analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

3e9238e5bb56bf2c8e57b436c85267f3.exe

Full analysis: https://app.any.run/tasks/e3c726fa-e857-4b9f-ba31-3d58d4332f67
Verdict: Malicious activity
Threats:

Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks.

Analysis date: July 27, 2023, 09:06:31
OS: Windows 7 Professional Service Pack 1 (build: 7601, 64 bit)
Tags:
amadey
trojan
loader
zgrat
backdoor
stealer
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

3E9238E5BB56BF2C8E57B436C85267F3

SHA1:

D6F5C65C5518F6B7A59DA684066F7C2DDF319B33

SHA256:

6E7450B08A3038F279A6096FF24A98A4DFB63A9D55FFB13A4E52EB9757BC8483

SSDEEP:

6144:x4cLh+BylwCLwWcqLbiON/WiFGOu7duK0VQ:tLh+B17+biiFRu7duK9

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Uses Task Scheduler to run other applications

      • bstyoops.exe (PID: 2708)
      • explorer.exe (PID: 1880)
    • Creates a writable file the system directory

      • svchost.exe (PID: 884)
      • powershell.exe (PID: 2060)
    • Changes the autorun value in the registry

      • bstyoops.exe (PID: 2708)
    • Connects to the CnC server

      • bstyoops.exe (PID: 2708)
    • AMADEY was detected

      • bstyoops.exe (PID: 2708)
    • Application was dropped or rewritten from another process

      • n47FJITc.exe (PID: 2008)
      • W8vQdbz8.exe (PID: 2572)
      • W8vQdbz8.exe (PID: 3064)
      • updater.exe (PID: 2028)
    • ZGRAT was detected

      • n47FJITc.exe (PID: 2008)
    • AMADEY detected by memory dumps

      • bstyoops.exe (PID: 2708)
    • Steals credentials

      • n47FJITc.exe (PID: 2008)
    • Actions looks like stealing of personal data

      • powershell.exe (PID: 2664)
      • powershell.exe (PID: 1976)
      • powershell.exe (PID: 2060)
      • powershell.exe (PID: 2392)
      • n47FJITc.exe (PID: 2008)
    • Steals credentials from Web Browsers

      • n47FJITc.exe (PID: 2008)
    • Adds path to the Windows Defender exclusion list

      • explorer.exe (PID: 1880)
    • Application was injected by another process

      • IMEDICTUPDATE.EXE (PID: 1236)
      • svchost.exe (PID: 816)
      • svchost.exe (PID: 860)
      • svchost.exe (PID: 608)
      • dwm.exe (PID: 1816)
      • svchost.exe (PID: 844)
      • explorer.exe (PID: 1880)
      • svchost.exe (PID: 328)
      • winlogon.exe (PID: 448)
      • services.exe (PID: 484)
      • lsm.exe (PID: 508)
      • svchost.exe (PID: 884)
      • lsass.exe (PID: 500)
      • svchost.exe (PID: 1052)
      • svchost.exe (PID: 1176)
      • svchost.exe (PID: 1204)
      • svchost.exe (PID: 776)
      • spoolsv.exe (PID: 300)
      • wmpnetwk.exe (PID: 1700)
      • svchost.exe (PID: 688)
      • conhost.exe (PID: 2380)
      • dllhost.exe (PID: 3004)
      • conhost.exe (PID: 2588)
      • taskeng.exe (PID: 2384)
      • conhost.exe (PID: 2332)
      • taskeng.exe (PID: 1412)
      • conhost.exe (PID: 2280)
      • conhost.exe (PID: 2432)
      • conhost.exe (PID: 2444)
    • Modifies hosts file to block updates

      • W8vQdbz8.exe (PID: 3064)
    • Runs injected code in another process

      • dialer.exe (PID: 1972)
      • dialer.exe (PID: 2864)
    • Uses Task Scheduler to autorun other applications

      • powershell.exe (PID: 1976)
      • powershell.exe (PID: 2392)
  • SUSPICIOUS

    • Starts itself from another location

      • 3e9238e5bb56bf2c8e57b436c85267f3.exe (PID: 2164)
    • Executable content was dropped or overwritten

      • 3e9238e5bb56bf2c8e57b436c85267f3.exe (PID: 2164)
      • bstyoops.exe (PID: 2708)
      • W8vQdbz8.exe (PID: 3064)
      • updater.exe (PID: 2028)
    • Reads the Internet Settings

      • bstyoops.exe (PID: 2708)
      • 3e9238e5bb56bf2c8e57b436c85267f3.exe (PID: 2164)
      • powershell.exe (PID: 2664)
    • Starts CMD.EXE for commands execution

      • bstyoops.exe (PID: 2708)
      • cmd.exe (PID: 332)
      • explorer.exe (PID: 1880)
    • Application launched itself

      • cmd.exe (PID: 332)
    • Uses ICACLS.EXE to modify access control lists

      • cmd.exe (PID: 332)
    • Process requests binary or script from the Internet

      • bstyoops.exe (PID: 2708)
    • The process executes via Task Scheduler

      • bstyoops.exe (PID: 864)
      • updater.exe (PID: 2028)
      • bstyoops.exe (PID: 2648)
    • Connects to unusual port

      • n47FJITc.exe (PID: 2008)
    • Connects to the server without a host name

      • bstyoops.exe (PID: 2708)
      • dialer.exe (PID: 1640)
    • Loads DLL from Mozilla Firefox

      • n47FJITc.exe (PID: 2008)
    • Reads browser cookies

      • n47FJITc.exe (PID: 2008)
    • Accesses Microsoft Outlook profiles

      • n47FJITc.exe (PID: 2008)
    • Script adds exclusion path to Windows Defender

      • explorer.exe (PID: 1880)
    • Starts POWERSHELL.EXE for commands execution

      • explorer.exe (PID: 1880)
    • Uses powercfg.exe to modify the power settings

      • cmd.exe (PID: 2228)
      • cmd.exe (PID: 1352)
    • Adds/modifies Windows certificates

      • services.exe (PID: 484)
    • The Powershell connects to the Internet

      • powershell.exe (PID: 2060)
    • Unusual connection from system programs

      • powershell.exe (PID: 2060)
    • Drops a system driver (possible attempt to evade defenses)

      • updater.exe (PID: 2028)
  • INFO

    • The process checks LSA protection

      • 3e9238e5bb56bf2c8e57b436c85267f3.exe (PID: 2164)
      • lsass.exe (PID: 500)
      • bstyoops.exe (PID: 2708)
      • dllhost.exe (PID: 3004)
      • taskeng.exe (PID: 1412)
      • n47FJITc.exe (PID: 2008)
      • svchost.exe (PID: 1052)
      • dialer.exe (PID: 1972)
      • taskeng.exe (PID: 2384)
      • dialer.exe (PID: 2864)
      • dialer.exe (PID: 1640)
    • Checks supported languages

      • 3e9238e5bb56bf2c8e57b436c85267f3.exe (PID: 2164)
      • bstyoops.exe (PID: 2708)
      • n47FJITc.exe (PID: 2008)
      • bstyoops.exe (PID: 864)
      • W8vQdbz8.exe (PID: 3064)
      • updater.exe (PID: 2028)
      • bstyoops.exe (PID: 2648)
    • Reads the machine GUID from the registry

      • 3e9238e5bb56bf2c8e57b436c85267f3.exe (PID: 2164)
      • bstyoops.exe (PID: 2708)
      • n47FJITc.exe (PID: 2008)
    • Create files in a temporary directory

      • 3e9238e5bb56bf2c8e57b436c85267f3.exe (PID: 2164)
      • bstyoops.exe (PID: 2708)
      • n47FJITc.exe (PID: 2008)
      • W8vQdbz8.exe (PID: 3064)
    • Reads the computer name

      • 3e9238e5bb56bf2c8e57b436c85267f3.exe (PID: 2164)
      • bstyoops.exe (PID: 2708)
      • n47FJITc.exe (PID: 2008)
    • Checks proxy server information

      • bstyoops.exe (PID: 2708)
    • Creates files or folders in the user directory

      • dllhost.exe (PID: 3004)
      • bstyoops.exe (PID: 2708)
    • Reads Environment values

      • n47FJITc.exe (PID: 2008)
    • Manual execution by a user

      • powershell.exe (PID: 2664)
      • cmd.exe (PID: 2228)
      • dialer.exe (PID: 1972)
      • powershell.exe (PID: 1976)
      • schtasks.exe (PID: 2820)
      • powershell.exe (PID: 2060)
      • dialer.exe (PID: 1652)
      • cmd.exe (PID: 1352)
      • dialer.exe (PID: 2864)
      • powershell.exe (PID: 2392)
      • dialer.exe (PID: 1640)
    • Creates files in the program directory

      • W8vQdbz8.exe (PID: 3064)
      • updater.exe (PID: 2028)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

Amadey

(PID) Process(2708) bstyoops.exe
C2 (1)http://104.248.239.160
Version3.86
Options
Drop directoryS-%lu-
Drop name%-lu
Strings (119)-%lu
b6ba12ff32
bstyoops.exe
SCHTASKS
/Create /SC MINUTE /MO 1 /TN
/TR "
" /F
SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
Startup
Rem
cmd /C RMDIR /s/q
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
rundll32
/Delete /TN "
Programs
SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
%USERPROFILE%
\App
POST
GET
id=
&vs=
&sd=
&os=
&bi=
&ar=
&pc=
&un=
&dm=
&av=
&lv=
&og=
cred.dll|clip.dll|
d1
e1
e0
Main
http://
https://
exe
dll
cmd
ps1
<c>
<d>
Plugins/
+++
#
|
&unit=
=
shell32.dll
kernel32.dll
GetNativeSystemInfo
ProgramData\
AVAST Software
Avira
Kaspersky Lab
ESET
Panda Security
Doctor Web
AVG
360TotalSecurity
Bitdefender
Norton
Sophos
Comodo
WinDefender
0123456789
rb
wb
Content-Type: multipart/form-data; boundary=----
------
Content-Disposition: form-data; name="data"; filename="
" Content-Type: application/octet-stream
------
--
?scr=1
.jpg
Content-Type: application/x-www-form-urlencoded
SYSTEM\CurrentControlSet\Control\ComputerName\ComputerName
ComputerName
abcdefghijklmnopqrstuvwxyz0123456789-_
-unicode-
SYSTEM\CurrentControlSet\Control\UnitedVideo\CONTROL\VIDEO\
SYSTEM\ControlSet001\Services\BasicDisplay\Video
VideoID
\0000
DefaultSettings.XResolution
DefaultSettings.YResolution
SOFTWARE\Microsoft\Windows NT\CurrentVersion
ProductName
2019
2022
2016
CurrentBuild
&&
echo Y|CACLS "
" /P "
:N"
CACLS "
" /P "
:R" /E
:F" /E
&&Exit
..\
\
:::
rundll32.exe
/k
"taskkill /f /im "
" && timeout 1 && del
&& Exit"
" && ren
&&
Powershell.exe
-executionpolicy remotesigned -File "
"
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:07:22 20:00:56+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.24
CodeSize: 183808
InitializedDataSize: 55296
UninitializedDataSize: -
EntryPoint: 0x16fbf
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 22-Jul-2023 20:00:56
Detected languages:
  • English - United States
Debug artifacts:
  • D:\Mktmp\Amadey\Release\Amadey.pdb

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x00000100

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 5
Time date stamp: 22-Jul-2023 20:00:56
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x0002CDBD
0x0002CE00
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.47577
.rdata
0x0002E000
0x00008A8C
0x00008C00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
5.28582
.data
0x00037000
0x000024B8
0x00001800
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
1.36891
.rsrc
0x0003A000
0x000001E0
0x00000200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
4.71768
.reloc
0x0003B000
0x00002260
0x00002400
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
6.54892

Resources

Title
Entropy
Size
Codepage
Language
Type
1
4.91161
381
UNKNOWN
English - United States
RT_MANIFEST

Imports

ADVAPI32.dll
GDI32.dll
KERNEL32.dll
SHELL32.dll
USER32.dll
WININET.dll
gdiplus.dll
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
81
Monitored processes
66
Malicious processes
11
Suspicious processes
4

Behavior graph

Click at the process to see the details
drop and start start drop and start drop and start drop and start inject inject inject inject inject inject inject inject inject inject inject 3e9238e5bb56bf2c8e57b436c85267f3.exe #AMADEY bstyoops.exe schtasks.exe no specs cmd.exe no specs cmd.exe no specs cacls.exe no specs cacls.exe no specs cmd.exe no specs cacls.exe no specs cacls.exe no specs #ZGRAT n47fjitc.exe bstyoops.exe no specs w8vqdbz8.exe no specs w8vqdbz8.exe powershell.exe cmd.exe powercfg.exe no specs dialer.exe powershell.exe conhost.exe conhost.exe powercfg.exe no specs powercfg.exe no specs powercfg.exe no specs schtasks.exe no specs schtasks.exe conhost.exe updater.exe powershell.exe conhost.exe cmd.exe powercfg.exe no specs dialer.exe powershell.exe conhost.exe powercfg.exe no specs winlogon.exe services.exe lsass.exe lsm.exe svchost.exe svchost.exe svchost.exe svchost.exe svchost.exe svchost.exe svchost.exe spoolsv.exe svchost.exe svchost.exe svchost.exe imedictupdate.exe dwm.exe explorer.exe svchost.exe wmpnetwk.exe WinInetCacheServer taskeng.exe taskeng.exe conhost.exe powercfg.exe no specs powercfg.exe no specs schtasks.exe no specs dialer.exe dialer.exe bstyoops.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2164"C:\Users\admin\AppData\Local\Temp\3e9238e5bb56bf2c8e57b436c85267f3.exe" C:\Users\admin\AppData\Local\Temp\3e9238e5bb56bf2c8e57b436c85267f3.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\3e9238e5bb56bf2c8e57b436c85267f3.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\wow64.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\gdi32.dll
2708"C:\Users\admin\AppData\Local\Temp\b6ba12ff32\bstyoops.exe" C:\Users\admin\AppData\Local\Temp\b6ba12ff32\bstyoops.exe
3e9238e5bb56bf2c8e57b436c85267f3.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\b6ba12ff32\bstyoops.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\wow64win.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
Amadey
(PID) Process(2708) bstyoops.exe
C2 (1)http://104.248.239.160
Version3.86
Options
Drop directoryS-%lu-
Drop name%-lu
Strings (119)-%lu
b6ba12ff32
bstyoops.exe
SCHTASKS
/Create /SC MINUTE /MO 1 /TN
/TR "
" /F
SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
Startup
Rem
cmd /C RMDIR /s/q
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
rundll32
/Delete /TN "
Programs
SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
%USERPROFILE%
\App
POST
GET
id=
&vs=
&sd=
&os=
&bi=
&ar=
&pc=
&un=
&dm=
&av=
&lv=
&og=
cred.dll|clip.dll|
d1
e1
e0
Main
http://
https://
exe
dll
cmd
ps1
<c>
<d>
Plugins/
+++
#
|
&unit=
=
shell32.dll
kernel32.dll
GetNativeSystemInfo
ProgramData\
AVAST Software
Avira
Kaspersky Lab
ESET
Panda Security
Doctor Web
AVG
360TotalSecurity
Bitdefender
Norton
Sophos
Comodo
WinDefender
0123456789
rb
wb
Content-Type: multipart/form-data; boundary=----
------
Content-Disposition: form-data; name="data"; filename="
" Content-Type: application/octet-stream
------
--
?scr=1
.jpg
Content-Type: application/x-www-form-urlencoded
SYSTEM\CurrentControlSet\Control\ComputerName\ComputerName
ComputerName
abcdefghijklmnopqrstuvwxyz0123456789-_
-unicode-
SYSTEM\CurrentControlSet\Control\UnitedVideo\CONTROL\VIDEO\
SYSTEM\ControlSet001\Services\BasicDisplay\Video
VideoID
\0000
DefaultSettings.XResolution
DefaultSettings.YResolution
SOFTWARE\Microsoft\Windows NT\CurrentVersion
ProductName
2019
2022
2016
CurrentBuild
&&
echo Y|CACLS "
" /P "
:N"
CACLS "
" /P "
:R" /E
:F" /E
&&Exit
..\
\
:::
rundll32.exe
/k
"taskkill /f /im "
" && timeout 1 && del
&& Exit"
" && ren
&&
Powershell.exe
-executionpolicy remotesigned -File "
"
2732"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN bstyoops.exe /TR "C:\Users\admin\AppData\Local\Temp\b6ba12ff32\bstyoops.exe" /FC:\Windows\SysWOW64\schtasks.exebstyoops.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Manages scheduled tasks
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\syswow64\schtasks.exe
c:\windows\syswow64\ntdll.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\wow64.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
332"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "bstyoops.exe" /P "admin:N"&&CACLS "bstyoops.exe" /P "admin:R" /E&&echo Y|CACLS "..\b6ba12ff32" /P "admin:N"&&CACLS "..\b6ba12ff32" /P "admin:R" /E&&ExitC:\Windows\SysWOW64\cmd.exebstyoops.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\syswow64\ntdll.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernelbase.dll
1216C:\Windows\system32\cmd.exe /S /D /c" echo Y"C:\Windows\SysWOW64\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\user32.dll
2376CACLS "bstyoops.exe" /P "admin:N"C:\Windows\SysWOW64\cacls.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Control ACLs Program
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\syswow64\cacls.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
352CACLS "bstyoops.exe" /P "admin:R" /EC:\Windows\SysWOW64\cacls.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Control ACLs Program
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\syswow64\cacls.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\advapi32.dll
1752C:\Windows\system32\cmd.exe /S /D /c" echo Y"C:\Windows\SysWOW64\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\wow64.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
2652CACLS "..\b6ba12ff32" /P "admin:N"C:\Windows\SysWOW64\cacls.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Control ACLs Program
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\syswow64\cacls.exe
c:\windows\syswow64\ntdll.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\wow64win.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\system32\user32.dll
2624CACLS "..\b6ba12ff32" /P "admin:R" /EC:\Windows\SysWOW64\cacls.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Control ACLs Program
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\syswow64\cacls.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64win.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\msvcrt.dll
Total events
32 923
Read events
32 814
Write events
107
Delete events
2

Modification events

(PID) Process:(1880) explorer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{01979c6a-42fa-414c-b8aa-eee2c8202018}.check.100
Operation:writeName:CheckSetting
Value:
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
(PID) Process:(1880) explorer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0
Operation:writeName:CheckSetting
Value:
01000000D08C9DDF0115D1118C7A00C04FC297EB01000000088AF72B0747534094337F63DE35C94A000000000200000000001066000000010000200000004329E97B6122001987843D096C8D7A04278E955BA77E90F0EC21D5D5110C6099000000000E8000000002000020000000979BE7A559B305B7CFE1C5A5F5F59641FC60FE2130924CA918663525F927FE5F30000000D041206B4D7669F5545B3619830833DC14F9F449298E4B7C310BBBF83CEC0952F599785F4280E6066545B563DEA47E8A40000000E0D17684D5528603741776DB5671F0B8DF327589EF3FB4B1A699172343201C10052A85BDBE5A2A1E74B751F0F987A3DC9F48BA562021363FAF8E9C8FFE10450F
(PID) Process:(2164) 3e9238e5bb56bf2c8e57b436c85267f3.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2164) 3e9238e5bb56bf2c8e57b436c85267f3.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(2164) 3e9238e5bb56bf2c8e57b436c85267f3.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(2164) 3e9238e5bb56bf2c8e57b436c85267f3.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(2708) bstyoops.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
Operation:writeName:Startup
Value:
%USERPROFILE%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
(PID) Process:(2708) bstyoops.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2708) bstyoops.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(2708) bstyoops.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
Executable files
11
Suspicious files
31
Text files
7
Unknown types
1

Dropped files

PID
Process
Filename
Type
3004dllhost.exeC:\Users\admin\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.dat
MD5:
SHA256:
2008n47FJITc.exeC:\Users\admin\AppData\Local\Temp\Fbtqmy.tmpdbbinary
MD5:8ED59ABBE343BC945E3A9F4801075399
SHA256:97E62577149EB459A713FCBE09C5C73A1ADDF230042F53B2CA9E256E695EA7A0
2708bstyoops.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\K78MRVB5\n47FJITc[1].exeexecutable
MD5:F078B804FC4D54586EEA6A32DD7463E6
SHA256:2EEEF488F95E86E0233595DA1BF657956349A0C4B8D64F34D24A8CC60FFC9522
2008n47FJITc.exeC:\Users\admin\AppData\Local\Temp\Oprvcreafv.tmpdbbinary
MD5:03EF1C0012EE77CDA2C2CB36DFBDA123
SHA256:800D734016D8FBCDE263D8CD2411167406C544FC090A5DCBD2D374CABF918B86
2008n47FJITc.exeC:\Users\admin\AppData\Local\Temp\Szdovudpxv.tmpdbbinary
MD5:CEEDD8AE976601F9C9365EBEC5CFD997
SHA256:0B1A7E634F5B8A88211685983E83E7739359ACE5F26CA99746F46BB81507A42E
2708bstyoops.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D2U1WPAC\W8vQdbz8[1].exeexecutable
MD5:63C85F130B60B2C292E0EAF9794FE897
SHA256:43AB825086C6CB0FFCCC887273A2ACD37F81E0B48DE001334579278F7DA8E54A
2708bstyoops.exeC:\Users\admin\AppData\Local\Temp\1000049001\n47FJITc.exeexecutable
MD5:F078B804FC4D54586EEA6A32DD7463E6
SHA256:2EEEF488F95E86E0233595DA1BF657956349A0C4B8D64F34D24A8CC60FFC9522
884svchost.exeC:\Windows\System32\Tasks\bstyoops.exexml
MD5:F85C5F2019C1F61AF2E150C46B4015CA
SHA256:7A3FDD725E35CF69775EB23D11B1580F2EBDD59BDA1A479723170E2F0807D544
3004dllhost.exeC:\Users\admin\AppData\Local\Microsoft\Windows\WebCache\V01.logbinary
MD5:8B67112417A5857507A0249C55E9E01E
SHA256:A2BA37568A7A3A7FBF4E223198B6F6E1C75C0CC87B5C57019FF63568143E5D54
2708bstyoops.exeC:\Users\admin\AppData\Local\Temp\896776584425image
MD5:26B46C581A93050E685A222A57D1537C
SHA256:C7F7080D17522A88AF9E1DE2DD100F5E247D90F7C6CC0E9DE24F6430DAF13E2E
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
11
TCP/UDP connections
18
DNS requests
5
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2060
powershell.exe
GET
304
8.238.155.126:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?c4ff7080736f9b2f
US
whitelisted
2708
bstyoops.exe
POST
104.248.239.160:80
http://104.248.239.160/g9dvhSk/index.php
US
malicious
2708
bstyoops.exe
GET
200
159.203.191.83:80
http://smz.sh/files/n47FJITc.exe
US
executable
813 Kb
malicious
1640
dialer.exe
POST
200
104.248.239.160:80
http://104.248.239.160/g9dvhSk/unam/api/endpoint.php
US
text
2 b
malicious
1640
dialer.exe
GET
200
104.248.239.160:80
http://104.248.239.160/g9dvhSk/unam/cfg/xmr.txt
US
binary
425 b
malicious
2708
bstyoops.exe
GET
200
159.203.191.83:80
http://smz.sh/files/W8vQdbz8.exe
US
executable
9.92 Mb
malicious
2708
bstyoops.exe
POST
200
104.248.239.160:80
http://104.248.239.160/g9dvhSk/index.php
US
text
3 b
malicious
2708
bstyoops.exe
POST
200
104.248.239.160:80
http://104.248.239.160/g9dvhSk/index.php
US
text
3 b
malicious
2708
bstyoops.exe
GET
404
104.248.239.160:80
http://104.248.239.160/g9dvhSk/Plugins/cred64.dll
US
html
162 b
malicious
2708
bstyoops.exe
GET
404
104.248.239.160:80
http://104.248.239.160/g9dvhSk/Plugins/clip64.dll
US
html
162 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
328
svchost.exe
224.0.0.252:5355
unknown
2008
n47FJITc.exe
5.181.80.123:7702
Tamatiya EOOD
BG
malicious
2708
bstyoops.exe
159.203.191.83:80
smz.sh
DIGITALOCEAN-ASN
US
malicious
2708
bstyoops.exe
104.248.239.160:80
DIGITALOCEAN-ASN
US
malicious
1640
dialer.exe
104.248.239.160:80
DIGITALOCEAN-ASN
US
malicious
1640
dialer.exe
34.149.22.228:443
randomxmonero.auto.nicehash.com
GOOGLE
US
suspicious
2060
powershell.exe
8.238.155.126:80
ctldl.windowsupdate.com
LEVEL3
US
suspicious

DNS requests

Domain
IP
Reputation
smz.sh
  • 159.203.191.83
malicious
ctldl.windowsupdate.com
  • 8.238.155.126
  • 8.238.172.126
  • 67.27.142.126
  • 8.238.155.254
  • 8.253.145.120
whitelisted
randomxmonero.auto.nicehash.com
  • 34.149.22.228
suspicious
dns.msftncsi.com
  • 131.107.255.255
shared
teredo.ipv6.microsoft.com
whitelisted

Threats

PID
Process
Class
Message
2708
bstyoops.exe
Malware Command and Control Activity Detected
ET MALWARE Amadey CnC Check-In
2708
bstyoops.exe
A Network Trojan was detected
ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M1
2708
bstyoops.exe
A Network Trojan was detected
ET MALWARE Win32/Amadey Bot Activity (POST) M2
2708
bstyoops.exe
A Network Trojan was detected
AV TROJAN Agent.DHOA System Info Exfiltration
2708
bstyoops.exe
A Network Trojan was detected
ET MALWARE Amadey Bot Activity (POST) M1
2708
bstyoops.exe
Potential Corporate Privacy Violation
AV POLICY HTTP request for .exe file with no User-Agent
2708
bstyoops.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
2708
bstyoops.exe
Potentially Bad Traffic
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
2708
bstyoops.exe
A Network Trojan was detected
ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2
2008
n47FJITc.exe
Malware Command and Control Activity Detected
BACKDOOR [ANY.RUN] zgRat Successful Connection (LOAD)
No debug info