| File name: | AA_v3.exe |
| Full analysis: | https://app.any.run/tasks/5daf3285-e203-48ff-b910-243d77ffabc0 |
| Verdict: | Malicious activity |
| Threats: | Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks. |
| Analysis date: | December 25, 2024, 23:48:03 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive, 5 sections |
| MD5: | 3FA55A693BAE922AFE85688FA3A2FE9B |
| SHA1: | 45B1CFB8ED8A8FB6C2F05CD25C1023E307082F87 |
| SHA256: | 90BE232109392895DB0D0E0EA44300A546C190DA5C0C1DA39659A9701E16CEF9 |
| SSDEEP: | 98304:jJ8fZLihsTrX+VXwK2OobCygAi+WWd/6ykJaORJEvMN3iDEo4nUZEZvdXPDB+DvN:jOzfExPBB8k54ENo3p |
| .exe | | | Win32 Executable MS Visual C++ (generic) (67.4) |
|---|---|---|
| .dll | | | Win32 Dynamic Link Library (generic) (14.2) |
| .exe | | | Win32 Executable (generic) (9.7) |
| .exe | | | Generic Win/DOS Executable (4.3) |
| .exe | | | DOS Executable Generic (4.3) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2021:09:25 21:56:47+00:00 |
| ImageFileCharacteristics: | No relocs, Executable, No line numbers, No symbols, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 6 |
| CodeSize: | 26624 |
| InitializedDataSize: | 141824 |
| UninitializedDataSize: | 2048 |
| EntryPoint: | 0x3640 |
| OSVersion: | 4 |
| ImageVersion: | 6 |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 128 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 320 | C:\WINDOWS\system32\svchost.exe -k DcomLaunch -p -s LSM | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 376 | C:\WINDOWS\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s WdiSystemHost | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 684 | winlogon.exe | C:\Windows\System32\winlogon.exe | — | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Logon Application Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 760 | C:\WINDOWS\system32\lsass.exe | C:\Windows\System32\lsass.exe | wininit.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Local Security Authority Process Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 812 | C:\WINDOWS\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 912 | "dwm.exe" | C:\Windows\System32\dwm.exe | winlogon.exe | ||||||||||||
User: DWM-1 Company: Microsoft Corporation Integrity Level: SYSTEM Description: Desktop Window Manager Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1068 | C:\WINDOWS\system32\svchost.exe -k netsvcs -p -s gpsvc | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1076 | C:\WINDOWS\system32\svchost.exe -k netsvcs -p -s DsmSvc | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1144 | C:\WINDOWS\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows PowerShell Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (6460) AA_v3.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer |
| Operation: | write | Name: | SlowContextMenuEntries |
Value: 6024B221EA3A6910A2DC08002B30309D0A010000BD0E0C47735D584D9CEDE91E22E23282770100000114020000000000C0000000000000468D0000006078A409B011A54DAFA526D86198A780390100009AD298B2EDA6DE11BA8CA68E55D895936E000000 | |||
| (PID) Process: | (6460) AA_v3.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer |
| Operation: | write | Name: | SlowContextMenuEntries |
Value: 6024B221EA3A6910A2DC08002B30309D0A010000BD0E0C47735D584D9CEDE91E22E23282770100000114020000000000C0000000000000468D0000006078A409B011A54DAFA526D86198A7803901000010901EF8A46ECE11A7FF00AA003CA9F61D030000 | |||
| (PID) Process: | (1176) svchost.exe | Key: | HKEY_USERS\.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\Logs\02xqlfukoksyauhy |
| Operation: | write | Name: | Provision Wednesday, December 25, 2024 23:48:15 |
Value: AQAAANCMnd8BFdERjHoAwE/Cl+sBAAAAWRdTNVrr0USuwyEbtcyWIgAAAAACAAAAAAAQZgAAAAEAACAAAADYPka9SztJmIfCR2T+GiM9M+NvMElaXTNPDYDBxtddpQAAAAAOgAAAAAIAACAAAABKyUAj4s42SjhqGyV6PXp+lRj/NEgpQIsdlQmHgG0KbSAAAADIdtkQ6hg5GXBd4+E0CX9R+He9NLly0KaYe0qZB1X1A0AAAADMDeeBZr1qCpSw2Q6Ah3ErnC9yVq2Vgb8/W9dYampenhjrx46VM01N9cxx7kIxmYfu6W6uiPT7+oghm6byWCVq | |||
| (PID) Process: | (1176) svchost.exe | Key: | HKEY_USERS\.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-1693682860-607145093-2874071422-1001\02czcbpcfgaxmfdi |
| Operation: | write | Name: | AppIdList |
Value: | |||
| (PID) Process: | (1176) svchost.exe | Key: | HKEY_USERS\.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-1693682860-607145093-2874071422-1001\02czcbpcfgaxmfdi |
| Operation: | write | Name: | Reason |
Value: | |||
| (PID) Process: | (1176) svchost.exe | Key: | HKEY_USERS\.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-1693682860-607145093-2874071422-1001 |
| Operation: | write | Name: | ValidDeviceId |
Value: | |||
| (PID) Process: | (1176) svchost.exe | Key: | HKEY_USERS\.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\Logs\02pezsyflofvcogf |
| Operation: | write | Name: | Provision Wednesday, December 25, 2024 23:48:15 |
Value: AQAAANCMnd8BFdERjHoAwE/Cl+sBAAAAjGVohzrf7U+SR6PsI8h7nAAAAAACAAAAAAAQZgAAAAEAACAAAACwFnJkyiZPDtbl1nRvtsVd9GAvYbRkpu/Seu4bS0G+JgAAAAAOgAAAAAIAACAAAAA9D8qJgWhIHEc6YSAckwO9wMSIo8joYGhMqpvzZcMWsiAAAACIzDZmULfW+XbrIfNNeUy2fPjNpbO5pKCgxxL2UT0BG0AAAABX/jd458uhqqrRMtkJsxp4ANSIaTLOEpTVhM4lcyvtV+IhwLBvqXbzdotZL+4kBwJTUgGCZPWvOVV0BtKLGlWf | |||
| (PID) Process: | (1176) svchost.exe | Key: | HKEY_USERS\.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\Logs\02uegznpmkonbnuh |
| Operation: | write | Name: | Provision Wednesday, December 25, 2024 23:48:16 |
Value: AQAAANCMnd8BFdERjHoAwE/Cl+sBAAAAjGVohzrf7U+SR6PsI8h7nAAAAAACAAAAAAAQZgAAAAEAACAAAACNVtKkTB50oJHme8IpPLW2xIOZdKWGVXbaRrrAY9fKbAAAAAAOgAAAAAIAACAAAADF4r3HW1sJntY6hHnl0DLoMdcNdHMEFDUMoylbup0OjiAAAAC/Go43W7gXbrNHvwiN9JXQoeUUfbcTTlXU5dzIR1jcr0AAAADOsf8gDrgFca2l99abHl1e/erfMtKCXECSmTzHgfl8stcbc7W5KzDEKtPHvJKipwqIsI69PRIhm6fKyQP89zx1 | |||
| (PID) Process: | (2908) uhssvc.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Remediation\LocalState\TelemetryUpdateHealthTools |
| Operation: | write | Name: | GlobalEventCounter |
Value: 2F00000000000000 | |||
| (PID) Process: | (1340) svchost.exe | Key: | \REGISTRY\A\{b2aa6275-6d9e-e035-3b88-af7204c7627b}\Root\InventoryApplicationFile |
| Operation: | write | Name: | WritePermissionsCheck |
Value: 1 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 6460 | AA_v3.exe | C:\Users\admin\AppData\Local\Temp\nsm5CE9.tmp | — | |
MD5:— | SHA256:— | |||
| 1768 | svchost.exe | C:\Windows\Prefetch\TASKKILL.EXE-E0105477.pf | binary | |
MD5:399236CAFB15AF5580D110A909993B0E | SHA256:6E6D31D254844B07E8A82D550E62DC6227488CA2A80276C6FCA23E2A5FE72F1B | |||
| 6460 | AA_v3.exe | C:\Users\admin\AppData\Roaming\atom.exe | executable | |
MD5:4740C4872EA4EB37574CD8ABBAA5C9AC | SHA256:42A9B65063533C3DF03616AA3BA2C5BCF32947D9E520BA4E429ABE703F3D93A1 | |||
| 6532 | atom.exe | C:\ProgramData\{I7YFPHOU-L1LR-99FH-W9YJHBO4K8HY}\AA_v3.exe | executable | |
MD5:4740C4872EA4EB37574CD8ABBAA5C9AC | SHA256:42A9B65063533C3DF03616AA3BA2C5BCF32947D9E520BA4E429ABE703F3D93A1 | |||
| 1768 | svchost.exe | C:\Windows\Prefetch\CONSENT.EXE-531BD9EA.pf | binary | |
MD5:D4EB4AB23C68E009FA8BDF9C788A702F | SHA256:0850E7B367F1F3AFC3E3E2D077EA82FAAE6F5D29D11F6CE495CC3688DD068F0C | |||
| 6532 | atom.exe | C:\ProgramData\{I7YFPHOU-L1LR-99FH-W9YJHBO4K8HY}\AA_v3.exe:Zone.Identifier | text | |
MD5:9F22B5D78B010677142FFE4A66E02CB2 | SHA256:F0E0B1154B82AD66F9D3B1AA8CA4EAE94A138A55E17538392315EBF63D2C36FE | |||
| 1768 | svchost.exe | C:\Windows\Prefetch\SVCHOST.EXE-AD0331FB.pf | binary | |
MD5:8FA703DE118BF2504759E1FD32C5482F | SHA256:4F1A8DD77BED5AB61A81E2B447F7C218C37D749C2CDBDE309EFA138D25338EB0 | |||
| 1768 | svchost.exe | C:\Windows\Prefetch\SVCHOST.EXE-2E4E3AC7.pf | binary | |
MD5:0CF5C69E4DFB2965AD6839C6429AA413 | SHA256:32ED1F621A53EF4B40890F75F1BD8C682F3750418E000F03976B615A7A168C69 | |||
| 1276 | svchost.exe | C:\Windows\System32\Tasks\EMECL9G5J5CRT7SBTJ | xml | |
MD5:945A7A1D36DCBF5436EAE9A3DBC67337 | SHA256:B10562DC5C5337F2A134B505A1310F38615EDF7AB4D59E16E3A0834BF5E70E60 | |||
| 1768 | svchost.exe | C:\Windows\Prefetch\AA_V3.EXE-BF3E5AF8.pf | binary | |
MD5:22DC73532CB06DC5B20E4AB780045E2E | SHA256:C080A8B50E01309498B799C433286F421C26B54510981A6DEB4297DD9DB1CF31 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
— | — | GET | 200 | 23.48.23.156:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
5064 | SearchApp.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D | unknown | — | — | whitelisted |
1176 | svchost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
6992 | AA_v3.exe | GET | 200 | 69.192.161.44:80 | http://x1.c.lencr.org/ | unknown | — | — | whitelisted |
6992 | AA_v3.exe | GET | 200 | 184.24.77.54:80 | http://r11.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBQaUrm0WeTDM5ghfoZtS72KO9ZnzgQUCLkRO6XQhRi06g%2BgrZ%2BGHo78OCcCEgSfBEjCuhCXdl7Defz8ipA09g%3D%3D | unknown | — | — | whitelisted |
6992 | AA_v3.exe | GET | 301 | 136.243.18.118:80 | http://www.ammyy.com/files/v8/aans64y2.gz | unknown | — | — | malicious |
6912 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
5720 | backgroundTaskHost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D | unknown | — | — | whitelisted |
6912 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
6672 | AA_v3.exe | POST | 500 | 193.233.113.77:80 | http://silentlegion.duckdns.org/gate/config.php | unknown | — | — | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 192.168.100.255:137 | — | — | — | whitelisted |
4712 | MoUsoCoreWorker.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
2220 | svchost.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 23.48.23.156:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
— | — | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
5064 | SearchApp.exe | 104.126.37.131:443 | www.bing.com | Akamai International B.V. | DE | whitelisted |
5064 | SearchApp.exe | 192.229.221.95:80 | ocsp.digicert.com | EDGECAST | US | whitelisted |
1176 | svchost.exe | 20.190.159.4:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
www.bing.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
login.live.com |
| whitelisted |
go.microsoft.com |
| whitelisted |
rl.ammyy.com |
| unknown |
www.ammyy.com |
| malicious |
PID | Process | Class | Message |
|---|---|---|---|
6992 | AA_v3.exe | Potential Corporate Privacy Violation | ET POLICY IP Check (rl. ammyy. com) |
2192 | svchost.exe | A Network Trojan was detected | ET MALWARE DNS Query to SupremeBot Domain (silentlegion .duckdns .org) |
2192 | svchost.exe | Potentially Bad Traffic | ET INFO DYNAMIC_DNS Query to a *.duckdns .org Domain |
2192 | svchost.exe | Misc activity | ET INFO DYNAMIC_DNS Query to *.duckdns. Domain |
6672 | AA_v3.exe | Potentially Bad Traffic | ET INFO DYNAMIC_DNS HTTP Request to a *.duckdns .org Domain |
6672 | AA_v3.exe | Potentially Bad Traffic | ET INFO HTTP POST Request to DuckDNS Domain |
6672 | AA_v3.exe | Potentially Bad Traffic | ET INFO HTTP POST Request to DuckDNS Domain |
6672 | AA_v3.exe | Potentially Bad Traffic | ET INFO DYNAMIC_DNS HTTP Request to a *.duckdns .org Domain |
6672 | AA_v3.exe | Potentially Bad Traffic | ET INFO DYNAMIC_DNS HTTP Request to a *.duckdns .org Domain |
6672 | AA_v3.exe | Potentially Bad Traffic | ET INFO HTTP POST Request to DuckDNS Domain |