| File name: | efa4cd8325e4546ab260ea774d4acc23 |
| Full analysis: | https://app.any.run/tasks/a66f7773-7fa8-43e9-97da-ee6eb64f33f4 |
| Verdict: | Malicious activity |
| Threats: | Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks. |
| Analysis date: | November 03, 2023, 11:36:22 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | EFA4CD8325E4546AB260EA774D4ACC23 |
| SHA1: | DD1F1879F2C365C92F0B03700443DA0C1615E92A |
| SHA256: | B13A57C400F6768B5D11C671DFA94414C1C1130F840575A19FF15121A0CD3C3A |
| SSDEEP: | 49152:6LnemIrLQ0l8SKLQ2dTLT7/CJjImMZYqRDMsUeF13VQ5RbYQ+uqsk9oz+V/h9ovt:en2nl8SKc2lLv1mMzllVXU9t+psk9oSS |
| .exe | | | Win32 Executable MS Visual C++ (generic) (42.2) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (37.3) |
| .dll | | | Win32 Dynamic Link Library (generic) (8.8) |
| .exe | | | Win32 Executable (generic) (6) |
| .exe | | | Generic Win/DOS Executable (2.7) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2022:05:25 00:49:06+02:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 14.13 |
| CodeSize: | 25600 |
| InitializedDataSize: | 1576960 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x6a60 |
| OSVersion: | 10 |
| ImageVersion: | 10 |
| SubsystemVersion: | 6 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 11.0.17763.1 |
| ProductVersionNumber: | 11.0.17763.1 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Windows NT 32-bit |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | English (U.S.) |
| CharacterSet: | Unicode |
| CompanyName: | Microsoft Corporation |
| FileDescription: | Win32 Cabinet Self-Extractor |
| FileVersion: | 11.00.17763.1 (WinBuild.160101.0800) |
| InternalName: | Wextract |
| LegalCopyright: | © Microsoft Corporation. All rights reserved. |
| OriginalFileName: | WEXTRACT.EXE .MUI |
| ProductName: | Internet Explorer |
| ProductVersion: | 11.00.17763.1 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 364 | C:\Users\admin\AppData\Local\Temp\IXP001.TMP\6Yu0yv6.exe | C:\Users\admin\AppData\Local\Temp\IXP001.TMP\6Yu0yv6.exe | aH9RJ51.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 1 Modules
| |||||||||||||||
| 584 | C:\Users\admin\AppData\Local\Temp\IXP005.TMP\1hM21tr6.exe | C:\Users\admin\AppData\Local\Temp\IXP005.TMP\1hM21tr6.exe | — | Bw6ym19.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 776 | "C:\Program Files\Internet Explorer\iexplore.exe" https://steamcommunity.com/openid/loginform/ | C:\Program Files\Internet Explorer\iexplore.exe | cmd.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Internet Explorer Exit code: 0 Version: 11.00.9600.16428 (winblue_gdr.131013-1700) Modules
| |||||||||||||||
| 848 | C:\Users\admin\AppData\Local\Temp\IXP004.TMP\3VX66MT.exe | C:\Users\admin\AppData\Local\Temp\IXP004.TMP\3VX66MT.exe | — | Ma7jE31.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 1160 | "C:\Program Files\Internet Explorer\iexplore.exe" https://accounts.google.com/ | C:\Program Files\Internet Explorer\iexplore.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Internet Explorer Exit code: 0 Version: 11.00.9600.16428 (winblue_gdr.131013-1700) Modules
| |||||||||||||||
| 1532 | C:\Users\admin\AppData\Local\Temp\IXP004.TMP\Bw6ym19.exe | C:\Users\admin\AppData\Local\Temp\IXP004.TMP\Bw6ym19.exe | — | Ma7jE31.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Win32 Cabinet Self-Extractor Exit code: 0 Version: 11.00.17763.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1560 | "C:\Program Files\Internet Explorer\iexplore.exe" https://store.steampowered.com/login/ | C:\Program Files\Internet Explorer\iexplore.exe | cmd.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Internet Explorer Exit code: 0 Version: 11.00.9600.16428 (winblue_gdr.131013-1700) Modules
| |||||||||||||||
| 1788 | CACLS "..\fefffe8cea" /P "admin:R" /E | C:\Windows\SysWOW64\cacls.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Control ACLs Program Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1844 | CACLS "explothe.exe" /P "admin:R" /E | C:\Windows\SysWOW64\cacls.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Control ACLs Program Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1944 | C:\Windows\Explorer.EXE | C:\Windows\explorer.exe | — | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| (PID) Process: | (1944) explorer.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0 |
| Operation: | write | Name: | CheckSetting |
Value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| |||
| (PID) Process: | (2732) AppLaunch.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (2732) AppLaunch.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (2732) AppLaunch.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
| Operation: | write | Name: | ProxyEnable |
Value: 0 | |||
| (PID) Process: | (2732) AppLaunch.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections |
| Operation: | write | Name: | SavedLegacySettings |
Value: 46000000C1000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
| (PID) Process: | (1944) explorer.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\156\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (2280) 5hN7oa1.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (2280) 5hN7oa1.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (2280) 5hN7oa1.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (2280) 5hN7oa1.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2600 | aH9RJ51.exe | C:\Users\admin\AppData\Local\Temp\IXP001.TMP\Ji0Pj27.exe | executable | |
MD5:1CD90FB9375FB2205C7E36B6B645F39B | SHA256:33DCB3FAE55DF01C19200C60C8D424E19A25889CE639E06A040A4DE8888351ED | |||
| 2584 | efa4cd8325e4546ab260ea774d4acc23.exe | C:\Users\admin\AppData\Local\Temp\IXP000.TMP\aH9RJ51.exe | executable | |
MD5:0CF45C2D5822875C8FA0FB131BD72C95 | SHA256:800CDD9F0B87D50E9C41E3A26121E3D6EF9FFB570EF24D90DA1EFD785C32E225 | |||
| 2520 | ct6Iv81.exe | C:\Users\admin\AppData\Local\Temp\IXP003.TMP\Ma7jE31.exe | executable | |
MD5:D5D6BE6AB582CC557309B0A200090D8B | SHA256:11E3D2237B5BCC602863776422A9F79121EE251754130307B75025DBF040B201 | |||
| 2348 | Ma7jE31.exe | C:\Users\admin\AppData\Local\Temp\IXP004.TMP\3VX66MT.exe | executable | |
MD5:E9AD50B051131C3628CA79E199F814F9 | SHA256:93476B5EAC68FC42419E8ECC11E6A4B2C38E1A5EB0B4A774C4A32E17D3954082 | |||
| 2584 | efa4cd8325e4546ab260ea774d4acc23.exe | C:\Users\admin\AppData\Local\Temp\IXP000.TMP\7nk6sX99.exe | executable | |
MD5:0BB618B2E6FBF795A92999757A0B1F67 | SHA256:FA3935773AD5D735782E9958E09BCE6D79C73221879AE928657ADE6A69156AF0 | |||
| 2944 | Ji0Pj27.exe | C:\Users\admin\AppData\Local\Temp\IXP002.TMP\5hN7oa1.exe | executable | |
MD5:0D2734A7C08F90B55C8FD59E04F0DE2B | SHA256:5961ACC483022B942535F3CBEB957EDF2AE50C6A0913DF48B55CF904CBE099F4 | |||
| 1532 | Bw6ym19.exe | C:\Users\admin\AppData\Local\Temp\IXP005.TMP\1hM21tr6.exe | executable | |
MD5:5F0632D60D00F8F6AB677EE7F8727416 | SHA256:7247D13084EEA57E8D80D6FDB483BB8EC4AD8A96C846E9C1193390829DAEB08D | |||
| 2348 | Ma7jE31.exe | C:\Users\admin\AppData\Local\Temp\IXP004.TMP\Bw6ym19.exe | executable | |
MD5:9B54369085A8853EB58359D2DBCF8B15 | SHA256:47242A710C483418C6F5A45F4505F7F08D48F069D0FCA08008E7FE9690F1C76B | |||
| 2600 | aH9RJ51.exe | C:\Users\admin\AppData\Local\Temp\IXP001.TMP\6Yu0yv6.exe | executable | |
MD5:62EF5C5C97DAEF81B39B2E7800092028 | SHA256:7EA20849A4997D0121AC7FC1F0B4B282C456AE65545CA7DC3CCF24166B31C214 | |||
| 2944 | Ji0Pj27.exe | C:\Users\admin\AppData\Local\Temp\IXP002.TMP\ct6Iv81.exe | executable | |
MD5:A89740E3C02B89F0A55A8BC3CEBAC218 | SHA256:7B66A49AE740200359446947C45C55F8EB2F551A0DDE4A44ACFA5776D47BB437 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2552 | explothe.exe | POST | 200 | 77.91.124.1:80 | http://77.91.124.1/theme/index.php | unknown | text | 6 b | unknown |
364 | 6Yu0yv6.exe | POST | 200 | 193.233.255.73:80 | http://193.233.255.73/loghub/master | unknown | text | 8 b | unknown |
2732 | AppLaunch.exe | POST | 200 | 193.233.255.73:80 | http://193.233.255.73/loghub/master | unknown | text | 8 b | unknown |
1944 | explorer.exe | POST | 404 | 77.91.68.29:80 | http://77.91.68.29/fks/ | unknown | binary | 7 b | unknown |
2552 | explothe.exe | GET | 200 | 77.91.124.1:80 | http://77.91.124.1/theme/Plugins/clip64.dll | unknown | executable | 89.0 Kb | unknown |
2552 | explothe.exe | GET | 404 | 77.91.124.1:80 | http://77.91.124.1/theme/Plugins/cred64.dll | unknown | html | 273 b | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1956 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
2732 | AppLaunch.exe | 193.233.255.73:80 | — | LLC Baxet | RU | malicious |
324 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
364 | 6Yu0yv6.exe | 193.233.255.73:80 | — | LLC Baxet | RU | malicious |
2904 | AppLaunch.exe | 77.91.124.86:19084 | — | Foton Telecom CJSC | RU | malicious |
2552 | explothe.exe | 77.91.124.1:80 | — | Foton Telecom CJSC | RU | unknown |
2264 | iexplore.exe | 157.240.0.35:443 | www.facebook.com | FACEBOOK | US | unknown |
2264 | iexplore.exe | 142.250.185.77:443 | accounts.google.com | GOOGLE | US | unknown |
Domain | IP | Reputation |
|---|---|---|
www.facebook.com |
| whitelisted |
accounts.google.com |
| shared |
www.gstatic.com |
| whitelisted |
store.steampowered.com |
| whitelisted |
fonts.gstatic.com |
| whitelisted |
twitter.com |
| whitelisted |
www.epicgames.com |
| whitelisted |
steamcommunity.com |
| whitelisted |
store.akamai.steamstatic.com |
| whitelisted |
www.google.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2732 | AppLaunch.exe | A Network Trojan was detected | ET MALWARE [ANY.RUN] Win32/Stealc Checkin (POST) |
2732 | AppLaunch.exe | A Network Trojan was detected | STEALER [ANY.RUN] Win32/Stealc (Check-In) |
2732 | AppLaunch.exe | Potentially Bad Traffic | ET HUNTING GENERIC SUSPICIOUS POST to Dotted Quad with Fake Browser 1 |
2904 | AppLaunch.exe | Potentially Bad Traffic | ET INFO Microsoft net.tcp Connection Initialization Activity |
2904 | AppLaunch.exe | A Network Trojan was detected | ET MALWARE Redline Stealer TCP CnC Activity |
2904 | AppLaunch.exe | A Network Trojan was detected | ET MALWARE [ANY.RUN] RedLine Stealer Related (MC-NMF Authorization) |
2904 | AppLaunch.exe | A Network Trojan was detected | ET MALWARE Redline Stealer TCP CnC - Id1Response |
2552 | explothe.exe | Malware Command and Control Activity Detected | ET MALWARE Amadey CnC Check-In |
2552 | explothe.exe | A Network Trojan was detected | AV TROJAN Agent.DHOA System Info Exfiltration |
2552 | explothe.exe | A Network Trojan was detected | ET MALWARE Win32/Amadey Bot Activity (POST) M2 |