| File name: | bd0e1d539cf4fb629c481cc8be1672f5.exe |
| Full analysis: | https://app.any.run/tasks/04749ff5-a3a9-47e8-bfd2-ee7d80a87334 |
| Verdict: | Malicious activity |
| Threats: | Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks. |
| Analysis date: | October 26, 2023, 22:46:26 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | BD0E1D539CF4FB629C481CC8BE1672F5 |
| SHA1: | F79F1F705065C2659A04F4CBDA422DBD261D5DD4 |
| SHA256: | A75A9DED208E0DE9A02823FD2D40B2163CB152869E67E5BFE08388204D7E6D6D |
| SSDEEP: | 49152:gLnemIu6vMUrzHjzVpX7mLmJaluzxPYUWFxWh8IAQbu/3FDuziND+MFXatKLShAD:cn2fvrr/7mOalDBzl8u9LNLXatjhAY0k |
| .exe | | | Win32 Executable MS Visual C++ (generic) (42.2) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (37.3) |
| .dll | | | Win32 Dynamic Link Library (generic) (8.8) |
| .exe | | | Win32 Executable (generic) (6) |
| .exe | | | Generic Win/DOS Executable (2.7) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2022:05:25 00:49:06+02:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 14.13 |
| CodeSize: | 25600 |
| InitializedDataSize: | 1594368 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x6a60 |
| OSVersion: | 10 |
| ImageVersion: | 10 |
| SubsystemVersion: | 6 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 11.0.17763.1 |
| ProductVersionNumber: | 11.0.17763.1 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Windows NT 32-bit |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | English (U.S.) |
| CharacterSet: | Unicode |
| CompanyName: | Microsoft Corporation |
| FileDescription: | Win32 Cabinet Self-Extractor |
| FileVersion: | 11.00.17763.1 (WinBuild.160101.0800) |
| InternalName: | Wextract |
| LegalCopyright: | © Microsoft Corporation. All rights reserved. |
| OriginalFileName: | WEXTRACT.EXE .MUI |
| ProductName: | Internet Explorer |
| ProductVersion: | 11.00.17763.1 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 280 | C:\Users\admin\AppData\Local\Temp\fefffe8cea\explothe.exe | C:\Users\admin\AppData\Local\Temp\fefffe8cea\explothe.exe | — | taskeng.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 772 | "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2336 CREDAT:267521 /prefetch:2 | C:\Program Files (x86)\Internet Explorer\iexplore.exe | iexplore.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Internet Explorer Exit code: 0 Version: 11.00.9600.16428 (winblue_gdr.131013-1700) Modules
| |||||||||||||||
| 848 | "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe | — | 1Uh56fE0.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft .NET ClickOnce Launch Utility Exit code: 0 Version: 4.7.2558.0 built by: NET471REL1 Modules
| |||||||||||||||
| 944 | C:\Users\admin\AppData\Local\Temp\IXP004.TMP\oN9QG66.exe | C:\Users\admin\AppData\Local\Temp\IXP004.TMP\oN9QG66.exe | — | hh3gd14.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Win32 Cabinet Self-Extractor Exit code: 0 Version: 11.00.17763.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 980 | CACLS "..\fefffe8cea" /P "admin:N" | C:\Windows\SysWOW64\cacls.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Control ACLs Program Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 988 | C:\Users\admin\AppData\Local\Temp\IXP002.TMP\5Wo0ra6.exe | C:\Users\admin\AppData\Local\Temp\IXP002.TMP\5Wo0ra6.exe | — | Ip6Sf70.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 992 | "C:\Users\admin\AppData\Local\Temp\bd0e1d539cf4fb629c481cc8be1672f5.exe" | C:\Users\admin\AppData\Local\Temp\bd0e1d539cf4fb629c481cc8be1672f5.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Win32 Cabinet Self-Extractor Exit code: 0 Version: 11.00.17763.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1072 | C:\Windows\system32\cmd.exe /S /D /c" echo Y" | C:\Windows\SysWOW64\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1176 | C:\Users\admin\AppData\Local\Temp\IXP005.TMP\1Uh56fE0.exe | C:\Users\admin\AppData\Local\Temp\IXP005.TMP\1Uh56fE0.exe | — | oN9QG66.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 1284 | "C:\Program Files\Internet Explorer\iexplore.exe" https://www.facebook.com/login | C:\Program Files\Internet Explorer\iexplore.exe | cmd.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Internet Explorer Exit code: 0 Version: 11.00.9600.16428 (winblue_gdr.131013-1700) Modules
| |||||||||||||||
| (PID) Process: | (1944) explorer.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{01979c6a-42fa-414c-b8aa-eee2c8202018}.check.100 |
| Operation: | write | Name: | CheckSetting |
Value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| |||
| (PID) Process: | (1944) explorer.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0 |
| Operation: | write | Name: | CheckSetting |
Value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| |||
| (PID) Process: | (2708) AppLaunch.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (2708) AppLaunch.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (2708) AppLaunch.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
| Operation: | write | Name: | ProxyEnable |
Value: 0 | |||
| (PID) Process: | (2708) AppLaunch.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections |
| Operation: | write | Name: | SavedLegacySettings |
Value: 46000000C1000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
| (PID) Process: | (1944) explorer.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\156\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (988) 5Wo0ra6.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (988) 5Wo0ra6.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (988) 5Wo0ra6.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2300 | Ip6Sf70.exe | C:\Users\admin\AppData\Local\Temp\IXP002.TMP\5Wo0ra6.exe | executable | |
MD5:647DE676B14474F2813D5A4686D476C7 | SHA256:3038A8735E2DEC2135A69F1B1CC396AE379AD45CA80A43D7CAE9EE5F25A19188 | |||
| 2064 | ai6iV30.exe | C:\Users\admin\AppData\Local\Temp\IXP001.TMP\6HD1BH3.exe | executable | |
MD5:D7AA1AEBDE8209C65E18E0D01EBB81FB | SHA256:6A90E2A35A863497BA3EB37163C55872676AEE5B66B21596F4C68454472AB7D8 | |||
| 944 | oN9QG66.exe | C:\Users\admin\AppData\Local\Temp\IXP005.TMP\2Wx0735.exe | executable | |
MD5:3BCE8F81C93107A73226C5748A827F60 | SHA256:5731659B2210A5253BAD70D175C5B6A456821E3287D2118910C9C8F40303F440 | |||
| 944 | oN9QG66.exe | C:\Users\admin\AppData\Local\Temp\IXP005.TMP\1Uh56fE0.exe | executable | |
MD5:843F01EA473576ABFC35FD818C39A286 | SHA256:DBE70CAAF474BA6775C6E4FC97AC9CF6DEE58D41FA1259F18BDE4E05D0298F05 | |||
| 2476 | hh3gd14.exe | C:\Users\admin\AppData\Local\Temp\IXP004.TMP\oN9QG66.exe | executable | |
MD5:5246AE164B931241F3C78FD100E84BB4 | SHA256:349F5881064DC65677DF0884B807CBADD583847D538D472B91EBEB2FF762073E | |||
| 2464 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\UJFUX3OG\iaGxcrtiWqg[1].css | text | |
MD5:B273FE801A9F2C93D14610E25D8B127B | SHA256:3E8FAE8108E77A67064E5A31DD05A9D5A81AA39AB0B3FCB750387EB69DF4AD91 | |||
| 2464 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\XLWA6BPE\yotEdcUw9Gj[1].css | text | |
MD5:3028BE8549D0256C7CA0DFB9ED82FD83 | SHA256:A77AABD09C9363B9A7E78221B1DFAA2F7F20D2C6B88F839C9118DB747044BFAD | |||
| 2472 | RN0aZ98.exe | C:\Users\admin\AppData\Local\Temp\IXP003.TMP\hh3gd14.exe | executable | |
MD5:EE7669F3629BD030332194BE97A7B743 | SHA256:16D4514D40FF3A5465158D0AF675FDDB1D5876B72C41747B268666C723C5D3F4 | |||
| 988 | 5Wo0ra6.exe | C:\Users\admin\AppData\Local\Temp\fefffe8cea\explothe.exe | executable | |
MD5:647DE676B14474F2813D5A4686D476C7 | SHA256:3038A8735E2DEC2135A69F1B1CC396AE379AD45CA80A43D7CAE9EE5F25A19188 | |||
| 2464 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\UJFUX3OG\js7_npiLBW4[1].css | text | |
MD5:0F7166C1B84259163BFAE021E3EF733A | SHA256:D4EA2354C408BBFD1C6721EDBC1AD40F283684956A5BF768FDA90F2EA9FD9870 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2116 | 6HD1BH3.exe | POST | 200 | 193.233.255.73:80 | http://193.233.255.73/loghub/master | unknown | text | 8 b | unknown |
2592 | explothe.exe | GET | 404 | 77.91.124.1:80 | http://77.91.124.1/theme/Plugins/cred64.dll | unknown | html | 273 b | unknown |
1944 | explorer.exe | POST | 404 | 77.91.68.29:80 | http://77.91.68.29/fks/ | unknown | binary | 7 b | unknown |
2592 | explothe.exe | GET | 200 | 77.91.124.1:80 | http://77.91.124.1/theme/Plugins/clip64.dll | unknown | executable | 89.0 Kb | unknown |
2592 | explothe.exe | POST | 200 | 77.91.124.1:80 | http://77.91.124.1/theme/index.php | unknown | text | 6 b | unknown |
2708 | AppLaunch.exe | POST | 200 | 193.233.255.73:80 | http://193.233.255.73/loghub/master | unknown | text | 8 b | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
324 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
1956 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
2708 | AppLaunch.exe | 193.233.255.73:80 | — | LLC Baxet | RU | malicious |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
2116 | 6HD1BH3.exe | 193.233.255.73:80 | — | LLC Baxet | RU | malicious |
2976 | AppLaunch.exe | 77.91.124.86:19084 | — | Foton Telecom CJSC | RU | malicious |
2464 | iexplore.exe | 157.240.253.35:443 | www.facebook.com | FACEBOOK | DE | unknown |
2592 | explothe.exe | 77.91.124.1:80 | — | Foton Telecom CJSC | RU | malicious |
2464 | iexplore.exe | 157.240.253.1:443 | static.xx.fbcdn.net | FACEBOOK | DE | unknown |
Domain | IP | Reputation |
|---|---|---|
www.facebook.com |
| whitelisted |
static.xx.fbcdn.net |
| whitelisted |
facebook.com |
| whitelisted |
fbcdn.net |
| whitelisted |
fbsbx.com |
| whitelisted |
accounts.google.com |
| shared |
www.youtube.com |
| whitelisted |
fonts.googleapis.com |
| whitelisted |
fonts.gstatic.com |
| whitelisted |
www.gstatic.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2708 | AppLaunch.exe | A Network Trojan was detected | ET MALWARE [ANY.RUN] Win32/Stealc Checkin (POST) |
2708 | AppLaunch.exe | A Network Trojan was detected | STEALER [ANY.RUN] Win32/Stealc (Check-In) |
2708 | AppLaunch.exe | Potentially Bad Traffic | ET HUNTING GENERIC SUSPICIOUS POST to Dotted Quad with Fake Browser 1 |
2116 | 6HD1BH3.exe | Potentially Bad Traffic | ET HUNTING GENERIC SUSPICIOUS POST to Dotted Quad with Fake Browser 1 |
2976 | AppLaunch.exe | Potentially Bad Traffic | ET INFO Microsoft net.tcp Connection Initialization Activity |
2976 | AppLaunch.exe | A Network Trojan was detected | ET MALWARE Redline Stealer TCP CnC Activity |
2976 | AppLaunch.exe | A Network Trojan was detected | ET MALWARE [ANY.RUN] RedLine Stealer Related (MC-NMF Authorization) |
2976 | AppLaunch.exe | A Network Trojan was detected | ET MALWARE Redline Stealer TCP CnC - Id1Response |
2592 | explothe.exe | A Network Trojan was detected | ET MALWARE Win32/Amadey Bot Activity (POST) M2 |
2592 | explothe.exe | Malware Command and Control Activity Detected | ET MALWARE Amadey CnC Check-In |