File name: | file |
Full analysis: | https://app.any.run/tasks/4c9bcfed-6efd-4567-836d-a25b5eda971d |
Verdict: | Malicious activity |
Threats: | Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks. |
Analysis date: | December 05, 2022, 18:46:44 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/x-dosexec |
File info: | PE32 executable (GUI) Intel 80386, for MS Windows, InnoSetup self-extracting archive |
MD5: | BF1345A658B80E26EA38637325B74300 |
SHA1: | 87380329D9E1C929E1E81903CFDBEC2584B7B38F |
SHA256: | 5D264FB7D658C2A899757610CDE12080EDBFE219CF8E59C5690D9107852EEE9B |
SSDEEP: | 98304:AU73ilKRVDTpgW3YHV3aAL+V2ns9e3BpAyb1U519cY/g:P3io/pgTtaA6NgTbGb9cY/g |
.exe | | | Inno Setup installer (82.8) |
---|---|---|
.exe | | | Win32 Executable Delphi generic (10.7) |
.exe | | | Win32 Executable (generic) (3.4) |
.exe | | | Generic Win/DOS Executable (1.5) |
.exe | | | DOS Executable Generic (1.5) |
Architecture: | IMAGE_FILE_MACHINE_I386 |
---|---|
Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Compilation Date: | 1992-Jun-19 22:22:17 |
Detected languages: |
|
Comments: | This installation was built with Inno Setup: http://www.innosetup.com |
CompanyName: | - |
FileDescription: | PrintFolders Setup |
FileVersion: | - |
InternalName: | - |
OriginalFilename: | - |
ProductName: | - |
ProductVersion: | - |
e_magic: | MZ |
---|---|
e_cblp: | 80 |
e_cp: | 2 |
e_crlc: | - |
e_cparhdr: | 4 |
e_minalloc: | 15 |
e_maxalloc: | 65535 |
e_ss: | - |
e_sp: | 184 |
e_csum: | - |
e_ip: | - |
e_cs: | - |
e_ovno: | 26 |
e_oemid: | - |
e_oeminfo: | - |
e_lfanew: | 256 |
Signature: | PE |
---|---|
Machine: | IMAGE_FILE_MACHINE_I386 |
NumberofSections: | 8 |
TimeDateStamp: | 1992-Jun-19 22:22:17 |
PointerToSymbolTable: | - |
NumberOfSymbols: | - |
SizeOfOptionalHeader: | 224 |
Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
---|---|---|---|---|---|
CODE | 4096 | 36352 | 36352 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.60044 |
DATA | 40960 | 584 | 1024 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 2.72043 |
BSS | 45056 | 3684 | 0 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | |
.idata | 49152 | 2248 | 2560 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.2508 |
.tls | 53248 | 8 | 0 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | |
.rdata | 57344 | 24 | 512 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_SHARED | 0.199108 |
.reloc | 61440 | 2156 | 0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_SHARED | |
.rsrc | 65536 | 167124 | 167424 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_SHARED | 5.27927 |
Title | Entropy | Size | Codepage | Language | Type |
---|---|---|---|---|---|
1 | 5.39383 | 1128 | Latin 1 / Western European | English - United States | RT_ICON |
2 | 5.94971 | 2440 | Latin 1 / Western European | English - United States | RT_ICON |
3 | 5.5357 | 4264 | Latin 1 / Western European | English - United States | RT_ICON |
4 | 5.48577 | 9640 | Latin 1 / Western European | English - United States | RT_ICON |
5 | 5.25469 | 16936 | Latin 1 / Western European | English - United States | RT_ICON |
6 | 5.46372 | 21640 | Latin 1 / Western European | English - United States | RT_ICON |
7 | 5.3545 | 38056 | Latin 1 / Western European | English - United States | RT_ICON |
8 | 4.90318 | 67624 | Latin 1 / Western European | English - United States | RT_ICON |
4089 | 3.21823 | 754 | Latin 1 / Western European | UNKNOWN | RT_STRING |
4090 | 3.31515 | 780 | Latin 1 / Western European | UNKNOWN | RT_STRING |
advapi32.dll |
advapi32.dll (#2) |
comctl32.dll |
kernel32.dll |
kernel32.dll (#2) |
oleaut32.dll |
user32.dll |
user32.dll (#2) |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2972 | "C:\Users\admin\AppData\Local\Temp\file.exe" | C:\Users\admin\AppData\Local\Temp\file.exe | — | Explorer.EXE | |||||||||||
User: admin Company: Integrity Level: MEDIUM Description: PrintFolders Setup Exit code: 3221226540 Version: Modules
| |||||||||||||||
3648 | "C:\Users\admin\AppData\Local\Temp\file.exe" | C:\Users\admin\AppData\Local\Temp\file.exe | Explorer.EXE | ||||||||||||
User: admin Company: Integrity Level: HIGH Description: PrintFolders Setup Exit code: 0 Version: Modules
| |||||||||||||||
736 | "C:\Users\admin\AppData\Local\Temp\is-FS3OJ.tmp\is-FQNPK.tmp" /SL4 $30138 "C:\Users\admin\AppData\Local\Temp\file.exe" 3648589 208896 | C:\Users\admin\AppData\Local\Temp\is-FS3OJ.tmp\is-FQNPK.tmp | — | file.exe | |||||||||||
User: admin Integrity Level: HIGH Description: Setup/Uninstall Exit code: 0 Version: 51.42.0.0 Modules
| |||||||||||||||
1404 | "C:\Program Files\PrintFolders\PrintFolders.exe" | C:\Program Files\PrintFolders\PrintFolders.exe | is-FQNPK.tmp | ||||||||||||
User: admin Company: Atr Software Integrity Level: HIGH Description: Data Recovery Exit code: 0 Version: 1.2.3.100 Modules
| |||||||||||||||
2844 | C:\Users\admin\AppData\Roaming\{e29ac6c0-7037-11de-816d-806e6f6e6963}\wpvTiXgPE0FaR6.exe | — | PrintFolders.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
3460 | "C:\Users\admin\AppData\Roaming\Mnqu3pLe6T5\uIoip6CEwMj.exe" | C:\Users\admin\AppData\Roaming\Mnqu3pLe6T5\uIoip6CEwMj.exe | PrintFolders.exe | ||||||||||||
User: admin Integrity Level: HIGH Version: 1.0.0.0 Modules
| |||||||||||||||
1608 | "C:\Users\admin\AppData\Roaming\RgAUXQ\YcJDY15ioLB.exe" | C:\Users\admin\AppData\Roaming\RgAUXQ\YcJDY15ioLB.exe | PrintFolders.exe | ||||||||||||
User: admin Integrity Level: HIGH Modules
| |||||||||||||||
2860 | "C:\Users\admin\AppData\Roaming\m91Mh\V1LEu.exe" | C:\Users\admin\AppData\Roaming\m91Mh\V1LEu.exe | PrintFolders.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
872 | "C:\Users\admin\AppData\Local\Temp\ecaac49691\gntuud.exe" | C:\Users\admin\AppData\Local\Temp\ecaac49691\gntuud.exe | V1LEu.exe | ||||||||||||
User: admin Integrity Level: HIGH Modules
| |||||||||||||||
2132 | "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\admin\AppData\Local\Temp\ecaac49691\gntuud.exe" /F | C:\Windows\System32\schtasks.exe | — | gntuud.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Manages scheduled tasks Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
|
(PID) Process: | (736) is-FQNPK.tmp | Key: | HKEY_CURRENT_USER\Software\Atzpoint Software\PrintFolders |
Operation: | write | Name: | Language |
Value: eng | |||
(PID) Process: | (736) is-FQNPK.tmp | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{C2483D7A-78F2-476F-86FF-6B2EA9310854}}_is1 |
Operation: | write | Name: | Inno Setup: Setup Version |
Value: 5.1.2-beta | |||
(PID) Process: | (736) is-FQNPK.tmp | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{C2483D7A-78F2-476F-86FF-6B2EA9310854}}_is1 |
Operation: | write | Name: | Inno Setup: App Path |
Value: C:\Program Files\PrintFolders | |||
(PID) Process: | (736) is-FQNPK.tmp | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{C2483D7A-78F2-476F-86FF-6B2EA9310854}}_is1 |
Operation: | write | Name: | InstallLocation |
Value: C:\Program Files\PrintFolders\ | |||
(PID) Process: | (736) is-FQNPK.tmp | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{C2483D7A-78F2-476F-86FF-6B2EA9310854}}_is1 |
Operation: | write | Name: | Inno Setup: Icon Group |
Value: PrintFolders | |||
(PID) Process: | (736) is-FQNPK.tmp | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{C2483D7A-78F2-476F-86FF-6B2EA9310854}}_is1 |
Operation: | write | Name: | Inno Setup: User |
Value: admin | |||
(PID) Process: | (736) is-FQNPK.tmp | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{C2483D7A-78F2-476F-86FF-6B2EA9310854}}_is1 |
Operation: | write | Name: | DisplayName |
Value: PrintFolders 3.100 | |||
(PID) Process: | (736) is-FQNPK.tmp | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{C2483D7A-78F2-476F-86FF-6B2EA9310854}}_is1 |
Operation: | write | Name: | DisplayIcon |
Value: C:\Program Files\PrintFolders\PrintFolders.exe | |||
(PID) Process: | (736) is-FQNPK.tmp | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{C2483D7A-78F2-476F-86FF-6B2EA9310854}}_is1 |
Operation: | write | Name: | UninstallString |
Value: "C:\Program Files\PrintFolders\unins000.exe" | |||
(PID) Process: | (736) is-FQNPK.tmp | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{C2483D7A-78F2-476F-86FF-6B2EA9310854}}_is1 |
Operation: | write | Name: | QuietUninstallString |
Value: "C:\Program Files\PrintFolders\unins000.exe" /SILENT |
PID | Process | Filename | Type | |
---|---|---|---|---|
736 | is-FQNPK.tmp | C:\Program Files\PrintFolders\is-M7VBG.tmp | — | |
MD5:— | SHA256:— | |||
736 | is-FQNPK.tmp | C:\Program Files\PrintFolders\PrintFolders.exe | — | |
MD5:— | SHA256:— | |||
3648 | file.exe | C:\Users\admin\AppData\Local\Temp\is-FS3OJ.tmp\is-FQNPK.tmp | executable | |
MD5:10C841B0221D6870DE7C951EAF5B1DA9 | SHA256:4252858D9C6D8D55F829D7E418EA8357FD26FBDF8C0FCE1FED23A8C720A8807E | |||
1404 | PrintFolders.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\ping[1].htm | text | |
MD5:064DB2A4C3D31A4DC6AA2538F3FE7377 | SHA256:0A3EC2C4FC062D561F0DC989C6699E06FFF850BBDA7923F14F26135EF42107C0 | |||
1404 | PrintFolders.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\MIXTWO[1].file | executable | |
MD5:76975FA8921A2FE9FB034DD6172FB475 | SHA256:309E7FE50DEC6D69CE3715EDF56425303422CED04B15428E9750FE280C420828 | |||
736 | is-FQNPK.tmp | C:\Program Files\PrintFolders\unins000.exe | executable | |
MD5:BCD1868E95254F9531A7FF38461C0D72 | SHA256:63E895DEBEB29559931040AC4603720233B36C285C9D3F1BAA5A57AC58821A2C | |||
736 | is-FQNPK.tmp | C:\Program Files\PrintFolders\is-6M0T3.tmp | executable | |
MD5:BCD1868E95254F9531A7FF38461C0D72 | SHA256:63E895DEBEB29559931040AC4603720233B36C285C9D3F1BAA5A57AC58821A2C | |||
736 | is-FQNPK.tmp | C:\Program Files\PrintFolders\History.txt | text | |
MD5:C8B211D81EB7D4F9EBB071A117444D51 | SHA256:AFD6FEA6A792B722E45A6587F70334F30051798017F4A278508C7ED3FEEA80CC | |||
736 | is-FQNPK.tmp | C:\Program Files\PrintFolders\unins000.dat | dat | |
MD5:19B73C77551E2DBE6C8D414A739B3226 | SHA256:318FC89D586D43DA4B724B9B0292B33223825010253A72586F8BB8A3871A8123 | |||
1404 | PrintFolders.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z2BCOUL\fuckingdllENCR[1].dll | binary | |
MD5:418619EA97671304AF80EC60F5A50B62 | SHA256:EB7ECE66C14849064F462DF4987D6D59073D812C44D81568429614581106E0F4 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
1404 | PrintFolders.exe | GET | 200 | 107.182.129.235:80 | http://107.182.129.235/storage/extension.php | US | binary | 92.0 Kb | malicious |
1404 | PrintFolders.exe | GET | 200 | 171.22.30.106:80 | http://171.22.30.106/library.php | GB | executable | 817 Kb | malicious |
1404 | PrintFolders.exe | GET | 200 | 171.22.30.106:80 | http://171.22.30.106/library.php | GB | executable | 3.78 Mb | malicious |
1404 | PrintFolders.exe | GET | 200 | 107.182.129.235:80 | http://107.182.129.235/storage/ping.php | US | text | 17 b | malicious |
1404 | PrintFolders.exe | GET | 200 | 171.22.30.106:80 | http://171.22.30.106/library.php | GB | executable | 260 Kb | malicious |
872 | gntuud.exe | POST | 200 | 77.73.133.72:80 | http://77.73.133.72/hfk3vK9/index.php?scr=1 | KZ | — | — | malicious |
1404 | PrintFolders.exe | GET | 200 | 171.22.30.106:80 | http://171.22.30.106/library.php | GB | executable | 615 Kb | malicious |
872 | gntuud.exe | GET | 200 | 194.110.203.101:80 | http://194.110.203.101/puta/softx64.exe | RU | executable | 239 Kb | suspicious |
352 | rundll32.exe | POST | 200 | 77.73.133.72:80 | http://77.73.133.72/hfk3vK9/index.php | KZ | — | — | malicious |
872 | gntuud.exe | POST | 200 | 77.73.133.72:80 | http://77.73.133.72/hfk3vK9/index.php | KZ | text | 72 b | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
872 | gntuud.exe | 194.110.203.101:80 | — | IT Resheniya LLC | RU | suspicious |
1404 | PrintFolders.exe | 171.22.30.106:80 | — | Delis LLC | US | malicious |
872 | gntuud.exe | 77.73.133.72:80 | — | Partner LLC | KZ | malicious |
1404 | PrintFolders.exe | 45.139.105.171:80 | — | Xdeer Limited | BG | malicious |
1404 | PrintFolders.exe | 107.182.129.235:80 | — | Delis LLC | US | malicious |
3460 | uIoip6CEwMj.exe | 144.76.136.153:443 | transfer.sh | Hetzner Online GmbH | DE | malicious |
3132 | vbc.exe | 193.106.191.138:32796 | — | Kanzas LLC | RU | malicious |
— | — | 77.73.133.72:80 | — | Partner LLC | KZ | malicious |
Domain | IP | Reputation |
---|---|---|
transfer.sh |
| whitelisted |
PID | Process | Class | Message |
---|---|---|---|
1404 | PrintFolders.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
1404 | PrintFolders.exe | Potentially Bad Traffic | ET INFO SUSPICIOUS Dotted Quad Host MZ Response |
1404 | PrintFolders.exe | Misc activity | ET INFO EXE - Served Attached HTTP |
1404 | PrintFolders.exe | Misc activity | ET INFO Packed Executable Download |
1404 | PrintFolders.exe | Potentially Bad Traffic | ET INFO SUSPICIOUS Dotted Quad Host MZ Response |
1404 | PrintFolders.exe | Misc activity | ET INFO EXE - Served Attached HTTP |
— | — | Potentially Bad Traffic | ET POLICY Observed DNS Query to File Transfer Service Domain (transfer .sh) |
— | — | Misc activity | ET INFO Commonly Abused File Sharing Site Domain Observed (transfer .sh in DNS Lookup) |
3460 | uIoip6CEwMj.exe | Misc activity | ET INFO Commonly Abused File Sharing Site Domain Observed (transfer .sh in TLS SNI) |
872 | gntuud.exe | A Network Trojan was detected | ET TROJAN Amadey CnC Check-In |