File name:

file

Full analysis: https://app.any.run/tasks/87f269ef-5f9a-4e9e-a4a9-29bab721775b
Verdict: Malicious activity
Threats:

Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks.

Analysis date: September 24, 2024, 06:11:42
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
amadey
botnet
stealer
opendir
loader
stealc
themida
autoit
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

5E2F916FB8245EE1A5A54EF88C0552A7

SHA1:

6F58DB34358A0122EFA1961F8EE4F0ABFDC8EF5B

SHA256:

3831464579A25C4C01CB382305511A8033EAC84229B5F5856D7E301230F8A48D

SSDEEP:

98304:5kbm77pemEpT4AAAQrQEqfPgWo2NOJiH2bdd0WyxlgPsuFcyXC3b16v1m9IinR9:Iku

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • AMADEY has been detected (SURICATA)

      • skotes.exe (PID: 1712)
    • StealC has been detected

      • df0c7c9393.exe (PID: 2108)
    • Changes the autorun value in the registry

      • skotes.exe (PID: 1712)
    • AMADEY has been detected (YARA)

      • skotes.exe (PID: 1712)
    • Changes powershell execution policy (RemoteSigned)

      • skotes.exe (PID: 1712)
    • Starts Visual C# compiler

      • powershell.exe (PID: 4076)
    • Connects to the CnC server

      • skotes.exe (PID: 1712)
      • df0c7c9393.exe (PID: 2108)
      • 241f1de3ca.exe (PID: 7272)
    • Stealers network behavior

      • 241f1de3ca.exe (PID: 7272)
      • df0c7c9393.exe (PID: 2108)
    • STEALC has been detected (SURICATA)

      • 241f1de3ca.exe (PID: 7272)
      • df0c7c9393.exe (PID: 2108)
  • SUSPICIOUS

    • Reads the BIOS version

      • file.exe (PID: 1128)
      • skotes.exe (PID: 1712)
      • df0c7c9393.exe (PID: 2108)
    • Reads security settings of Internet Explorer

      • file.exe (PID: 1128)
      • df0c7c9393.exe (PID: 2108)
      • skotes.exe (PID: 1712)
    • Executable content was dropped or overwritten

      • file.exe (PID: 1128)
      • skotes.exe (PID: 1712)
      • csc.exe (PID: 8004)
    • Starts itself from another location

      • file.exe (PID: 1128)
    • Windows Defender mutex has been found

      • df0c7c9393.exe (PID: 2108)
    • Connects to the server without a host name

      • skotes.exe (PID: 1712)
    • Contacting a server suspected of hosting an CnC

      • skotes.exe (PID: 1712)
      • 241f1de3ca.exe (PID: 7272)
      • df0c7c9393.exe (PID: 2108)
    • Starts POWERSHELL.EXE for commands execution

      • skotes.exe (PID: 1712)
    • The process executes Powershell scripts

      • skotes.exe (PID: 1712)
    • Uses .NET C# to load dll

      • powershell.exe (PID: 4076)
    • Potential Corporate Privacy Violation

      • skotes.exe (PID: 1712)
    • The process executes via Task Scheduler

      • skotes.exe (PID: 2204)
      • skotes.exe (PID: 6600)
  • INFO

    • Checks supported languages

      • file.exe (PID: 1128)
      • skotes.exe (PID: 1712)
      • df0c7c9393.exe (PID: 2108)
    • Reads the computer name

      • file.exe (PID: 1128)
      • skotes.exe (PID: 1712)
      • df0c7c9393.exe (PID: 2108)
    • Sends debugging messages

      • file.exe (PID: 1128)
      • skotes.exe (PID: 1712)
      • df0c7c9393.exe (PID: 2108)
    • Create files in a temporary directory

      • file.exe (PID: 1128)
      • skotes.exe (PID: 1712)
    • The process uses the downloaded file

      • file.exe (PID: 1128)
      • skotes.exe (PID: 1712)
    • Process checks computer location settings

      • file.exe (PID: 1128)
      • skotes.exe (PID: 1712)
    • Checks proxy server information

      • df0c7c9393.exe (PID: 2108)
      • skotes.exe (PID: 1712)
    • Creates files or folders in the user directory

      • df0c7c9393.exe (PID: 2108)
      • skotes.exe (PID: 1712)
    • Application launched itself

      • firefox.exe (PID: 6272)
      • firefox.exe (PID: 6832)
      • firefox.exe (PID: 7832)
    • Manual execution by a user

      • firefox.exe (PID: 6272)
    • Themida protector has been detected

      • skotes.exe (PID: 1712)
    • The process uses AutoIt

      • 03a63843b3.exe (PID: 7036)
    • Executable content was dropped or overwritten

      • firefox.exe (PID: 6832)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

Amadey

(PID) Process(1712) skotes.exe
C2185.215.113.43
URLhttp://185.215.113.43/Zu7JuNko/index.php
Version4.42
Options
Drop directoryabc3bc1985
Drop nameskotes.exe
Strings (120)VideoID
st=s
id:
" Content-Type: application/octet-stream
2022
exe
SYSTEM\CurrentControlSet\Control\ComputerName\ComputerName
-unicode-
<d>
Doctor Web
AVG
dll
Main
Norton
" && ren
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
skotes.exe
4.42
&unit=
/Plugins/
rb
cred.dll
#
ProgramData\
rundll32.exe
cmd
--
vs:
DefaultSettings.XResolution
random
?scr=1
GetNativeSystemInfo
%-lu
/Zu7JuNko/index.php
SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
og:
Powershell.exe
" && timeout 1 && del
/quiet
r=
AVAST Software
abc3bc1985
360TotalSecurity
dm:
Comodo
Sophos
GET
=
wb
SYSTEM\CurrentControlSet\Control\UnitedVideo\CONTROL\VIDEO\
lv:
Rem
Content-Disposition: form-data; name="data"; filename="
SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
Bitdefender
DefaultSettings.YResolution
un:
https://
SYSTEM\ControlSet001\Services\BasicDisplay\Video
shutdown -s -t 0
ProductName
sd:
"taskkill /f /im "
&& Exit"
Panda Security
http://
POST
Content-Type: application/x-www-form-urlencoded
ComputerName
------
0123456789
CurrentBuild
rundll32
cred.dll|clip.dll|
.jpg
clip.dll
kernel32.dll
:::
S-%lu-
WinDefender
ar:
Kaspersky Lab
185.215.113.43
SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
\App
SOFTWARE\Microsoft\Windows NT\CurrentVersion
\0000
e2
"
|
-%lu
os:
-executionpolicy remotesigned -File "
ESET
------
pc:
+++
Content-Type: multipart/form-data; boundary=----
av:
\
cmd /C RMDIR /s/q
ps1
Programs
%USERPROFILE%
e0
&&
zip
<c>
e1
bi:
msi
Startup
Avira
d1
shell32.dll
abcdefghijklmnopqrstuvwxyz0123456789-_
2016
2019
2025
/k
No Malware configuration.

TRiD

.dll | Win32 Dynamic Link Library (generic) (43.5)
.exe | Win32 Executable (generic) (29.8)
.exe | Generic Win/DOS Executable (13.2)
.exe | DOS Executable Generic (13.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:09:22 17:40:44+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.24
CodeSize: 322048
InitializedDataSize: 117248
UninitializedDataSize: -
EntryPoint: 0x4c1000
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
158
Monitored processes
29
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
start file.exe #AMADEY skotes.exe #STEALC df0c7c9393.exe THREAT 03a63843b3.exe skotes.exe firefox.exe no specs firefox.exe no specs firefox.exe firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs powershell.exe no specs conhost.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs #STEALC 241f1de3ca.exe firefox.exe no specs firefox.exe no specs firefox.exe no specs csc.exe cvtres.exe no specs sppextcomobj.exe no specs slui.exe skotes.exe slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1128"C:\Users\admin\AppData\Local\Temp\file.exe" C:\Users\admin\AppData\Local\Temp\file.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\file.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
1712"C:\Users\admin\AppData\Local\Temp\abc3bc1985\skotes.exe" C:\Users\admin\AppData\Local\Temp\abc3bc1985\skotes.exe
file.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\abc3bc1985\skotes.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
Amadey
(PID) Process(1712) skotes.exe
C2185.215.113.43
URLhttp://185.215.113.43/Zu7JuNko/index.php
Version4.42
Options
Drop directoryabc3bc1985
Drop nameskotes.exe
Strings (120)VideoID
st=s
id:
" Content-Type: application/octet-stream
2022
exe
SYSTEM\CurrentControlSet\Control\ComputerName\ComputerName
-unicode-
<d>
Doctor Web
AVG
dll
Main
Norton
" && ren
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
skotes.exe
4.42
&unit=
/Plugins/
rb
cred.dll
#
ProgramData\
rundll32.exe
cmd
--
vs:
DefaultSettings.XResolution
random
?scr=1
GetNativeSystemInfo
%-lu
/Zu7JuNko/index.php
SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
og:
Powershell.exe
" && timeout 1 && del
/quiet
r=
AVAST Software
abc3bc1985
360TotalSecurity
dm:
Comodo
Sophos
GET
=
wb
SYSTEM\CurrentControlSet\Control\UnitedVideo\CONTROL\VIDEO\
lv:
Rem
Content-Disposition: form-data; name="data"; filename="
SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
Bitdefender
DefaultSettings.YResolution
un:
https://
SYSTEM\ControlSet001\Services\BasicDisplay\Video
shutdown -s -t 0
ProductName
sd:
"taskkill /f /im "
&& Exit"
Panda Security
http://
POST
Content-Type: application/x-www-form-urlencoded
ComputerName
------
0123456789
CurrentBuild
rundll32
cred.dll|clip.dll|
.jpg
clip.dll
kernel32.dll
:::
S-%lu-
WinDefender
ar:
Kaspersky Lab
185.215.113.43
SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
\App
SOFTWARE\Microsoft\Windows NT\CurrentVersion
\0000
e2
"
|
-%lu
os:
-executionpolicy remotesigned -File "
ESET
------
pc:
+++
Content-Type: multipart/form-data; boundary=----
av:
\
cmd /C RMDIR /s/q
ps1
Programs
%USERPROFILE%
e0
&&
zip
<c>
e1
bi:
msi
Startup
Avira
d1
shell32.dll
abcdefghijklmnopqrstuvwxyz0123456789-_
2016
2019
2025
/k
2108"C:\Users\admin\AppData\Local\Temp\1000002001\df0c7c9393.exe" C:\Users\admin\AppData\Local\Temp\1000002001\df0c7c9393.exe
skotes.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\1000002001\df0c7c9393.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
2204"C:\Users\admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\admin\AppData\Local\Temp\abc3bc1985\skotes.exe
svchost.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\abc3bc1985\skotes.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\user32.dll
c:\windows\syswow64\win32u.dll
2424"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1832 -parentBuildID 20240213221259 -prefsHandle 1768 -prefMapHandle 1760 -prefsLen 30537 -prefMapSize 244343 -appDir "C:\Program Files\Mozilla Firefox\browser" - {265f8907-d00a-4171-b471-faf1a16b8831} 6832 "\\.\pipe\gecko-crash-server-pipe.6832" 2263fde5110 gpuC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Version:
123.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\msvcp140.dll
c:\windows\system32\vcruntime140.dll
2904"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2904 -childID 1 -isForBrowser -prefsHandle 2896 -prefMapHandle 2892 -prefsLen 26706 -prefMapSize 244343 -jsInitHandle 1376 -jsInitLen 235124 -parentBuildID 20240213221259 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {adf08be8-6062-42a0-9ca3-fcdfbed3e609} 6832 "\\.\pipe\gecko-crash-server-pipe.6832" 22645c5e150 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Version:
123.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\msvcp140.dll
c:\windows\system32\vcruntime140.dll
4076"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\admin\AppData\Local\Temp\1000008141\blo.ps1"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeskotes.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
4444"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5408 -parentBuildID 20240213221259 -sandboxingKind 0 -prefsHandle 4968 -prefMapHandle 5392 -prefsLen 34713 -prefMapSize 244343 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {93152829-3dd8-4cf8-8f22-939e1db3c2c5} 6832 "\\.\pipe\gecko-crash-server-pipe.6832" 2264ab4eb10 utilityC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Version:
123.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\msvcp140.dll
c:\windows\system32\vcruntime140.dll
4644\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5028"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5536 -childID 3 -isForBrowser -prefsHandle 5592 -prefMapHandle 5588 -prefsLen 31161 -prefMapSize 244343 -jsInitHandle 1376 -jsInitLen 235124 -parentBuildID 20240213221259 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5aa4498f-26d5-438d-b55b-3e62c8866709} 6832 "\\.\pipe\gecko-crash-server-pipe.6832" 22648dd1310 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Version:
123.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\msvcp140.dll
c:\windows\system32\vcruntime140.dll
Total events
20 327
Read events
20 314
Write events
13
Delete events
0

Modification events

(PID) Process:(1712) skotes.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(1712) skotes.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(1712) skotes.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(2108) df0c7c9393.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(2108) df0c7c9393.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2108) df0c7c9393.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(1712) skotes.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:df0c7c9393.exe
Value:
C:\Users\admin\AppData\Local\Temp\1000002001\df0c7c9393.exe
(PID) Process:(6832) firefox.exeKey:HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\DllPrefetchExperiment
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe
Value:
0
(PID) Process:(1712) skotes.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:03a63843b3.exe
Value:
C:\Users\admin\AppData\Local\Temp\1000004101\03a63843b3.exe
(PID) Process:(1712) skotes.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:241f1de3ca.exe
Value:
C:\Users\admin\1000015002\241f1de3ca.exe
Executable files
9
Suspicious files
171
Text files
49
Unknown types
1

Dropped files

PID
Process
Filename
Type
1712skotes.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\KCV3KQBA\random[1].exeexecutable
MD5:968F1713291A2E6F0AA6897C3B4FFC5A
SHA256:1E6C55DE26DB9B94AC8EC4CD919EC8B86D325BAEEDE09705651557A31FC56BD6
6832firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\storage\permanent\chrome\idb\1657114595AmcateirvtiSty.sqlite-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
6832firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\sessionCheckpoints.jsonbinary
MD5:EA8B62857DFDBD3D0BE7D7E4A954EC9A
SHA256:792955295AE9C382986222C6731C5870BD0E921E7F7E34CC4615F5CD67F225DA
1712skotes.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\AH8CR9J5\random[1].exeexecutable
MD5:C22583E37658E274902F9D65F76D4FFC
SHA256:2DD94122C325D9B40CE1A4591FCAB178FBA1EF148DBB87C1D0E34328B15F9E31
1712skotes.exeC:\Users\admin\AppData\Local\Temp\1000002001\df0c7c9393.exeexecutable
MD5:C22583E37658E274902F9D65F76D4FFC
SHA256:2DD94122C325D9B40CE1A4591FCAB178FBA1EF148DBB87C1D0E34328B15F9E31
6832firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\9kie7cg6.default-release\startupCache\urlCache-current.binbinary
MD5:297E88D7CEB26E549254EC875649F4EB
SHA256:8B75D4FB1845BAA06122888D11F6B65E6A36B140C54A72CC13DF390FD7C95702
1712skotes.exeC:\Users\admin\AppData\Local\Temp\1000004101\03a63843b3.exeexecutable
MD5:968F1713291A2E6F0AA6897C3B4FFC5A
SHA256:1E6C55DE26DB9B94AC8EC4CD919EC8B86D325BAEEDE09705651557A31FC56BD6
6832firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\cookies.sqlite-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
6832firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\prefs-1.jstext
MD5:872892B4C4565890ABF02EDBD0F61AA4
SHA256:5654375FE2FEEB9221166580CB21204C8FE19FA2445FB8CD88A30C738B01B15E
6832firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
45
TCP/UDP connections
110
DNS requests
131
Threats
21

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1712
skotes.exe
POST
200
185.215.113.43:80
http://185.215.113.43/Zu7JuNko/index.php
unknown
unknown
1712
skotes.exe
GET
200
185.215.113.103:80
http://185.215.113.103/steam/random.exe
unknown
suspicious
1712
skotes.exe
POST
200
185.215.113.43:80
http://185.215.113.43/Zu7JuNko/index.php
unknown
unknown
2108
df0c7c9393.exe
GET
200
185.215.113.37:80
http://185.215.113.37/
unknown
malicious
6440
svchost.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1712
skotes.exe
GET
200
185.215.113.103:80
http://185.215.113.103/well/random.exe
unknown
malicious
6832
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/canonical.html
unknown
whitelisted
6832
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/success.txt?ipv4
unknown
whitelisted
2108
df0c7c9393.exe
POST
200
185.215.113.37:80
http://185.215.113.37/e2b1563c6670f193.php
unknown
unknown
6832
firefox.exe
POST
200
184.25.51.75:80
http://r10.o.lencr.org/
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
6440
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2272
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2120
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
104.208.16.92:443
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
92.122.215.53:443
Akamai International B.V.
DE
unknown
3888
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
1712
skotes.exe
185.215.113.43:80
1337team Limited
SC
malicious
6440
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6440
svchost.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.124.78.146
  • 51.104.136.2
whitelisted
google.com
  • 142.250.185.110
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
detectportal.firefox.com
  • 34.107.221.82
whitelisted
youtube.com
  • 142.250.185.78
  • 2a00:1450:4001:80e::200e
whitelisted
prod.detectportal.prod.cloudops.mozgcp.net
  • 34.107.221.82
  • 2600:1901:0:38d7::
whitelisted
example.org
  • 93.184.215.14
whitelisted
ipv4only.arpa
  • 192.0.0.170
  • 192.0.0.171
whitelisted
contile.services.mozilla.com
  • 34.117.188.166
whitelisted
spocs.getpocket.com
  • 34.117.188.166
whitelisted

Threats

PID
Process
Class
Message
1712
skotes.exe
Misc Attack
ET DROP Spamhaus DROP Listed Traffic Inbound group 32
1712
skotes.exe
Malware Command and Control Activity Detected
BOTNET [ANY.RUN] Amadey HTTP POST Request (st=s)
1712
skotes.exe
Misc Attack
ET DROP Spamhaus DROP Listed Traffic Inbound group 32
1712
skotes.exe
Potentially Bad Traffic
ET INFO Executable Download from dotted-quad Host
1712
skotes.exe
Potentially Bad Traffic
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
1712
skotes.exe
Potentially Bad Traffic
ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response
1712
skotes.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
2108
df0c7c9393.exe
Misc Attack
ET DROP Spamhaus DROP Listed Traffic Inbound group 32
1712
skotes.exe
A Network Trojan was detected
ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2
2108
df0c7c9393.exe
Malware Command and Control Activity Detected
STEALER [ANY.RUN] Stealc HTTP POST Request
2 ETPRO signatures available at the full report
Process
Message
file.exe
%s------------------------------------------------ --- Themida Professional --- --- (c)2012 Oreans Technologies --- ------------------------------------------------
skotes.exe
%s------------------------------------------------ --- Themida Professional --- --- (c)2012 Oreans Technologies --- ------------------------------------------------
df0c7c9393.exe
%s------------------------------------------------ --- Themida Professional --- --- (c)2012 Oreans Technologies --- ------------------------------------------------
skotes.exe
%s------------------------------------------------ --- Themida Professional --- --- (c)2012 Oreans Technologies --- ------------------------------------------------
241f1de3ca.exe
%s------------------------------------------------ --- Themida Professional --- --- (c)2012 Oreans Technologies --- ------------------------------------------------
skotes.exe
%s------------------------------------------------ --- Themida Professional --- --- (c)2012 Oreans Technologies --- ------------------------------------------------