| File name: | services64.exe |
| Full analysis: | https://app.any.run/tasks/f153ec64-c9d1-4497-835b-8209258d008e |
| Verdict: | Malicious activity |
| Threats: | Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks. |
| Analysis date: | July 12, 2024, 16:27:49 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32+ executable (GUI) x86-64, for MS Windows |
| MD5: | C8A50A6F1F73DF72DE866F6131346E69 |
| SHA1: | 37D99D5A8254CEAD586931F8B0C9B4CF031E0B4D |
| SHA256: | 59E6A5009CE5E9547078DB7F964BB8FC10EE999DD35B7E9243F119DB8337AA8D |
| SSDEEP: | 98304:Z2po3+iAbH4f0m/QqLh6mhaRgiSaFa7aOb356EGMGVUHMLXCGnns2lB89CwpEgCZ:9a/dGqlLymIwubawejGFuqVUiO |
| .exe | | | Generic Win/DOS Executable (50) |
|---|---|---|
| .exe | | | DOS Executable Generic (49.9) |
| MachineType: | AMD AMD64 |
|---|---|
| TimeStamp: | 2024:06:03 14:47:49+00:00 |
| ImageFileCharacteristics: | Executable, Large address aware |
| PEType: | PE32+ |
| LinkerVersion: | 14 |
| CodeSize: | 46592 |
| InitializedDataSize: | 5435904 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x11b7b1e |
| OSVersion: | 6 |
| ImageVersion: | - |
| SubsystemVersion: | 6 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 188 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | sc.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 240 | "C:\Users\admin\Desktop\services64.exe" | C:\Users\admin\Desktop\services64.exe | powershell.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 320 | C:\WINDOWS\system32\svchost.exe -k DcomLaunch -p -s LSM | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 448 | C:\WINDOWS\system32\powercfg.exe /x -hibernate-timeout-dc 0 | C:\Windows\System32\powercfg.exe | — | WindowsAutHost | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Power Settings Command-Line Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 564 | "C:\Program Files\RUXIM\PLUGscheduler.exe" | C:\Program Files\RUXIM\PLUGScheduler.exe | svchost.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Update LifeCycle Component Scheduler Exit code: 0 Version: 10.0.19041.3623 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 684 | winlogon.exe | C:\Windows\System32\winlogon.exe | — | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Logon Application Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 768 | C:\WINDOWS\system32\lsass.exe | C:\Windows\System32\lsass.exe | wininit.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Local Security Authority Process Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 776 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | sc.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 844 | C:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding | C:\Windows\System32\oobe\UserOOBEBroker.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: User OOBE Broker Version: 10.0.19041.3758 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 852 | "dwm.exe" | C:\Windows\System32\dwm.exe | winlogon.exe | ||||||||||||
User: DWM-1 Company: Microsoft Corporation Integrity Level: SYSTEM Description: Desktop Window Manager Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (4612) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0 |
| Operation: | write | Name: | CheckSetting |
Value: 23004100430042006C006F00620000000000000000000000010000000000000000000000 | |||
| (PID) Process: | (5588) svchost.exe | Key: | HKEY_USERS\S-1-5-21-1693682860-607145093-2874071422-1001\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Store |
| Operation: | write | Name: | C:\Users\admin\Desktop\services64.exe |
Value: 5341435001000000000000000700000028000000000A0E010000000001000000000000000000000A7320000050BB64EDDDACD5010000000000000000 | |||
| (PID) Process: | (5588) svchost.exe | Key: | HKEY_USERS\S-1-5-21-1693682860-607145093-2874071422-1001\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Store |
| Operation: | write | Name: | C:\Users\admin\Desktop\services64.exe |
Value: 5341435001000000000000000700000028000000000A0E010000000001000000000000000000000A7320000050BB64EDDDACD50100000000000000000200000028000000000000000000000000000000000000000000000000000000DF070000000000000100000001000000 | |||
| (PID) Process: | (5588) svchost.exe | Key: | \REGISTRY\A\{cbf859d4-d98c-fd7b-6033-c012b9b88a38}\Root\InventoryApplicationFile |
| Operation: | write | Name: | WritePermissionsCheck |
Value: 1 | |||
| (PID) Process: | (5588) svchost.exe | Key: | \REGISTRY\A\{cbf859d4-d98c-fd7b-6033-c012b9b88a38}\Root\InventoryApplicationFile\PermissionsCheckTestKey |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (5588) svchost.exe | Key: | \REGISTRY\A\{cbf859d4-d98c-fd7b-6033-c012b9b88a38}\Root\InventoryApplicationFile\services64.exe|2e4e2afde1f8e215 |
| Operation: | write | Name: | ProgramId |
Value: 000614a5885019d47546172882b4bb55f3de0000ffff | |||
| (PID) Process: | (5588) svchost.exe | Key: | \REGISTRY\A\{cbf859d4-d98c-fd7b-6033-c012b9b88a38}\Root\InventoryApplicationFile\services64.exe|2e4e2afde1f8e215 |
| Operation: | write | Name: | FileId |
Value: 000037d99d5a8254cead586931f8b0c9b4cf031e0b4d | |||
| (PID) Process: | (5588) svchost.exe | Key: | \REGISTRY\A\{cbf859d4-d98c-fd7b-6033-c012b9b88a38}\Root\InventoryApplicationFile\services64.exe|2e4e2afde1f8e215 |
| Operation: | write | Name: | LowerCaseLongPath |
Value: c:\users\admin\desktop\services64.exe | |||
| (PID) Process: | (5588) svchost.exe | Key: | \REGISTRY\A\{cbf859d4-d98c-fd7b-6033-c012b9b88a38}\Root\InventoryApplicationFile\services64.exe|2e4e2afde1f8e215 |
| Operation: | write | Name: | LongPathHash |
Value: services64.exe|2e4e2afde1f8e215 | |||
| (PID) Process: | (5588) svchost.exe | Key: | \REGISTRY\A\{cbf859d4-d98c-fd7b-6033-c012b9b88a38}\Root\InventoryApplicationFile\services64.exe|2e4e2afde1f8e215 |
| Operation: | write | Name: | Name |
Value: services64.exe | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2340 | MoUsoCoreWorker.exe | C:\WINDOWS\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\21253908F3CB05D51B1C2DA8B681A785 | binary | |
MD5:84552A004AE0D265F143BE19BBC7C213 | SHA256:746C55535D2AADB1B9AF529EDD7D4D00401CCDC08D20FABC17A901228942A816 | |||
| 1608 | svchost.exe | C:\Windows\Prefetch\SERVICES64.EXE-F455637A.pf | binary | |
MD5:FAC394B6C95A263ACAB7098B0F654195 | SHA256:1E98E9C5FEC598F9FF4E3C2CA201C4DDA82F9F778D98570A047ABDD6BAAFEB82 | |||
| 3624 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_xpq1yoav.zht.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 1608 | svchost.exe | C:\WINDOWS\Prefetch\WAASMEDICAGENT.EXE-ED0D7511.pf | binary | |
MD5:F45CE1605EB2D0C055969EA1B75E91AE | SHA256:403B3482EC821E4E349F91557B2147BC319C323049EFF430047941641BCCA97E | |||
| 1608 | svchost.exe | C:\Windows\Prefetch\SVCHOST.EXE-0C2D202C.pf | binary | |
MD5:EC89F2E87ED54481D0D909397F07DA84 | SHA256:8DB988F9E81CA39EAE9CFFA0215CFE4D598A0FB50B42EDDFC60A1FD326AE62EA | |||
| 3624 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_qgsesjtu.ceu.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 240 | services64.exe | C:\WINDOWS\system32\drivers\etc\hosts | text | |
MD5:D720A734B2CBDE357E6361121AFAEFD0 | SHA256:BF6F1889D0C694B623C2FC9C6B7A96E31239EB7FAD1E3E5ED09D046684320634 | |||
| 3032 | svchost.exe | C:\WINDOWS\system32\CatRoot2\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\catdb | — | |
MD5:— | SHA256:— | |||
| 240 | services64.exe | C:\ProgramData\WindowsServices\WindowsAutHost | executable | |
MD5:C8A50A6F1F73DF72DE866F6131346E69 | SHA256:59E6A5009CE5E9547078DB7F964BB8FC10EE999DD35B7E9243F119DB8337AA8D | |||
| 4316 | powershell.exe | C:\WINDOWS\TEMP\__PSScriptPolicyTest_vxtpjnew.o1t.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2340 | MoUsoCoreWorker.exe | GET | 200 | 88.221.169.152:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
2340 | MoUsoCoreWorker.exe | GET | 200 | 23.48.23.156:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
3560 | dialer.exe | POST | — | 31.31.198.106:80 | http://slkpanelgopnikbeats.pro/api/endpoint.php | unknown | — | — | unknown |
3560 | dialer.exe | POST | — | 31.31.198.106:80 | http://slkpanelgopnikbeats.pro/api/endpoint.php | unknown | — | — | unknown |
3560 | dialer.exe | POST | — | 31.31.198.106:80 | http://slkpanelgopnikbeats.pro/api/endpoint.php | unknown | — | — | unknown |
— | — | POST | 200 | 20.189.173.15:443 | https://self.events.data.microsoft.com/OneCollector/1.0/ | unknown | binary | 9 b | — |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 192.168.100.255:137 | — | — | — | whitelisted |
2088 | svchost.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
3828 | RUXIMICS.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
2340 | MoUsoCoreWorker.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
— | — | 239.255.255.250:1900 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
2340 | MoUsoCoreWorker.exe | 23.48.23.156:80 | crl.microsoft.com | Akamai International B.V. | DE | unknown |
2340 | MoUsoCoreWorker.exe | 88.221.169.152:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
2088 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
3560 | dialer.exe | 45.76.89.70:80 | pool.hashvault.pro | AS-CHOOPA | DE | unknown |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
pool.hashvault.pro |
| whitelisted |
slkpanelgopnikbeats.pro |
| unknown |
self.events.data.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2168 | svchost.exe | Crypto Currency Mining Activity Detected | ET COINMINER CoinMiner Domain in DNS Lookup (pool .hashvault .pro) |
3560 | dialer.exe | Potential Corporate Privacy Violation | ET POLICY Cryptocurrency Miner Checkin |
3560 | dialer.exe | A Network Trojan was detected | ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M3 |
3560 | dialer.exe | Crypto Currency Mining Activity Detected | MINER [ANY.RUN] SilentCryptoMiner HTTP Request to UnamWebPanel |
3560 | dialer.exe | Crypto Currency Mining Activity Detected | ET MALWARE [ANY.RUN] SilentCryptoMiner Check-in POST Request |
3560 | dialer.exe | Potential Corporate Privacy Violation | ET POLICY Cryptocurrency Miner Checkin |
3560 | dialer.exe | Potential Corporate Privacy Violation | ET POLICY Cryptocurrency Miner Checkin |
3560 | dialer.exe | Potential Corporate Privacy Violation | ET POLICY Cryptocurrency Miner Checkin |
3560 | dialer.exe | Potential Corporate Privacy Violation | ET POLICY Cryptocurrency Miner Checkin |
3560 | dialer.exe | Potential Corporate Privacy Violation | ET POLICY Cryptocurrency Miner Checkin |