp\u1gc.0.exe | ISetup8.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 524 | schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 13 /tr "'C:\Users\All Users\Templates\dwm.exe'" /rl HIGHEST /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Manages scheduled tasks Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 552 | "C:\Program Files\Microsoft Yimvuz\Uiekeum.exe" Win7 | C:\Program Files\Microsoft Yimvuz\Uiekeum.exe | — | Uiekeum.exe | |||||||||||
User: SYSTEM Company: Microsoft, Inc. Integrity Level: SYSTEM Description: HTTPSVR MFC Application Exit code: 0 Version: 2, 0, 0, 1 Modules
| |||||||||||||||
| (PID) Process: | (1020) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASAPI32 |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (1020) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASAPI32 |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
| (PID) Process: | (1020) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASAPI32 |
| Operation: | write | Name: | FileTracingMask |
Value: | |||
| (PID) Process: | (1020) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASAPI32 |
| Operation: | write | Name: | ConsoleTracingMask |
Value: | |||
| (PID) Process: | (1020) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASAPI32 |
| Operation: | write | Name: | MaxFileSize |
Value: 1048576 | |||
| (PID) Process: | (1020) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASAPI32 |
| Operation: | write | Name: | FileDirectory |
Value: %windir%\tracing | |||
| (PID) Process: | (1020) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASMANCS |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (1020) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASMANCS |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
| (PID) Process: | (1020) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASMANCS |
| Operation: | write | Name: | FileTracingMask |
Value: | |||
| (PID) Process: | (1020) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASMANCS |
| Operation: | write | Name: | ConsoleTracingMask |
Value: | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 1020 | 4363463463464363463463463.exe | C:\Users\admin\Desktop\Files\loader.exe | executable | |
MD5:EB562E873C0D6BA767964D0DE55AC5A9 | SHA256:E8E3CDDCC753E66757C3D6A47B63117F718103F03A039B40A4553849E04B8AEC | |||
| 308 | loader.exe | C:\Users\admin\AppData\Local\Temp\rhsgn_protected.exe | executable | |
MD5:D0DE8273F957E0508F8B5A0897FECCE9 | SHA256:B4144CFD46AD378183A9F1D0136B8465CE80DE44423343891400524CB6CC57EB | |||
| 728 | rhsgn_protected.exe | C:\Users\admin\AppData\Local\Temp\ebehmonl.dll | executable | |
MD5:2686070D4A4B5C7401B7AF185ABD71BF | SHA256:11F686ACA158EF40459B0CF92F117186B63765151BDF4295C268AE5DADCABE2A | |||
| 728 | rhsgn_protected.exe | C:\Users\admin\AppData\Local\Temp\eamsi.dll | executable | |
MD5:CCFE48E3AAF6A7ADF5643D90CDE3439C | SHA256:5E1F9CBC0F1CA645183F26E25463679AA89CD22A29D427C000AEA0E1E9C11903 | |||
| 728 | rhsgn_protected.exe | C:\Users\admin\AppData\Local\Temp\cfgres.dll | executable | |
MD5:F4C9CF4A73F3ACD5A4EF1F60F9297145 | SHA256:81B4575928B6D753306848C2F9217BA076D3C0643CB20F378CD883CDB4FDD329 | |||
| 728 | rhsgn_protected.exe | C:\Users\admin\AppData\Local\Temp\DMON.dll | executable | |
MD5:58F7761BE8678A189604E2B61C7D7AEB | SHA256:F759CEF48A4E798BEC5AC8BAF10376E1E024E0A128B4B4A5B45F289EE31207DF | |||
| 728 | rhsgn_protected.exe | C:\Users\admin\AppData\Local\Temp\ARA.exe | executable | |
MD5:FB10155E44F99861B4F315842AAD8117 | SHA256:118F5BA14837745EEF57BF35ED413AAF13945E8651EBF361304A86B28B0A532C | |||
| 1236 | ARA.exe | C:\Users\admin\AppData\Roaming\reviewintobrokerHost\aUs3pwix5Vd1U6IYzTsfZ9E8dEV3MF.vbe | vbe | |
MD5:5050104B6A1222B401DE71F0079FD122 | SHA256:43C7B034403C39D71802A2EFC7558648C229544B3337D4298498A0D503151A46 | |||
| 1236 | ARA.exe | C:\Users\admin\AppData\Roaming\reviewintobrokerHost\WJgXY0RCE6WdWGoPyLk7f.bat | text | |
MD5:62416939CBA1A6B6C67A4D907E563F09 | SHA256:1BC255D6927643C2F628AE5AB09D83694B99992BC70B2289348FCA9C966D97AA | |||
| 1020 | 4363463463464363463463463.exe | C:\Users\admin\Desktop\Files\svcyr.exe | executable | |
MD5:7EDC4B4B6593BD68C65CD155B8755F26 | SHA256:DCD92EC043CB491B3DE3E4F73FBE35041274A9B81D48B4377C8C9A8157C95590 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
1020 | 4363463463464363463463463.exe | GET | 200 | 185.234.216.64:8000 | http://185.234.216.64:8000/PH32.exe | unknown | — | — | unknown |
2244 | taskeng.exe | GET | 301 | 23.227.193.58:80 | http://23.227.193.58/trackwordpressdleCentral.php?K6Mtes2juD=xCKYXP3qS&e0f29c517e1a609644d46d762ae60a99=e89d1129f5ab2e60dc88598472194209&da16ae8a37fa2943455b333d7e17db89=QZ4MDOiBTNwQWZ4MTOjhTOiNTYyMzMyUGMjFGN1ETMhZzMiJGN5UWM&K6Mtes2juD=xCKYXP3qS | unknown | — | — | unknown |
1020 | 4363463463464363463463463.exe | GET | 200 | 160.181.160.187:8888 | http://160.181.160.187:8888/svcyr.exe | unknown | — | — | unknown |
1020 | 4363463463464363463463463.exe | GET | 200 | 92.60.39.76:9993 | http://92.60.39.76:9993/wr.exe | unknown | — | — | unknown |
1020 | 4363463463464363463463463.exe | GET | — | 121.177.29.204:8080 | http://121.177.29.204:8080/nomal1.exe | unknown | — | — | unknown |
1020 | 4363463463464363463463463.exe | GET | 200 | 91.215.85.223:80 | http://marksidfgs.ug/ghjkl.exe | unknown | — | — | unknown |
1020 | 4363463463464363463463463.exe | GET | 200 | 103.164.63.79:80 | http://www.aokdemc.com/setup%E4%B8%8B%E8%BD%BD%E5%90%8D%E5%8D%95%E7%9B%AE%E5%BD%956001.exe | unknown | — | — | unknown |
2968 | taskeng.exe | GET | 301 | 23.227.193.58:80 | http://23.227.193.58/trackwordpressdleCentral.php?nTpz4tBkEffHSxvJX2feX5v=PFt&EW3lilo=8ZvGO6YDsWpwXo96D7U&e0f29c517e1a609644d46d762ae60a99=e89d1129f5ab2e60dc88598472194209&da16ae8a37fa2943455b333d7e17db89=QZ4MDOiBTNwQWZ4MTOjhTOiNTYyMzMyUGMjFGN1ETMhZzMiJGN5UWM&nTpz4tBkEffHSxvJX2feX5v=PFt&EW3lilo=8ZvGO6YDsWpwXo96D7U | unknown | — | — | unknown |
1020 | 4363463463464363463463463.exe | GET | 200 | 185.172.128.121:80 | http://185.172.128.121/svchost.exe | unknown | — | — | unknown |
1020 | 4363463463464363463463463.exe | GET | 200 | 43.226.35.175:80 | http://43.226.35.175/server.exe | unknown | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
— | — | 224.0.0.252:5355 | — | — | — | unknown |
1020 | 4363463463464363463463463.exe | 151.101.194.49:443 | urlhaus.abuse.ch | FASTLY | US | unknown |
1088 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
1020 | 4363463463464363463463463.exe | 185.234.216.64:8000 | — | — | RU | unknown |
1020 | 4363463463464363463463463.exe | 210.19.94.140:443 | www.maxmoney.com | TIME dotCom Berhad No. 14, Jalan Majistret U126 Hicom Glenmarie Industrial Park 40150 Shah Al | MY | unknown |
1020 | 4363463463464363463463463.exe | 160.181.160.187:8888 | — | Technology Business Development Limited | AE | unknown |
1020 | 4363463463464363463463463.exe | 92.60.39.76:9993 | — | netcup GmbH | DE | unknown |
1020 | 4363463463464363463463463.exe | 121.177.29.204:8080 | rornfl12.duckdns.org | Korea Telecom | KR | unknown |
Domain | IP | Reputation |
|---|---|---|
urlhaus.abuse.ch |
| whitelisted |
www.maxmoney.com |
| unknown |
v8.ter.tf |
| unknown |
www.aokdemc.com |
| unknown |
marksidfgs.ug |
| unknown |
rornfl12.duckdns.org |
| unknown |
www.osijek1862.com |
| unknown |
ctldl.windowsupdate.com |
| whitelisted |
manulop.ug |
| unknown |
github.com |
| shared |
PID | Process | Class | Message |
|---|---|---|---|
1020 | 4363463463464363463463463.exe | Misc Attack | ET DROP Spamhaus DROP Listed Traffic Inbound group 33 |
1020 | 4363463463464363463463463.exe | Potential Corporate Privacy Violation | AV POLICY HTTP request for .exe file with no User-Agent |
1020 | 4363463463464363463463463.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
1020 | 4363463463464363463463463.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
1020 | 4363463463464363463463463.exe | Potentially Bad Traffic | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |
1020 | 4363463463464363463463463.exe | Potentially Bad Traffic | ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response |
— | — | Potential Corporate Privacy Violation | AV POLICY HTTP request for .exe file with no User-Agent |
— | — | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
— | — | A Network Trojan was detected | ET HUNTING Rejetto HTTP File Sever Response |
— | — | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
Process | Message |
|---|---|
4363463463464363463463463.exe | The specified executable is not a valid application for this OS platform.
|
4363463463464363463463463.exe | The specified executable is not a valid application for this OS platform.
|
4363463463464363463463463.exe | The request was aborted: Could not create SSL/TLS secure channel.
|
4363463463464363463463463.exe | An exception occurred during a WebClient request.
|