File name:

file

Full analysis: https://app.any.run/tasks/db54652e-fa1c-49fe-b61f-d83afb29a22c
Verdict: Malicious activity
Threats:

Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks.

Analysis date: December 14, 2024, 05:57:13
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
amadey
botnet
stealer
loader
stealc
themida
telegram
vidar
auto
lumma
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections
MD5:

07370A3E0D4AB1538CFA487DF0FBFC21

SHA1:

75D65BABD5D230893AF02F1FB4461CFCB566804D

SHA256:

5C8A333934FAF641AD398AD34B28FD352079C4AC4B590184E4D25FCD19858460

SSDEEP:

98304:C2+oufxa3N0BpcswGauAw5QwzHdQf7fOv1emo/suN54lGfXpCAaxA4Lh7Rz+mJgS:CQd

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Connects to the CnC server

      • skotes.exe (PID: 6440)
      • 954c6cdbf3.exe (PID: 4804)
      • svchost.exe (PID: 2192)
    • AMADEY has been detected (SURICATA)

      • skotes.exe (PID: 6440)
    • Possible tool for stealing has been detected

      • 678eb74e50.exe (PID: 7020)
      • firefox.exe (PID: 4764)
    • StealC has been detected

      • 954c6cdbf3.exe (PID: 4804)
    • Changes the autorun value in the registry

      • skotes.exe (PID: 6440)
    • STEALC has been detected (SURICATA)

      • 954c6cdbf3.exe (PID: 4804)
    • AMADEY has been detected (YARA)

      • skotes.exe (PID: 6440)
    • VIDAR mutex has been found

      • Bxq1jd2.exe (PID: 7592)
    • Actions looks like stealing of personal data

      • Bxq1jd2.exe (PID: 7592)
    • LUMMA has been found (auto)

      • skotes.exe (PID: 6440)
    • LUMMA has been detected (SURICATA)

      • svchost.exe (PID: 2192)
      • 64adf0d40a.exe (PID: 8060)
    • Steals credentials from Web Browsers

      • Bxq1jd2.exe (PID: 7592)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • file.exe (PID: 6248)
      • skotes.exe (PID: 6440)
    • Contacting a server suspected of hosting an CnC

      • skotes.exe (PID: 6440)
      • 954c6cdbf3.exe (PID: 4804)
      • svchost.exe (PID: 2192)
      • 64adf0d40a.exe (PID: 8060)
    • Reads security settings of Internet Explorer

      • skotes.exe (PID: 6440)
      • file.exe (PID: 6248)
      • 954c6cdbf3.exe (PID: 4804)
      • Bxq1jd2.exe (PID: 7592)
    • Reads the BIOS version

      • skotes.exe (PID: 6440)
      • file.exe (PID: 6248)
      • 954c6cdbf3.exe (PID: 4804)
      • 44505b6766.exe (PID: 6396)
      • skotes.exe (PID: 8240)
      • skotes.exe (PID: 4264)
    • Starts itself from another location

      • file.exe (PID: 6248)
    • Process requests binary or script from the Internet

      • skotes.exe (PID: 6440)
    • Potential Corporate Privacy Violation

      • skotes.exe (PID: 6440)
    • Uses TASKKILL.EXE to kill process

      • 678eb74e50.exe (PID: 7020)
    • Uses TASKKILL.EXE to kill Browsers

      • 678eb74e50.exe (PID: 7020)
    • Connects to the server without a host name

      • skotes.exe (PID: 6440)
      • 954c6cdbf3.exe (PID: 4804)
    • Windows Defender mutex has been found

      • 954c6cdbf3.exe (PID: 4804)
    • Checks Windows Trust Settings

      • Bxq1jd2.exe (PID: 7592)
    • Process communicates with Telegram (possibly using it as an attacker's C2 server)

      • Bxq1jd2.exe (PID: 7592)
    • Searches for installed software

      • Bxq1jd2.exe (PID: 7592)
    • The process executes via Task Scheduler

      • skotes.exe (PID: 8240)
      • skotes.exe (PID: 4264)
    • Starts CMD.EXE for commands execution

      • Bxq1jd2.exe (PID: 7592)
    • Uses TIMEOUT.EXE to delay execution

      • cmd.exe (PID: 8384)
    • Executes application which crashes

      • Bxq1jd2.exe (PID: 7592)
  • INFO

    • Reads the computer name

      • file.exe (PID: 6248)
      • skotes.exe (PID: 6440)
      • 678eb74e50.exe (PID: 7020)
      • 954c6cdbf3.exe (PID: 4804)
      • Bxq1jd2.exe (PID: 7592)
      • 44505b6766.exe (PID: 6396)
      • 64adf0d40a.exe (PID: 8060)
    • Process checks computer location settings

      • file.exe (PID: 6248)
      • skotes.exe (PID: 6440)
      • Bxq1jd2.exe (PID: 7592)
    • Sends debugging messages

      • file.exe (PID: 6248)
      • skotes.exe (PID: 6440)
      • 954c6cdbf3.exe (PID: 4804)
      • 44505b6766.exe (PID: 6396)
      • skotes.exe (PID: 8240)
      • skotes.exe (PID: 4264)
    • Checks supported languages

      • file.exe (PID: 6248)
      • skotes.exe (PID: 6440)
      • 678eb74e50.exe (PID: 7020)
      • 954c6cdbf3.exe (PID: 4804)
      • 44505b6766.exe (PID: 6396)
      • Bxq1jd2.exe (PID: 7592)
      • 64adf0d40a.exe (PID: 8060)
      • skotes.exe (PID: 4264)
      • skotes.exe (PID: 8240)
    • Create files in a temporary directory

      • file.exe (PID: 6248)
      • skotes.exe (PID: 6440)
    • The process uses the downloaded file

      • file.exe (PID: 6248)
      • skotes.exe (PID: 6440)
      • Bxq1jd2.exe (PID: 7592)
    • Checks proxy server information

      • skotes.exe (PID: 6440)
      • 954c6cdbf3.exe (PID: 4804)
      • Bxq1jd2.exe (PID: 7592)
      • WerFault.exe (PID: 8104)
    • The sample compiled with english language support

      • skotes.exe (PID: 6440)
    • Reads mouse settings

      • 678eb74e50.exe (PID: 7020)
    • Creates files or folders in the user directory

      • skotes.exe (PID: 6440)
      • 954c6cdbf3.exe (PID: 4804)
      • Bxq1jd2.exe (PID: 7592)
      • WerFault.exe (PID: 8104)
    • Application launched itself

      • firefox.exe (PID: 5540)
      • firefox.exe (PID: 4764)
      • chrome.exe (PID: 7884)
      • msedge.exe (PID: 8432)
    • Themida protector has been detected

      • skotes.exe (PID: 6440)
    • The sample compiled with czech language support

      • skotes.exe (PID: 6440)
    • Creates files in the program directory

      • Bxq1jd2.exe (PID: 7592)
    • Reads the software policy settings

      • Bxq1jd2.exe (PID: 7592)
      • 64adf0d40a.exe (PID: 8060)
      • WerFault.exe (PID: 8104)
    • Reads the machine GUID from the registry

      • Bxq1jd2.exe (PID: 7592)
    • Reads CPU info

      • Bxq1jd2.exe (PID: 7592)
    • Reads Environment values

      • Bxq1jd2.exe (PID: 7592)
    • Reads product name

      • Bxq1jd2.exe (PID: 7592)
    • Executable content was dropped or overwritten

      • firefox.exe (PID: 5540)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:09:22 17:40:44+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.24
CodeSize: 322048
InitializedDataSize: 104448
UninitializedDataSize: -
EntryPoint: 0x312000
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
187
Monitored processes
57
Malicious processes
9
Suspicious processes
2

Behavior graph

Click at the process to see the details
start file.exe #AMADEY skotes.exe THREAT 678eb74e50.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs #STEALC 954c6cdbf3.exe taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs THREAT firefox.exe no specs firefox.exe firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs 44505b6766.exe firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs #VIDAR bxq1jd2.exe chrome.exe chrome.exe no specs #LUMMA 64adf0d40a.exe chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs skotes.exe #LUMMA svchost.exe cmd.exe no specs conhost.exe no specs timeout.exe no specs werfault.exe skotes.exe

Process information

PID
CMD
Path
Indicators
Parent process
880\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exetaskkill.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1616taskkill /F /IM brave.exe /TC:\Windows\SysWOW64\taskkill.exe678eb74e50.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Terminates Processes
Exit code:
128
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\taskkill.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
2192C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2600"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=4996 --field-trial-handle=2088,i,14594476998681583212,11836373438126495531,262144 --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
2844taskkill /F /IM msedge.exe /TC:\Windows\SysWOW64\taskkill.exe678eb74e50.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Terminates Processes
Exit code:
128
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\taskkill.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
3140"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4148 -childID 2 -isForBrowser -prefsHandle 4140 -prefMapHandle 4136 -prefsLen 36588 -prefMapSize 244583 -jsInitHandle 1396 -jsInitLen 235124 -parentBuildID 20240213221259 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {09b74181-eb6e-4c4c-b384-d899aaa41a4b} 5540 "\\.\pipe\gecko-crash-server-pipe.5540" 1e898290f50 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Version:
123.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\msvcp140.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\vcruntime140.dll
c:\windows\system32\crypt32.dll
3608"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1840 -parentBuildID 20240213221259 -prefsHandle 1780 -prefMapHandle 1772 -prefsLen 31031 -prefMapSize 244583 -appDir "C:\Program Files\Mozilla Firefox\browser" - {afa8dbcf-fed6-4773-955f-51aace8182e1} 5540 "\\.\pipe\gecko-crash-server-pipe.5540" 1e88faf5f10 gpuC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Version:
123.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ucrtbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\msvcp140.dll
3696"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3268 --field-trial-handle=2088,i,14594476998681583212,11836373438126495531,262144 --variations-seed-version /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
3812\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exetaskkill.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4136"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4840 -childID 4 -isForBrowser -prefsHandle 4908 -prefMapHandle 4904 -prefsLen 31144 -prefMapSize 244583 -jsInitHandle 1396 -jsInitLen 235124 -parentBuildID 20240213221259 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {686b05da-fb83-4d34-9556-2f4398a52d35} 5540 "\\.\pipe\gecko-crash-server-pipe.5540" 1e89a19bf50 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Version:
123.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ucrtbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\msvcp140.dll
Total events
26 872
Read events
26 844
Write events
28
Delete events
0

Modification events

(PID) Process:(6440) skotes.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(6440) skotes.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(6440) skotes.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(6440) skotes.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:678eb74e50.exe
Value:
C:\Users\admin\AppData\Local\Temp\1015076001\678eb74e50.exe
(PID) Process:(4804) 954c6cdbf3.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(4804) 954c6cdbf3.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(4804) 954c6cdbf3.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(5540) firefox.exeKey:HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\DllPrefetchExperiment
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe
Value:
0
(PID) Process:(6440) skotes.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:954c6cdbf3.exe
Value:
C:\Users\admin\AppData\Local\Temp\1015077001\954c6cdbf3.exe
(PID) Process:(6440) skotes.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:44505b6766.exe
Value:
C:\Users\admin\AppData\Local\Temp\1015078001\44505b6766.exe
Executable files
27
Suspicious files
253
Text files
109
Unknown types
0

Dropped files

PID
Process
Filename
Type
5540firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\9kie7cg6.default-release\startupCache\scriptCache-current.bin
MD5:
SHA256:
5540firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\sessionCheckpoints.jsonbinary
MD5:EA8B62857DFDBD3D0BE7D7E4A954EC9A
SHA256:792955295AE9C382986222C6731C5870BD0E921E7F7E34CC4615F5CD67F225DA
6248file.exeC:\Users\admin\AppData\Local\Temp\abc3bc1985\skotes.exeexecutable
MD5:07370A3E0D4AB1538CFA487DF0FBFC21
SHA256:5C8A333934FAF641AD398AD34B28FD352079C4AC4B590184E4D25FCD19858460
5540firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\prefs.jstext
MD5:2C99A16AED3906D92FFE3EF1808E2753
SHA256:08412578CC3BB4922388F8FF8C23962F616B69A1588DA720ADE429129C73C452
6440skotes.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\KCV3KQBA\random[1].exeexecutable
MD5:CEDF39A67FFF4862F4BC35FD6E23D856
SHA256:789393EC75A17075609E36D07736EBD3D328E891CA1236EDEA38766A97A5C50A
5540firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\datareporting\glean\db\data.safe.tmpbinary
MD5:EF90022DF0735160DD056C0E6670E915
SHA256:2B663C0B462A437C8DE3D9B95EE157AE181249B78BDD6F7BD73F7EB6D9E03F87
5540firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\cookies.sqlite-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
6440skotes.exeC:\Users\admin\AppData\Local\Temp\1015077001\954c6cdbf3.exeexecutable
MD5:CEDF39A67FFF4862F4BC35FD6E23D856
SHA256:789393EC75A17075609E36D07736EBD3D328E891CA1236EDEA38766A97A5C50A
5540firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\datareporting\glean\db\data.safe.binbinary
MD5:EF90022DF0735160DD056C0E6670E915
SHA256:2B663C0B462A437C8DE3D9B95EE157AE181249B78BDD6F7BD73F7EB6D9E03F87
5540firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\9kie7cg6.default-release\startupCache\urlCache-current.binbinary
MD5:297E88D7CEB26E549254EC875649F4EB
SHA256:8B75D4FB1845BAA06122888D11F6B65E6A36B140C54A72CC13DF390FD7C95702
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
56
TCP/UDP connections
197
DNS requests
197
Threats
44

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
5540
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/success.txt?ipv4
unknown
whitelisted
6440
skotes.exe
POST
200
185.215.113.43:80
http://185.215.113.43/Zu7JuNko/index.php
unknown
malicious
6440
skotes.exe
GET
200
185.215.113.16:80
http://185.215.113.16/steam/random.exe
unknown
malicious
6440
skotes.exe
POST
200
185.215.113.43:80
http://185.215.113.43/Zu7JuNko/index.php
unknown
malicious
6440
skotes.exe
GET
200
185.215.113.16:80
http://185.215.113.16/well/random.exe
unknown
malicious
6440
skotes.exe
POST
200
185.215.113.43:80
http://185.215.113.43/Zu7JuNko/index.php
unknown
malicious
4804
954c6cdbf3.exe
POST
200
185.215.113.206:80
http://185.215.113.206/c4becf79229cb002.php
unknown
malicious
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
4804
954c6cdbf3.exe
GET
200
185.215.113.206:80
http://185.215.113.206/
unknown
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1356
RUXIMICS.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2624
svchost.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5064
SearchApp.exe
2.21.110.139:443
www.bing.com
AKAMAI-AS
DE
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
4
System
192.168.100.255:138
whitelisted
1176
svchost.exe
40.126.32.74:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1176
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
6440
skotes.exe
185.215.113.43:80
1337team Limited
SC
malicious

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.184.206
whitelisted
www.bing.com
  • 2.21.110.139
  • 2.21.110.146
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 40.126.32.74
  • 40.126.32.68
  • 40.126.32.133
  • 20.190.160.14
  • 40.126.32.76
  • 40.126.32.134
  • 20.190.160.20
  • 40.126.32.136
whitelisted
go.microsoft.com
  • 184.28.89.167
whitelisted
youtube.com
  • 142.250.181.238
  • 2a00:1450:4001:812::200e
whitelisted
detectportal.firefox.com
  • 34.107.221.82
whitelisted
prod.detectportal.prod.cloudops.mozgcp.net
  • 34.107.221.82
  • 2600:1901:0:38d7::
whitelisted
contile.services.mozilla.com
  • 34.117.188.166
whitelisted
content-signature-2.cdn.mozilla.net
  • 34.160.144.191
whitelisted

Threats

PID
Process
Class
Message
6440
skotes.exe
Misc Attack
ET DROP Spamhaus DROP Listed Traffic Inbound group 33
6440
skotes.exe
Malware Command and Control Activity Detected
BOTNET [ANY.RUN] Amadey HTTP POST Request (st=s)
6440
skotes.exe
Potentially Bad Traffic
ET INFO Executable Download from dotted-quad Host
6440
skotes.exe
Misc Attack
ET DROP Spamhaus DROP Listed Traffic Inbound group 33
6440
skotes.exe
Potentially Bad Traffic
ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response
6440
skotes.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
6440
skotes.exe
Potentially Bad Traffic
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
6440
skotes.exe
Potentially Bad Traffic
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
6440
skotes.exe
Potentially Bad Traffic
ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response
6440
skotes.exe
Potentially Bad Traffic
ET INFO Executable Download from dotted-quad Host
3 ETPRO signatures available at the full report
Process
Message
file.exe
%s------------------------------------------------ --- Themida Professional --- --- (c)2012 Oreans Technologies --- ------------------------------------------------
skotes.exe
%s------------------------------------------------ --- Themida Professional --- --- (c)2012 Oreans Technologies --- ------------------------------------------------
954c6cdbf3.exe
%s------------------------------------------------ --- Themida Professional --- --- (c)2012 Oreans Technologies --- ------------------------------------------------
44505b6766.exe
%s------------------------------------------------ --- Themida Professional --- --- (c)2012 Oreans Technologies --- ------------------------------------------------
skotes.exe
%s------------------------------------------------ --- Themida Professional --- --- (c)2012 Oreans Technologies --- ------------------------------------------------
skotes.exe
%s------------------------------------------------ --- Themida Professional --- --- (c)2012 Oreans Technologies --- ------------------------------------------------