| File name: | streetfighterchampioneditionmodapk10.7z |
| Full analysis: | https://app.any.run/tasks/9aa73338-574f-4709-a641-bc31c6685dd0 |
| Verdict: | Malicious activity |
| Threats: | Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks. |
| Analysis date: | September 23, 2024, 21:20:28 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-7z-compressed |
| File info: | 7-zip archive data, version 0.4 |
| MD5: | 42C5B96710B44E6633B29931BCD007DD |
| SHA1: | EA28EA5598EACBF76F7343FE5211AF6C639FE7E9 |
| SHA256: | 8ECA52205588A09366DEC52820CBC53EEDC1C7F019199AEB79C844BB3BA3DC80 |
| SSDEEP: | 98304:h6yGCEOOtJi4L1ZNMgkvTAT7zyPufnJdPrkBJiWcQWeGWss234B10YgWx23UfDmc:ejvFmt2H/UkxWAMKzktjH9d |
| .7z | | | 7-Zip compressed archive (v0.4) (57.1) |
|---|---|---|
| .7z | | | 7-Zip compressed archive (gen) (42.8) |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 32 | C:\Users\admin\Documents\iofolko5\JxqyWseDoMtfooURak7ZGdG9.exe | C:\Users\admin\Documents\iofolko5\JxqyWseDoMtfooURak7ZGdG9.exe | Fbi.pif | ||||||||||||
User: admin Company: V7sYNJPJiw0OZ Integrity Level: HIGH Description: BotClient Exit code: 0 Version: 3.9.2.3 Modules
| |||||||||||||||
| 368 | "C:\Users\admin\AppData\Local\Temp\service123.exe" | C:\Users\admin\AppData\Local\Temp\service123.exe | _OKL_rdYhkp6NL8Y3h7cLxYv.exe | ||||||||||||
User: admin Integrity Level: HIGH | |||||||||||||||
| 644 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | adminAFBKKFBAEG.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 736 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | sc.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 936 | "C:\ProgramData\JEHIJDGIEB.exe" | C:\ProgramData\JEHIJDGIEB.exe | — | RegAsm.exe | |||||||||||
User: admin Company: Production subsumption Integrity Level: HIGH Description: protestations wonk separationist Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
| 1128 | findstr /V "RenderingAnywhereBedfordRemained" Studied | C:\Windows\SysWOW64\findstr.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Find String (QGREP) Utility Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1236 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | schtasks.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1332 | "C:\Users\admin\AppData\Local\Nikkitos Screen Recorder\nikkitosscreenrecorder32_64.exe" -i | C:\Users\admin\AppData\Local\Nikkitos Screen Recorder\nikkitosscreenrecorder32_64.exe | A2NAbIXy9Z6yruVmQGAlV1pf.tmp | ||||||||||||
User: admin Company: DX Software Integrity Level: HIGH Description: DX Media Station Version: 2.4.9.23 Modules
| |||||||||||||||
| 1344 | tasklist | C:\Windows\SysWOW64\tasklist.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Lists the current running tasks Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1384 | schtasks /create /f /RU "admin" /tr "C:\ProgramData\jewkkwnf\jewkkwnf.exe" /tn "jewkkwnf LG" /sc ONLOGON /rl HIGHEST | C:\Windows\SysWOW64\schtasks.exe | — | JxqyWseDoMtfooURak7ZGdG9.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Task Scheduler Configuration Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (6496) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\GoogleChromeEnterpriseBundle64.zip | |||
| (PID) Process: | (6496) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\Desktop\streetfighterchampioneditionmodapk10.7z | |||
| (PID) Process: | (6496) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (6496) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (6496) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (6496) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
| (PID) Process: | (6592) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface |
| Operation: | write | Name: | ShowPassword |
Value: 0 | |||
| (PID) Process: | (6592) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\GoogleChromeEnterpriseBundle64.zip | |||
| (PID) Process: | (6592) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\streetfighterchampioneditionmodapk10.7z | |||
| (PID) Process: | (6592) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\AppData\Local\Temp\Rar$DIa6496.25011\675.7z | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 6496 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DIa6496.25011\675.7z | — | |
MD5:— | SHA256:— | |||
| 6592 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRb6592.25950\appFile.exe | — | |
MD5:— | SHA256:— | |||
| 1884 | appFile.exe | C:\Users\admin\AppData\Local\Temp\Expectations | binary | |
MD5:9A81EF0267A24CFAED899700185A0220 | SHA256:6A581593533463D5EB392A1407EC687BF458090F153FABB7B7459E50477E049D | |||
| 1884 | appFile.exe | C:\Users\admin\AppData\Local\Temp\Zambia | binary | |
MD5:5339AF8EE98AF8DE4C907103C6F1CF2A | SHA256:CCAB2A6EEFC99785E43A1DBF290B7A52F889F8745248152FB0FF4DC3903D0088 | |||
| 1884 | appFile.exe | C:\Users\admin\AppData\Local\Temp\Continuously | binary | |
MD5:F54EB0E54B777D12F3DEEDF2FED342CF | SHA256:6F390507CEB8701E7304678174BD9B9BE07BC4FC2106E961EA9574D896313603 | |||
| 1884 | appFile.exe | C:\Users\admin\AppData\Local\Temp\Chorus | binary | |
MD5:F446E0BACEFA10F6003888C9088F0BFB | SHA256:5B61C5A176F61B4AE0A291D53CBFC41266CA8D7A74CCDF769C001852903340D7 | |||
| 1884 | appFile.exe | C:\Users\admin\AppData\Local\Temp\Lauren | binary | |
MD5:B4B4CE8BFDB6AB313434FFAEA1E24098 | SHA256:520B89AAADE3A3FD174D36CACECCC493DE8D92AE0494EB635C04933FE4E86BE6 | |||
| 1884 | appFile.exe | C:\Users\admin\AppData\Local\Temp\Mount | binary | |
MD5:61CE53ED0BCD00CA81B748F3A9D2DD31 | SHA256:FF51DDE1024AB23B302731E6A688B1D93920B91D80E87560D5E712BD63348BC5 | |||
| 1884 | appFile.exe | C:\Users\admin\AppData\Local\Temp\Nike | binary | |
MD5:D9BA90A37C209BD4E27FC278F915C075 | SHA256:6BC61F85F151377A024C5365C59D63CACB3FB283949721BEAB144D982836DFBA | |||
| 1884 | appFile.exe | C:\Users\admin\AppData\Local\Temp\Medium | binary | |
MD5:A1B6F4EA4B016C08504D2A19D28FF258 | SHA256:43AB7BD76680B5B2CBDCF2FA0B416A1E77E8FB2ACCAC1A24AC838477DCFEA86F | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
5376 | svchost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
6176 | svchost.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
6872 | Fbi.pif | POST | 200 | 45.91.200.135:80 | http://45.91.200.135/api/wp-admin.php | unknown | — | — | unknown |
6872 | Fbi.pif | POST | 200 | 45.91.200.135:80 | http://45.91.200.135/api/wp-admin.php | unknown | — | — | unknown |
6872 | Fbi.pif | HEAD | 200 | 147.45.44.104:80 | http://147.45.44.104/revada/66f16eabb7054_ttt.exe#rrr | unknown | — | — | suspicious |
6872 | Fbi.pif | HEAD | 200 | 147.45.44.104:80 | http://147.45.44.104/lopsa/66f18e5598f87_kaloa.exe | unknown | — | — | suspicious |
6872 | Fbi.pif | HEAD | 200 | 194.116.215.195:80 | http://194.116.215.195/File.exe | unknown | — | — | unknown |
6872 | Fbi.pif | HEAD | 200 | 176.111.174.109:80 | http://176.111.174.109/kurwa | unknown | — | — | unknown |
6872 | Fbi.pif | HEAD | 200 | 147.45.45.69:80 | http://147.45.45.69/vdshdf.exe | unknown | — | — | unknown |
6872 | Fbi.pif | HEAD | 404 | 179.43.188.227:80 | http://240922164748184.tyr.zont16.com/f/fikbam0922184.exe | unknown | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
6176 | svchost.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4044 | RUXIMICS.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
2120 | MoUsoCoreWorker.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 20.42.65.88:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | US | unknown |
— | — | 92.123.104.9:443 | — | Akamai International B.V. | DE | unknown |
3888 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
6176 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
6176 | svchost.exe | 95.101.149.131:80 | www.microsoft.com | Akamai International B.V. | NL | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
VPIsLXYpbVZEi.VPIsLXYpbVZEi |
| unknown |
nexusrules.officeapps.live.com |
| whitelisted |
api64.ipify.org |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
2256 | svchost.exe | Misc activity | ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup |
6872 | Fbi.pif | Misc activity | ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI |
6872 | Fbi.pif | Device Retrieving External IP Address Detected | ET POLICY External IP Lookup SSL Cert Observed (ipinfo .io) |
6872 | Fbi.pif | Device Retrieving External IP Address Detected | ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io) |
2256 | svchost.exe | Device Retrieving External IP Address Detected | ET INFO External IP Lookup Domain in DNS Lookup (ipinfo .io) |
6872 | Fbi.pif | A Network Trojan was detected | LOADER [ANY.RUN] PrivateLoader Check-in |
6872 | Fbi.pif | A Network Trojan was detected | LOADER [ANY.RUN] PrivateLoader Check-in |
6872 | Fbi.pif | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
6872 | Fbi.pif | Potentially Bad Traffic | ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile |
6872 | Fbi.pif | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
Process | Message |
|---|---|
z70byU47OReWCAPhaCCsQeQ4.exe |
%s------------------------------------------------
--- Themida Professional ---
--- (c)2012 Oreans Technologies ---
------------------------------------------------
|
axplong.exe |
%s------------------------------------------------
--- Themida Professional ---
--- (c)2012 Oreans Technologies ---
------------------------------------------------
|