| URL: | https://go4crack.com/microsoft-office-crack/ |
| Full analysis: | https://app.any.run/tasks/515af017-6356-4d02-a13e-510a33f51e54 |
| Verdict: | Malicious activity |
| Threats: | Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks. |
| Analysis date: | December 04, 2021, 22:52:39 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MD5: | 069D92E93E77E904B4E69B3568ED1E62 |
| SHA1: | 8F16D62FE7603C3A344A0F4DBB0678F8C98DAB82 |
| SHA256: | 6DCAF38196BFF87B38EB219BE0F490C9E4143C31337C706B7563C9621FC38EF3 |
| SSDEEP: | 3:N8rSHTeWYuuH0XvOK:2GzeRuuH0XWK |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 272 | C:\Windows\system32\cmd.exe /c Sat2206366bfaba.exe | C:\Windows\system32\cmd.exe | — | setup_install.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 1 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | |||||||||||||||
| 320 | "C:\Users\admin\AppData\Local\Temp\7zS42E289C2\setup_install.exe" | C:\Users\admin\AppData\Local\Temp\7zS42E289C2\setup_install.exe | — | setup_installer.exe | |||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 848 | C:\Windows\system32\cmd.exe /c Sat2277dc8fdecf9955.exe | C:\Windows\system32\cmd.exe | — | setup_install.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1012 | Sat2279d9287c35.exe | C:\Users\admin\AppData\Local\Temp\7zS42E289C2\Sat2279d9287c35.exe | cmd.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Version: 1.0.0.1 Modules
| |||||||||||||||
| 1176 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1036,7434490469501562208,16193926447410187082,131072 --enable-features=PasswordImport --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3612 /prefetch:1 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 86.0.4240.198 Modules
| |||||||||||||||
| 1204 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1036,7434490469501562208,16193926447410187082,131072 --enable-features=PasswordImport --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=844 /prefetch:1 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 86.0.4240.198 Modules
| |||||||||||||||
| 1252 | Sat2289ad74b032.exe | C:\Users\admin\AppData\Local\Temp\7zS42E289C2\Sat2289ad74b032.exe | — | cmd.exe | |||||||||||
User: admin Company: Alexander Roshal Integrity Level: HIGH Description: WinRAR archiver Exit code: 0 Version: 5.90.0 Modules
| |||||||||||||||
| 1468 | Sat2283597be5.exe | C:\Users\admin\AppData\Local\Temp\7zS42E289C2\Sat2283597be5.exe | — | cmd.exe | |||||||||||
User: admin Company: jhsdejufgsige Integrity Level: HIGH Description: jhsdejufgsige Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
| 1576 | C:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\admin\AppData\Local\Temp" | C:\Windows\system32\cmd.exe | — | setup_install.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1792 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1036,7434490469501562208,16193926447410187082,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1736 /prefetch:8 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: MEDIUM Description: Google Chrome Exit code: 0 Version: 86.0.4240.198 Modules
| |||||||||||||||
| (PID) Process: | (3652) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon |
| Operation: | write | Name: | failed_count |
Value: 0 | |||
| (PID) Process: | (3652) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon |
| Operation: | write | Name: | state |
Value: 2 | |||
| (PID) Process: | (3652) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty |
| Operation: | write | Name: | StatusCodes |
Value: | |||
| (PID) Process: | (3652) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty |
| Operation: | write | Name: | StatusCodes |
Value: 01000000 | |||
| (PID) Process: | (3652) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon |
| Operation: | write | Name: | state |
Value: 1 | |||
| (PID) Process: | (3652) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96} |
| Operation: | write | Name: | dr |
Value: 1 | |||
| (PID) Process: | (3652) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome |
| Operation: | write | Name: | UsageStatsInSample |
Value: 0 | |||
| (PID) Process: | (3652) chrome.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96} |
| Operation: | write | Name: | usagestats |
Value: 0 | |||
| (PID) Process: | (3652) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96} |
| Operation: | write | Name: | metricsid |
Value: | |||
| (PID) Process: | (3652) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96} |
| Operation: | write | Name: | metricsid_installdate |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3652 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\BrowserMetrics\BrowserMetrics-61ABF13A-E44.pma | — | |
MD5:— | SHA256:— | |||
| 3652 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Preferences | text | |
MD5:— | SHA256:— | |||
| 3652 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\a35780d3-8064-4e33-8b2f-68ba37b9b052.tmp | text | |
MD5:— | SHA256:— | |||
| 3652 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old~RF115735.TMP | text | |
MD5:64AD8ED3E666540337BA541C549F72F7 | SHA256:BECBDB08B5B37D203A85F2E974407334053BB1D2270F0B3C9A4DB963896F2206 | |||
| 3652 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.old~RF115725.TMP | text | |
MD5:936EB7280DA791E6DD28EF3A9B46D39C | SHA256:CBAF2AFD831B32F6D1C12337EE5D2F090D6AE1F4DCB40B08BEF49BF52AD9721F | |||
| 3652 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat | binary | |
MD5:9C016064A1F864C8140915D77CF3389A | SHA256:0E7265D4A8C16223538EDD8CD620B8820611C74538E420A88E333BE7F62AC787 | |||
| 3652 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOG.old~RF115745.TMP | text | |
MD5:81F483F77EE490F35306A4F94DB2286B | SHA256:82434CE3C9D13F509EBEEBE3A7A1A1DE9AB4557629D9FC855761E0CFA45E8BCE | |||
| 3652 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.old | text | |
MD5:8FF312A95D60ED89857FEB720D80D4E1 | SHA256:946A57FAFDD28C3164D5AB8AB4971B21BD5EC5BFFF7554DBF832CB58CC37700B | |||
| 3652 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Platform Notifications\LOG.old~RF11585e.TMP | text | |
MD5:109A25C32EE1132ECD6D9F3ED9ADF01A | SHA256:DA6028DB9485C65E683643658326F02B1D0A1566DE14914EF28E5248EB94F0DD | |||
| 3652 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Platform Notifications\LOG.old | text | |
MD5:EF1D5606A483BB6C72C81A3F649BEB18 | SHA256:BA083E7585ADA9936944FE56BC0141A544F18A01C3424E5C9F02375B34FE3D45 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3792 | chrome.exe | GET | — | 54.67.94.184:80 | http://54.67.94.184/?61abf14e43de6=2c531f7c896fc49fd9b0e3d4319161c1ce686170Array&m=41&q=Microsoft-Office-365-Crack---Product-Key-Free-Download-2021&dedica=&tron=61abf14e43df1.asp | US | — | — | unknown |
3792 | chrome.exe | GET | — | 54.67.94.184:80 | http://54.67.94.184/?61abf16d522d5=00e4d8152198ab51e11479b8369b3be5f921fa92Array&m=41&q=Microsoft-Office-365-Crack---Product-Key-Free-Download-2021&dedica=&tron=61abf16d522dc.asp | US | — | — | unknown |
876 | svchost.exe | HEAD | 200 | 34.104.35.123:80 | http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adys6mm2sd23z36ns7e4hcs4hrqq_1.3.36.111/ihnlcenocehgdaegdmhbidjhnhdchfmm_1.3.36.111_win_ac5lwr5427en7czu7myxmee6c7xq.crx3 | US | — | — | whitelisted |
3792 | chrome.exe | GET | 301 | 104.21.69.103:80 | http://jloyrorai.xyz/?s=41&q=Microsoft-Office-365-Crack---Product-Key-Free-Download-2021&g=2b189a8302c4995e2c4f58b7636fc789&mode=&hmac=WyI2ZjA4MzhlZWJmYTAzMzAxNzczZGVlZDhjNGQxNmY1NDIyNTk1ODg2IiwiMzU2MDc3MTA5YmFhODJjOGNmOWM3OGEzZjQ3MTQ0OTQ0ZjRmYjk4MSIsImI5OWZmZjM1N2RlMmZiNGMwNTY4YTdmZDIzMjU4NDY5OTJmYmIwYjMiXQ== | US | — | — | malicious |
3792 | chrome.exe | GET | 301 | 104.21.21.241:80 | http://uengener.xyz/?s=41&q=Microsoft-Office-365-Crack---Product-Key-Free-Download-2021&g=c767f21c3420c88a96bc041533984557&mode=&hmac=WyI2ZjA4MzhlZWJmYTAzMzAxNzczZGVlZDhjNGQxNmY1NDIyNTk1ODg2IiwiMzU2MDc3MTA5YmFhODJjOGNmOWM3OGEzZjQ3MTQ0OTQ0ZjRmYjk4MSIsImI5OWZmZjM1N2RlMmZiNGMwNTY4YTdmZDIzMjU4NDY5OTJmYmIwYjMiXQ== | US | — | — | malicious |
3792 | chrome.exe | GET | 301 | 172.67.192.130:80 | http://kahinpyr.xyz/?s=41&q=Microsoft-Office-365-Crack---Product-Key-Free-Download-2021&g=6f2a80f1fc4c075da93f33f9c19735ee&mode=&hmac=WyI2ZjA4MzhlZWJmYTAzMzAxNzczZGVlZDhjNGQxNmY1NDIyNTk1ODg2IiwiMzU2MDc3MTA5YmFhODJjOGNmOWM3OGEzZjQ3MTQ0OTQ0ZjRmYjk4MSIsImI5OWZmZjM1N2RlMmZiNGMwNTY4YTdmZDIzMjU4NDY5OTJmYmIwYjMiXQ== | US | — | — | malicious |
3792 | chrome.exe | GET | 302 | 54.219.154.242:80 | http://54.219.154.242/?61abf17ce8e13=b37d6a7e97be9c634d531966a34b26d6d442fddcArray&m=41&q=Microsoft-Office-365-Crack---Product-Key-Free-Download-2021&dedica=&tron=61abf17ce8e1a.asp | US | html | 19.0 Kb | unknown |
876 | svchost.exe | GET | 206 | 34.104.35.123:80 | http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adys6mm2sd23z36ns7e4hcs4hrqq_1.3.36.111/ihnlcenocehgdaegdmhbidjhnhdchfmm_1.3.36.111_win_ac5lwr5427en7czu7myxmee6c7xq.crx3 | US | binary | 9.69 Kb | whitelisted |
876 | svchost.exe | GET | 206 | 34.104.35.123:80 | http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adys6mm2sd23z36ns7e4hcs4hrqq_1.3.36.111/ihnlcenocehgdaegdmhbidjhnhdchfmm_1.3.36.111_win_ac5lwr5427en7czu7myxmee6c7xq.crx3 | US | binary | 5.63 Kb | whitelisted |
3792 | chrome.exe | POST | 200 | 54.219.154.242:80 | http://54.219.154.242/?go=1f771863518b2e8020a57f5a0&dedica= | US | html | 707 b | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
3792 | chrome.exe | 142.250.186.173:443 | accounts.google.com | Google Inc. | US | suspicious |
3792 | chrome.exe | 142.250.186.110:443 | clients2.google.com | Google Inc. | US | whitelisted |
3792 | chrome.exe | 172.67.209.95:443 | go4crack.com | — | US | unknown |
3792 | chrome.exe | 142.250.186.170:443 | fonts.googleapis.com | Google Inc. | US | whitelisted |
3792 | chrome.exe | 142.250.185.131:443 | fonts.gstatic.com | Google Inc. | US | whitelisted |
3792 | chrome.exe | 172.67.39.148:443 | static.addtoany.com | — | US | unknown |
3792 | chrome.exe | 142.250.184.206:443 | www.youtube.com | Google Inc. | US | whitelisted |
3792 | chrome.exe | 172.67.138.239:443 | crackshops.com | — | US | unknown |
3792 | chrome.exe | 142.250.186.174:443 | encrypted-tbn0.gstatic.com | Google Inc. | US | whitelisted |
— | — | 172.217.16.136:443 | www.googletagmanager.com | Google Inc. | US | suspicious |
Domain | IP | Reputation |
|---|---|---|
clients2.google.com |
| whitelisted |
accounts.google.com |
| shared |
go4crack.com |
| suspicious |
fonts.googleapis.com |
| whitelisted |
s.w.org |
| whitelisted |
static.addtoany.com |
| whitelisted |
fonts.gstatic.com |
| whitelisted |
www.youtube.com |
| whitelisted |
www.googletagmanager.com |
| whitelisted |
crackshops.com |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
3792 | chrome.exe | A Network Trojan was detected | ET TROJAN Fake Software Download Redirect Leading to Malware M3 |
3792 | chrome.exe | Potentially Bad Traffic | AV INFO HTTP Request to a *.xyz domain |
3792 | chrome.exe | A Network Trojan was detected | ET TROJAN Fake Software Download Redirect Leading to Malware M3 |
3792 | chrome.exe | Potentially Bad Traffic | AV INFO HTTP Request to a *.xyz domain |
— | — | Potentially Bad Traffic | ET INFO Observed DNS Query to .biz TLD |
2512 | Sat22b96533ff4ab5.exe | Potentially Bad Traffic | ET INFO Terse Request for .txt - Likely Hostile |
2512 | Sat22b96533ff4ab5.exe | A Network Trojan was detected | ET MALWARE User-Agent (???) |
2512 | Sat22b96533ff4ab5.exe | Potentially Bad Traffic | ET INFO Terse Request for .txt - Likely Hostile |
2512 | Sat22b96533ff4ab5.exe | A Network Trojan was detected | ET MALWARE User-Agent (???) |
— | — | Generic Protocol Command Decode | SURICATA Applayer Mismatch protocol both directions |