| File name: | mtk.exe |
| Full analysis: | https://app.any.run/tasks/402c4286-c3db-4a4e-a659-3b527dfe9693 |
| Verdict: | Malicious activity |
| Threats: | Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks. |
| Analysis date: | October 25, 2023, 04:40:38 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32+ executable (console) x86-64, for MS Windows |
| MD5: | 0F9599D3DDF1E0C8F818D384EE8D0D19 |
| SHA1: | 2CA17AEF38DF0C00EFA49B4B448C5F8343725C2F |
| SHA256: | A98AEC4A39F5F5EE41280CB17D9B4B5E9BC1EEA2FB2FF0D7A962E2B74464D67C |
| SSDEEP: | 98304:YkiQ73BKa7wm47Q5oPHUBIcdffsJjkGZ/U1E1J1J1g1HtvEpoAdIo:o |
| .exe | | | Win64 Executable (generic) (87.3) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (6.3) |
| .exe | | | DOS Executable Generic (6.3) |
| MachineType: | AMD AMD64 |
|---|---|
| TimeStamp: | 2023:10:25 00:55:01+02:00 |
| ImageFileCharacteristics: | Executable, Large address aware |
| PEType: | PE32+ |
| LinkerVersion: | 14.37 |
| CodeSize: | 2556928 |
| InitializedDataSize: | 1432064 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x2659dc |
| OSVersion: | 6 |
| ImageVersion: | - |
| SubsystemVersion: | 6 |
| Subsystem: | Windows command line |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 288 | "C:\Users\admin\AppData\Local\Temp\.tmpxwuJp6\3f2781d44c71a2c0509173118dd97e5196db510a65c9f659dc2366fa315fe5e5.exe.exe" | C:\Users\admin\AppData\Local\Temp\.tmpxwuJp6\3f2781d44c71a2c0509173118dd97e5196db510a65c9f659dc2366fa315fe5e5.exe.exe | — | mtk.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 288 | "C:\Users\admin\AppData\Local\Temp\.tmpxwuJp6\a38df3ec8b9fe52a32860cf5756d2fe345badafd7e74466cd349eb32ba5cc339.exe.exe" | C:\Users\admin\AppData\Local\Temp\.tmpxwuJp6\a38df3ec8b9fe52a32860cf5756d2fe345badafd7e74466cd349eb32ba5cc339.exe.exe | mtk.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 | |||||||||||||||
| 364 | "C:\Users\admin\AppData\Local\Temp\.tmpxwuJp6\4bfe2216ee63657312af1b2507c8f2bf362fdf1d63c88faba397e880c2e39430.exe.exe" | C:\Users\admin\AppData\Local\Temp\.tmpxwuJp6\4bfe2216ee63657312af1b2507c8f2bf362fdf1d63c88faba397e880c2e39430.exe.exe | — | mtk.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 584 | "C:\Users\admin\AppData\Local\Temp\.tmpxwuJp6\50414f60d7e24d25f9ebb68f99d67a46e8b12458474ac503b6e0d0562075a985.exe.exe" | C:\Users\admin\AppData\Local\Temp\.tmpxwuJp6\50414f60d7e24d25f9ebb68f99d67a46e8b12458474ac503b6e0d0562075a985.exe.exe | — | mtk.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Help Service Exit code: 0 Version: 2, 0, 0, 2 Modules
| |||||||||||||||
| 648 | "net.exe" stop BackupExecJobEngine /y | C:\Windows\SysWOW64\net.exe | — | 5d40615701c48a122e44f831e7c8643d07765629a83b15d090587f469c77693d.exe.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Net Command Exit code: 2 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | |||||||||||||||
| 792 | "C:\Users\admin\AppData\Local\Temp\.tmpxwuJp6\07529fae9e74be81fd302d022603d9f0796b4b9120b0d6131f75d41b979bbca5.exe.exe" | C:\Users\admin\AppData\Local\Temp\.tmpxwuJp6\07529fae9e74be81fd302d022603d9f0796b4b9120b0d6131f75d41b979bbca5.exe.exe | — | mtk.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Help Service Exit code: 0 Version: 2, 0, 0, 2 Modules
| |||||||||||||||
| 844 | "C:\Users\admin\AppData\Local\Temp\.tmpxwuJp6\1002.exe.exe" | C:\Users\admin\AppData\Local\Temp\.tmpxwuJp6\1002.exe.exe | — | mtk.exe | |||||||||||
User: admin Integrity Level: MEDIUM Description: Microsoft Windows Auto Update Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
| 920 | "net.exe" stop ccEvtMgr /y | C:\Windows\SysWOW64\net.exe | — | 5d40615701c48a122e44f831e7c8643d07765629a83b15d090587f469c77693d.exe.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Net Command Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | |||||||||||||||
| 936 | "C:\Users\admin\AppData\Local\Temp\.tmpxwuJp6\2a3b92f6180367306d750e59c9b6446b.exe.exe" | C:\Users\admin\AppData\Local\Temp\.tmpxwuJp6\2a3b92f6180367306d750e59c9b6446b.exe.exe | — | mtk.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 944 | "C:\Users\admin\AppData\Local\Temp\0442cfabb3212644c4b894a7e4a7e84c00fd23489cc4f96490f9988e6074b6ab.exe.exe" "runas" | C:\Users\admin\AppData\Local\Temp\0442cfabb3212644c4b894a7e4a7e84c00fd23489cc4f96490f9988e6074b6ab.exe.exe | 0442cfabb3212644c4b894a7e4a7e84c00fd23489cc4f96490f9988e6074b6ab.exe.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| (PID) Process: | (2968) mtk.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\156\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (3116) utilview.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
| Operation: | write | Name: | ProxyEnable |
Value: 0 | |||
| (PID) Process: | (3116) utilview.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections |
| Operation: | write | Name: | SavedLegacySettings |
Value: 46000000C4000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
| (PID) Process: | (3116) utilview.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (3116) utilview.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (3116) utilview.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (3116) utilview.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (3116) utilview.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (3116) utilview.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (936) 2a3b92f6180367306d750e59c9b6446b.exe.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2968 | mtk.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506 | compressed | |
MD5:F3441B8572AAE8801C04F3060B550443 | SHA256:6720349E7D82EE0A8E73920D3C2B7CB2912D9FCF2EDB6FD98F2F12820158B0BF | |||
| 2968 | mtk.exe | C:\Users\admin\AppData\Local\Temp\.tmpxwuJp6\0008065861f5b09195e51add72dacd3c4bbce6444711320ad349c7dab5bb97fb.exe.exe | executable | |
MD5:D2074D6273F41C34E8BA370AA9AF46AD | SHA256:0008065861F5B09195E51ADD72DACD3C4BBCE6444711320AD349C7DAB5BB97FB | |||
| 2968 | mtk.exe | C:\Users\admin\AppData\Local\Temp\.tmpxwuJp6\01259a104a0199b794b0c61fcfc657eb766b2caeae68d5c6b164a53a97874257.exe.exe | executable | |
MD5:460B288A581CDEB5F831D102CB6D198B | SHA256:01259A104A0199B794B0C61FCFC657EB766B2CAEAE68D5C6B164A53A97874257 | |||
| 2968 | mtk.exe | C:\Users\admin\AppData\Local\Temp\.tmpxwuJp6\0dc2ab0ccf783fb39028326a7e8b0ba4eaa148020ec05fc26313ef2bf70f700f.exe.exe | executable | |
MD5:77B645EF1C599F289F3D462A09048C49 | SHA256:0DC2AB0CCF783FB39028326A7E8B0BA4EAA148020EC05FC26313EF2BF70F700F | |||
| 2968 | mtk.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506 | binary | |
MD5:66C453D6F621E00862BFEA1C1CA91172 | SHA256:AAD4E2012DF849FE47881C67DCBA41AE8A721985883B94CA01C0A7FEB347A8DB | |||
| 2968 | mtk.exe | C:\Users\admin\AppData\Local\Temp\.tmpxwuJp6\027cc450ef5f8c5f653329641ec1fed9.exe.exe | executable | |
MD5:71B6A493388E7D0B40C83CE903BC6B04 | SHA256:027CC450EF5F8C5F653329641EC1FED91F694E0D229928963B30F6B0D7D3A745 | |||
| 2968 | mtk.exe | C:\Users\admin\AppData\Local\Temp\TarB736.tmp | cat | |
MD5:9441737383D21192400ECA82FDA910EC | SHA256:BC3A6E84E41FAEB57E7C21AA3B60C2A64777107009727C5B7C0ED8FE658909E5 | |||
| 2968 | mtk.exe | C:\Users\admin\AppData\Local\Temp\.tmpxwuJp6\0468127a19daf4c7bc41015c5640fe1f.exe.exe | executable | |
MD5:0468127A19DAF4C7BC41015C5640FE1F | SHA256:DD1792BCDF560EBAA633F72DE4037E78FE1ADA5C8694B9D4879554AEDC323AC9 | |||
| 2968 | mtk.exe | C:\Users\admin\AppData\Local\Temp\CabB735.tmp | compressed | |
MD5:F3441B8572AAE8801C04F3060B550443 | SHA256:6720349E7D82EE0A8E73920D3C2B7CB2912D9FCF2EDB6FD98F2F12820158B0BF | |||
| 2968 | mtk.exe | C:\Users\admin\AppData\Local\Temp\.tmpxwuJp6\0283c0f02307adc4ee46c0382df4b5d7b4eb80114fbaf5cb7fe5412f027d165e.exe.exe | executable | |
MD5:D7D6889BFA96724F7B3F951BC06E8C02 | SHA256:0283C0F02307ADC4EE46C0382DF4B5D7B4EB80114FBAF5CB7FE5412F027D165E | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2464 | gbudn.exe | GET | 404 | 188.40.187.155:80 | http://mynexa.io/hfv23svj2/plugins/cred.dll | unknown | — | — | unknown |
2464 | gbudn.exe | GET | 404 | 188.40.187.155:80 | http://mynexa.io/hfv23svj2/plugins/scr.dll | unknown | — | — | unknown |
— | — | GET | 301 | 13.107.213.64:80 | http://api.nuget.org/packages/taskscheduler.2.5.23.nupkg | unknown | — | — | unknown |
— | — | GET | 301 | 13.107.213.64:80 | http://api.nuget.org/packages/sharpziplib.0.86.0.nupkg | unknown | — | — | unknown |
2968 | mtk.exe | GET | 200 | 178.79.242.0:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?24558d65c4ee8523 | unknown | compressed | 61.6 Kb | unknown |
3116 | utilview.exe | GET | 200 | 158.101.44.242:80 | http://checkip.dyndns.org/ | unknown | html | 105 b | unknown |
— | — | GET | 200 | 158.101.44.242:80 | http://checkip.dyndns.org/ | unknown | html | 105 b | unknown |
3804 | 40accff9b9d71053d4d6f95e6efd7eca1bb1ef5af77c319fe5a4b429eb373990.exe.exe | GET | 302 | 3.33.130.190:80 | http://hementuttur.com/docs/book1.pdf | unknown | html | 142 b | unknown |
2772 | 75b30164a31d305f47f2c3c2121432e6d7b316cfb3deb6b39f78180168bc9472.exe.exe | GET | 404 | 123.57.60.215:80 | http://123.57.60.215/DotNetLoader40.exe | unknown | text | 19 b | unknown |
3116 | utilview.exe | GET | 301 | 13.56.33.8:80 | http://yumproject.com/wp-content/uploads/2014/11/questd.pdf | unknown | html | 175 b | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
1956 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
324 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
2968 | mtk.exe | 45.67.85.72:443 | m.crep.vip | — | US | unknown |
2968 | mtk.exe | 178.79.242.0:80 | ctldl.windowsupdate.com | LLNW | DE | whitelisted |
— | — | 58.158.177.102:443 | flash-update.buyonebuy.top | ARTERIA Networks Corporation | JP | unknown |
— | — | 193.135.12.107:80 | — | LLC Baxet | RU | unknown |
— | — | 158.101.44.242:80 | checkip.dyndns.org | ORACLE-BMC-31898 | US | unknown |
— | — | 141.105.141.87:13982 | — | Everest Tv And Radio Company LLC | UA | unknown |
Domain | IP | Reputation |
|---|---|---|
m.crep.vip |
| unknown |
ctldl.windowsupdate.com |
| whitelisted |
flash-update.buyonebuy.top |
| unknown |
checkip.dyndns.org |
| shared |
exusin.ru |
| unknown |
www.microsoft.com |
| whitelisted |
www.google.com |
| whitelisted |
imagisp.ru |
| unknown |
mynexa.io |
| unknown |
7tno4hib47vlep5o.tor2web.org |
| malicious |
PID | Process | Class | Message |
|---|---|---|---|
— | — | Potentially Bad Traffic | ET DNS Query to a *.top domain - Likely Hostile |
324 | svchost.exe | Device Retrieving External IP Address Detected | ET INFO External IP Lookup Domain in DNS Query (checkip .dyndns .org) |
324 | svchost.exe | Misc activity | AV INFO Query to checkip.dyndns. Domain |
— | — | A Network Trojan was detected | ET MALWARE Common Upatre Header Structure 2 |
— | — | A Network Trojan was detected | ET MALWARE Mazilla Suspicious User-Agent Jan 15 2015 |
— | — | Device Retrieving External IP Address Detected | ET POLICY External IP Lookup - checkip.dyndns.org |
— | — | Device Retrieving External IP Address Detected | ET MALWARE Upatre External IP Check |
3116 | utilview.exe | A Network Trojan was detected | ET MALWARE Common Upatre Header Structure 2 |
3116 | utilview.exe | A Network Trojan was detected | ET MALWARE Mazilla Suspicious User-Agent Jan 15 2015 |
3116 | utilview.exe | Device Retrieving External IP Address Detected | ET POLICY External IP Lookup - checkip.dyndns.org |
Process | Message |
|---|---|
7249b1a5082c9d9654d9fac3bb5e965ea23e395554d3351b77dd4f29677426fe.exe.exe | Script Error |
7249b1a5082c9d9654d9fac3bb5e965ea23e395554d3351b77dd4f29677426fe.exe.exe | Run OK |