| File name: | streetfighterchampioneditionmodapk10.7z |
| Full analysis: | https://app.any.run/tasks/9aa73338-574f-4709-a641-bc31c6685dd0 |
| Verdict: | Malicious activity |
| Threats: | Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks. |
| Analysis date: | September 23, 2024, 21:20:28 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-7z-compressed |
| File info: | 7-zip archive data, version 0.4 |
| MD5: | 42C5B96710B44E6633B29931BCD007DD |
| SHA1: | EA28EA5598EACBF76F7343FE5211AF6C639FE7E9 |
| SHA256: | 8ECA52205588A09366DEC52820CBC53EEDC1C7F019199AEB79C844BB3BA3DC80 |
| SSDEEP: | 98304:h6yGCEOOtJi4L1ZNMgkvTAT7zyPufnJdPrkBJiWcQWeGWss234B10YgWx23UfDmc:ejvFmt2H/UkxWAMKzktjH9d |
| .7z | | | 7-Zip compressed archive (v0.4) (57.1) |
|---|---|---|
| .7z | | | 7-Zip compressed archive (gen) (42.8) |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 32 | C:\Users\admin\Documents\iofolko5\JxqyWseDoMtfooURak7ZGdG9.exe | C:\Users\admin\Documents\iofolko5\JxqyWseDoMtfooURak7ZGdG9.exe | Fbi.pif | ||||||||||||
User: admin Company: V7sYNJPJiw0OZ Integrity Level: HIGH Description: BotClient Exit code: 0 Version: 3.9.2.3 Modules
| |||||||||||||||
| 368 | "C:\Users\admin\AppData\Local\Temp\service123.exe" | C:\Users\admin\AppData\Local\Temp\service123.exe | _OKL_rdYhkp6NL8Y3h7cLxYv.exe | ||||||||||||
User: admin Integrity Level: HIGH | |||||||||||||||
| 644 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | adminAFBKKFBAEG.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 736 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | sc.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 936 | "C:\ProgramData\JEHIJDGIEB.exe" | C:\ProgramData\JEHIJDGIEB.exe | — | RegAsm.exe | |||||||||||
User: admin Company: Production subsumption Integrity Level: HIGH Description: protestations wonk separationist Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
| 1128 | findstr /V "RenderingAnywhereBedfordRemained" Studied | C:\Windows\SysWOW64\findstr.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Find String (QGREP) Utility Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1236 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | schtasks.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1332 | "C:\Users\admin\AppData\Local\Nikkitos Screen Recorder\nikkitosscreenrecorder32_64.exe" -i | C:\Users\admin\AppData\Local\Nikkitos Screen Recorder\nikkitosscreenrecorder32_64.exe | A2NAbIXy9Z6yruVmQGAlV1pf.tmp | ||||||||||||
User: admin Company: DX Software Integrity Level: HIGH Description: DX Media Station Version: 2.4.9.23 Modules
| |||||||||||||||
| 1344 | tasklist | C:\Windows\SysWOW64\tasklist.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Lists the current running tasks Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1384 | schtasks /create /f /RU "admin" /tr "C:\ProgramData\jewkkwnf\jewkkwnf.exe" /tn "jewkkwnf LG" /sc ONLOGON /rl HIGHEST | C:\Windows\SysWOW64\schtasks.exe | — | JxqyWseDoMtfooURak7ZGdG9.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Task Scheduler Configuration Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (6496) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\GoogleChromeEnterpriseBundle64.zip | |||
| (PID) Process: | (6496) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\Desktop\streetfighterchampioneditionmodapk10.7z | |||
| (PID) Process: | (6496) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (6496) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (6496) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (6496) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
| (PID) Process: | (6592) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface |
| Operation: | write | Name: | ShowPassword |
Value: 0 | |||
| (PID) Process: | (6592) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\GoogleChromeEnterpriseBundle64.zip | |||
| (PID) Process: | (6592) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\streetfighterchampioneditionmodapk10.7z | |||
| (PID) Process: | (6592) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\AppData\Local\Temp\Rar$DIa6496.25011\675.7z | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 6496 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DIa6496.25011\675.7z | — | |
MD5:— | SHA256:— | |||
| 6592 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRb6592.25950\appFile.exe | — | |
MD5:— | SHA256:— | |||
| 1884 | appFile.exe | C:\Users\admin\AppData\Local\Temp\Studied | binary | |
MD5:94DE7AA90AEB275DBDB8D6008DB714C2 | SHA256:94254CF2FAA6D7A4FAF0DA538AABA447248EFD7F3A09C4B57A617598262BEA03 | |||
| 1884 | appFile.exe | C:\Users\admin\AppData\Local\Temp\Expectations | binary | |
MD5:9A81EF0267A24CFAED899700185A0220 | SHA256:6A581593533463D5EB392A1407EC687BF458090F153FABB7B7459E50477E049D | |||
| 1884 | appFile.exe | C:\Users\admin\AppData\Local\Temp\Lauren | binary | |
MD5:B4B4CE8BFDB6AB313434FFAEA1E24098 | SHA256:520B89AAADE3A3FD174D36CACECCC493DE8D92AE0494EB635C04933FE4E86BE6 | |||
| 1884 | appFile.exe | C:\Users\admin\AppData\Local\Temp\Continuously | binary | |
MD5:F54EB0E54B777D12F3DEEDF2FED342CF | SHA256:6F390507CEB8701E7304678174BD9B9BE07BC4FC2106E961EA9574D896313603 | |||
| 1884 | appFile.exe | C:\Users\admin\AppData\Local\Temp\Chorus | binary | |
MD5:F446E0BACEFA10F6003888C9088F0BFB | SHA256:5B61C5A176F61B4AE0A291D53CBFC41266CA8D7A74CCDF769C001852903340D7 | |||
| 1884 | appFile.exe | C:\Users\admin\AppData\Local\Temp\Learn | binary | |
MD5:DCC58514C1D78F1012CB469955D72E05 | SHA256:8ACF684697C0A9CBEEC5FE4FED3BDB513051FC79CEC6B860A0B086DE2FCFD63D | |||
| 1884 | appFile.exe | C:\Users\admin\AppData\Local\Temp\Flags | binary | |
MD5:FEAE943CBD3156CC8FCA5D83053163AB | SHA256:A8189BCC025BD66585170F659B6ED05A77C86B718C5E64AA2EBDFE0DC9F09E5C | |||
| 1884 | appFile.exe | C:\Users\admin\AppData\Local\Temp\Reflected | binary | |
MD5:D01B20D06CAF95D4AEABE3F6FAE033E2 | SHA256:EA41B712818D30FDF3782C348135865A956D9990D5DE48CB31EAF8804D7F27D4 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
5376 | svchost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
6176 | svchost.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
6800 | SIHClient.exe | GET | 200 | 2.17.245.133:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
6872 | Fbi.pif | HEAD | 200 | 194.116.215.195:80 | http://194.116.215.195/File.exe | unknown | — | — | unknown |
6872 | Fbi.pif | POST | 200 | 45.91.200.135:80 | http://45.91.200.135/api/wp-admin.php | unknown | — | — | unknown |
6800 | SIHClient.exe | GET | 200 | 2.17.245.133:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
6872 | Fbi.pif | HEAD | 404 | 179.43.188.227:80 | http://240922164748184.tyr.zont16.com/f/fikbam0922184.exe | unknown | — | — | unknown |
6872 | Fbi.pif | HEAD | 200 | 147.45.44.104:80 | http://147.45.44.104/revada/66f16eabb7054_ttt.exe#rrr | unknown | — | — | suspicious |
6872 | Fbi.pif | POST | 200 | 45.91.200.135:80 | http://45.91.200.135/api/wp-admin.php | unknown | — | — | unknown |
6872 | Fbi.pif | GET | 200 | 45.91.200.135:80 | http://45.91.200.135/api/wp-ping.php | unknown | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
6176 | svchost.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4044 | RUXIMICS.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
2120 | MoUsoCoreWorker.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 20.42.65.88:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | US | unknown |
— | — | 92.123.104.9:443 | — | Akamai International B.V. | DE | unknown |
3888 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
6176 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
6176 | svchost.exe | 95.101.149.131:80 | www.microsoft.com | Akamai International B.V. | NL | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
VPIsLXYpbVZEi.VPIsLXYpbVZEi |
| unknown |
nexusrules.officeapps.live.com |
| whitelisted |
api64.ipify.org |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
2256 | svchost.exe | Misc activity | ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup |
6872 | Fbi.pif | Misc activity | ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI |
6872 | Fbi.pif | Device Retrieving External IP Address Detected | ET POLICY External IP Lookup SSL Cert Observed (ipinfo .io) |
6872 | Fbi.pif | Device Retrieving External IP Address Detected | ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io) |
2256 | svchost.exe | Device Retrieving External IP Address Detected | ET INFO External IP Lookup Domain in DNS Lookup (ipinfo .io) |
6872 | Fbi.pif | A Network Trojan was detected | LOADER [ANY.RUN] PrivateLoader Check-in |
6872 | Fbi.pif | A Network Trojan was detected | LOADER [ANY.RUN] PrivateLoader Check-in |
6872 | Fbi.pif | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
6872 | Fbi.pif | Potentially Bad Traffic | ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile |
6872 | Fbi.pif | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
Process | Message |
|---|---|
z70byU47OReWCAPhaCCsQeQ4.exe |
%s------------------------------------------------
--- Themida Professional ---
--- (c)2012 Oreans Technologies ---
------------------------------------------------
|
axplong.exe |
%s------------------------------------------------
--- Themida Professional ---
--- (c)2012 Oreans Technologies ---
------------------------------------------------
|