File name: | Setup.exe |
Full analysis: | https://app.any.run/tasks/be8886d9-dad6-4f7d-b684-7dfb2a506ac3 |
Verdict: | Malicious activity |
Threats: | Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks. |
Analysis date: | July 22, 2024, 12:18:38 |
OS: | Windows 10 Professional (build: 19045, 64 bit) |
Tags: | |
Indicators: | |
MIME: | application/x-dosexec |
File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
MD5: | 1D3BA94F6E0D1B6638AC611BB08C4111 |
SHA1: | 236F48538BD7BD1946F05A1A27828DDC4CA4536E |
SHA256: | 7143A5A1BE6622001A7FDC52367A92155125504715DD96B38DF6E67A6D48BD0C |
SSDEEP: | 98304:Trq3BdwAEp9IRvV83NVfAzHAqUBCT/vPz5hg4zs3l7sffaKzm4Mjte6FsFSgHSkP:DwZ7NVNKcX2oc96C+8iSNB6UOpHTRq7 |
.exe | | | Inno Setup installer (65.1) |
---|---|---|
.exe | | | Win32 EXE PECompact compressed (generic) (24.6) |
.dll | | | Win32 Dynamic Link Library (generic) (3.9) |
.exe | | | Win32 Executable (generic) (2.6) |
.exe | | | Win16/32 Executable Delphi generic (1.2) |
MachineType: | Intel 386 or later, and compatibles |
---|---|
TimeStamp: | 2024:06:10 14:47:11+00:00 |
ImageFileCharacteristics: | No relocs, Executable, 32-bit |
PEType: | PE32 |
LinkerVersion: | 2.25 |
CodeSize: | 685056 |
InitializedDataSize: | 56832 |
UninitializedDataSize: | - |
EntryPoint: | 0xa83bc |
OSVersion: | 6.1 |
ImageVersion: | - |
SubsystemVersion: | 6.1 |
Subsystem: | Windows GUI |
FileVersionNumber: | 3.4030.15.3 |
ProductVersionNumber: | 3.4030.15.3 |
FileFlagsMask: | 0x003f |
FileFlags: | (none) |
FileOS: | Win32 |
ObjectFileType: | Executable application |
FileSubtype: | - |
LanguageCode: | Neutral |
CharacterSet: | Unicode |
Comments: | This installation was built with Inno Setup. |
CompanyName: | |
FileDescription: | armory Setup |
FileVersion: | 3.4030.15.3 |
LegalCopyright: | |
OriginalFileName: | |
ProductName: | armory |
ProductVersion: | 3.4030.15.3 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
380 | C:\WINDOWS\SysWOW64\more.com | C:\Windows\SysWOW64\more.com | IDRBackup.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: More Utility Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
Lumma(PID) Process(380) more.com C2 (9)upknittsoappz.shop callosallsaospz.shop outpointsozp.shop shepherdlyopzc.shop unseaffarignsk.shop indexterityszcoxp.shop liernessfornicsa.shop lariatedzugspd.shop enormousseop.shop | |||||||||||||||
620 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) | |||||||||||||||
636 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) | |||||||||||||||
852 | C:\Users\admin\AppData\Local\Temp\SputterPork.pif | C:\Users\admin\AppData\Local\Temp\SputterPork.pif | more.com | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Lumma(PID) Process(852) SputterPork.pif C2 (9)upknittsoappz.shop callosallsaospz.shop outpointsozp.shop shepherdlyopzc.shop unseaffarignsk.shop indexterityszcoxp.shop liernessfornicsa.shop lariatedzugspd.shop enormousseop.shop | |||||||||||||||
1328 | cmd /k echo [InternetShortcut] > "C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TradeTokenElite.url" & echo URL="C:\Users\admin\AppData\Local\TradeToken Elite Innovations Inc\TradeTokenElite.js" >> "C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TradeTokenElite.url" & exit | C:\Windows\SysWOW64\cmd.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) | |||||||||||||||
1540 | "C:\Users\admin\AppData\Local\Temp\is-3K01N.tmp\Setup.tmp" /SL5="$A0262,4605518,742912,C:\Users\admin\AppData\Local\Temp\Setup.exe" /VERYSILENT | C:\Users\admin\AppData\Local\Temp\is-3K01N.tmp\Setup.tmp | Setup.exe | ||||||||||||
User: admin Company: Integrity Level: MEDIUM Description: Setup/Uninstall Exit code: 0 Version: 51.1052.0.0 Modules
| |||||||||||||||
1596 | findstr /V "DEUTSCHCOMEDYCONDITIONSMINDS" Clips | C:\Windows\SysWOW64\findstr.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Find String (QGREP) Utility Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) | |||||||||||||||
1668 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) | |||||||||||||||
2112 | "C:\Users\admin\AppData\Local\Temp\Setup.exe" | C:\Users\admin\AppData\Local\Temp\Setup.exe | explorer.exe | ||||||||||||
User: admin Company: Integrity Level: MEDIUM Description: armory Setup Exit code: 1 Version: 3.4030.15.3 Modules
| |||||||||||||||
2632 | C:\Users\admin\AppData\Roaming\Gnr\STPZTGKNGEBVJKUPQMW\Bt.exe | C:\Users\admin\AppData\Roaming\Gnr\STPZTGKNGEBVJKUPQMW\Bt.exe | — | IDRBackup.exe | |||||||||||
User: admin Company: aaa Integrity Level: MEDIUM Exit code: 0 Version: 1.00 Modules
|
(PID) Process: | (7204) Setup.tmp | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000 |
Operation: | write | Name: | Owner |
Value: 241C0000FE37124E31DCDA01 | |||
(PID) Process: | (7204) Setup.tmp | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000 |
Operation: | write | Name: | SessionHash |
Value: 7CEBF7E5C6920EF8FAFAB0E74B8EEA513A105ECACCF4F7CC2BEF55A39F493E75 | |||
(PID) Process: | (7204) Setup.tmp | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000 |
Operation: | write | Name: | Sequence |
Value: 1 | |||
(PID) Process: | (7204) Setup.tmp | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
(PID) Process: | (7204) Setup.tmp | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | IntranetName |
Value: 1 | |||
(PID) Process: | (7204) Setup.tmp | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
(PID) Process: | (7204) Setup.tmp | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | AutoDetect |
Value: 0 | |||
(PID) Process: | (7204) Setup.tmp | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000 |
Operation: | delete value | Name: | Sequence |
Value: | |||
(PID) Process: | (7204) Setup.tmp | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000 |
Operation: | delete value | Name: | SessionHash |
Value: 鋆蹋凪်쩞쳷ꍕ䦟甾 | |||
(PID) Process: | (7204) Setup.tmp | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000 |
Operation: | delete value | Name: | Owner |
Value: ᰤ |
PID | Process | Filename | Type | |
---|---|---|---|---|
7204 | Setup.tmp | C:\Users\admin\AppData\Local\Temp\is-Q0JMD.tmp\_isetup\_iscrypt.dll | executable | |
MD5:47CFD05FDE4BABE79530C7EA730F6DC0 | SHA256:4BB34FE74F86AB389763863EE395A93D73E2D9548C224819EC9055D7C8C4B480 | |||
7204 | Setup.tmp | C:\Users\admin\AppData\Local\Temp\is-Q0JMD.tmp\_isetup\_setup64.tmp | executable | |
MD5:E4211D6D009757C078A9FAC7FF4F03D4 | SHA256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95 | |||
1540 | Setup.tmp | C:\Users\admin\AppData\Local\armory\is-SE2F4.tmp | compressed | |
MD5:28990BBF95718C51EA909A659FBDA61B | SHA256:871B73751A7B2AB7A3F7FDBEEB456FAD499D5EEBCB1641F6C45F3E5307253869 | |||
1540 | Setup.tmp | C:\Users\admin\AppData\Local\Temp\is-HP7LH.tmp\_isetup\_setup64.tmp | executable | |
MD5:E4211D6D009757C078A9FAC7FF4F03D4 | SHA256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95 | |||
2112 | Setup.exe | C:\Users\admin\AppData\Local\Temp\is-C06JU.tmp\Setup.tmp | executable | |
MD5:8F5B7030ACFF469053674E18C2A98FAE | SHA256:8C5377E5B6DD221E61EBB70F5788EF5410291AE691BE5E75AB1A182AFDFA7B76 | |||
1540 | Setup.tmp | C:\Users\admin\AppData\Local\Temp\is-HP7LH.tmp\is-O9D58.tmp | executable | |
MD5:E84B92F608DB288AFCC12C5FE341B6C7 | SHA256:F6C80D7C6AB6BA91CC24E12AA71C5290CA095E0842AE59A460AD71522039DEB3 | |||
5400 | DuetUpdater.exe | C:\Users\admin\AppData\Local\armory\sqlite3.dll | executable | |
MD5:9D255E04106BA7DCBD0BCB549E9A5A4E | SHA256:02F37A8E3D1790AC90C04BC50DE73CD1A93E27CAF833A1E1211B9CC6294ECEE5 | |||
1540 | Setup.tmp | C:\Users\admin\AppData\Local\Temp\is-HP7LH.tmp\_isetup\_iscrypt.dll | executable | |
MD5:47CFD05FDE4BABE79530C7EA730F6DC0 | SHA256:4BB34FE74F86AB389763863EE395A93D73E2D9548C224819EC9055D7C8C4B480 | |||
1540 | Setup.tmp | C:\Users\admin\AppData\Local\Temp\is-HP7LH.tmp\DuetUpdater.exe | executable | |
MD5:E84B92F608DB288AFCC12C5FE341B6C7 | SHA256:F6C80D7C6AB6BA91CC24E12AA71C5290CA095E0842AE59A460AD71522039DEB3 | |||
5400 | DuetUpdater.exe | C:\Users\admin\AppData\Local\armory\madexcept_.bpl | executable | |
MD5:21068DFD733435C866312D35B9432733 | SHA256:835F1141ECE59C36B18E76927572D229136AEB12EFF44CB4BA98D7808257C299 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
— | — | POST | 502 | 104.21.31.79:80 | http://brasseriehub2.com/h9fmdW6/index.php | unknown | — | — | — |
— | — | POST | 502 | 45.140.19.240:80 | http://brasseriehub.com/h9fmdW5/index.php | unknown | — | — | — |
— | — | POST | 502 | 104.21.31.79:80 | http://brasseriehub2.com/h9fmdW6/index.php | unknown | — | — | — |
— | — | POST | 502 | 45.140.19.240:80 | http://brasseriehub.com/h9fmdW5/index.php | unknown | — | — | — |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
4716 | svchost.exe | 20.190.159.75:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
5620 | MoUsoCoreWorker.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 20.190.159.75:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4032 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
7856 | svchost.exe | 4.208.221.206:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | US | unknown |
— | — | 40.113.103.199:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
2760 | svchost.exe | 40.113.103.199:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
2992 | slui.exe | 40.91.76.224:443 | activation-v2.sls.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
4716 | svchost.exe | 20.190.159.23:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
Domain | IP | Reputation |
---|---|---|
login.live.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |
arc.msn.com |
| whitelisted |
fd.api.iris.microsoft.com |
| whitelisted |
www.bing.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
enormousseop.shop |
| unknown |
pwarticles.xyz |
| unknown |
PID | Process | Class | Message |
---|---|---|---|
— | — | Misc activity | ET INFO Pastebin Service Domain in DNS Lookup (rentry .co) |
— | — | Misc activity | ET INFO Observed Pastebin Service Domain (rentry .co in TLS SNI) |
— | — | Malware Command and Control Activity Detected | BOTNET [ANY.RUN] Amadey HTTP POST Request (st=s) |
— | — | Malware Command and Control Activity Detected | BOTNET [ANY.RUN] Amadey HTTP POST Request (st=s) |