| File name: | SecuriteInfo.com.IL.Trojan.MSILZilla.30886.28966.14387 |
| Full analysis: | https://app.any.run/tasks/85fd854c-1d76-4e22-9608-e8726f51b246 |
| Verdict: | Malicious activity |
| Threats: | Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks. |
| Analysis date: | November 09, 2023, 04:32:11 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows |
| MD5: | ACA63B9E4AB5A783F11B125C71112242 |
| SHA1: | 82BABA92A2C1B320921AD05E56A5890F62697CF3 |
| SHA256: | BAA0CB3BC60D90CFBE000D58B1E4FF06888722BFA81C68EF1486E7E48BA8740A |
| SSDEEP: | 3072:m14iwt2CbSxPZVgwWij3tpuA6y+JrQTyy1G:m14i1CbSxRSpirt6y4C |
| .exe | | | Generic CIL Executable (.NET, Mono, etc.) (82.9) |
|---|---|---|
| .dll | | | Win32 Dynamic Link Library (generic) (7.4) |
| .exe | | | Win32 Executable (generic) (5.1) |
| .exe | | | Generic Win/DOS Executable (2.2) |
| .exe | | | DOS Executable Generic (2.2) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2023:11:07 19:07:31+01:00 |
| ImageFileCharacteristics: | Executable, Large address aware |
| PEType: | PE32 |
| LinkerVersion: | 48 |
| CodeSize: | 124551 |
| InitializedDataSize: | 3072 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x20681 |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 6.93.266.9 |
| ProductVersionNumber: | 6.93.266.9 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| CompanyName: | ofexIbu |
| FileDescription: | OYiYA abOLa OhuXAY uCikoqEi UxOb euUNaI. |
| FileVersion: | 6.93.266.9 |
| InternalName: | IVuviBO |
| LegalCopyright: | © 2023 ofexIbu. |
| OriginalFileName: | omuQId |
| ProductName: | OlUmeNOi |
| ProductVersion: | 6.93.266.9 |
| Comments: | AVevuziIOgi EiIye aJAdavUia UzOl AfOp OtAve iZIQiCImOZO. |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 308 | "C:\Users\admin\Pictures\FPgG0XAkVoXc2lHGGyxtP51v.exe" | C:\Users\admin\Pictures\FPgG0XAkVoXc2lHGGyxtP51v.exe | CasPol.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 312 | "C:\Users\admin\Pictures\hunU9LeEDys0MgJ5O4NFUw2W.exe" | C:\Users\admin\Pictures\hunU9LeEDys0MgJ5O4NFUw2W.exe | — | CasPol.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 364 | "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\admin\AppData\Local\Temp\5125296e5f\Utsysc.exe" /F | C:\Windows\SysWOW64\schtasks.exe | — | Utsysc.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Manages scheduled tasks Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 392 | "C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\admin\AppData\Local\Temp\1260521668.exe" | C:\Windows\SysWOW64\cmd.exe | — | B5jzgU6zAoh3YKAvZrsoxE5C.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 648 | "C:\Users\admin\Pictures\B5jzgU6zAoh3YKAvZrsoxE5C.exe" | C:\Users\admin\Pictures\B5jzgU6zAoh3YKAvZrsoxE5C.exe | — | CasPol.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 688 | "C:\Users\admin\Pictures\nEud18VqsrduQL71sjEO9A7R.exe" --silent --allusers=0 | C:\Users\admin\Pictures\nEud18VqsrduQL71sjEO9A7R.exe | — | CasPol.exe | |||||||||||
User: admin Company: Opera Software Integrity Level: MEDIUM Description: Opera Installer Exit code: 0 Version: 104.0.4944.36 Modules
| |||||||||||||||
| 712 | sc stop WaaSMedicSvc | C:\Windows\System32\sc.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: A tool to aid in developing services for WindowsNT Exit code: 1060 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 812 | C:\Windows\System32\schtasks.exe /create /f /ru "System" /tn "GoogleUpdateTaskMachineQC" /xml "C:\Users\admin\AppData\Local\Temp\tlxvacrdjkek.xml" | C:\Windows\System32\schtasks.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Manages scheduled tasks Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 812 | C:\Windows\System32\schtasks.exe /create /f /ru "System" /tn "GoogleUpdateTaskMachineQC" /xml "C:\Windows\TEMP\tlxvacrdjkek.xml" | C:\Windows\System32\schtasks.exe | explorer.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Manages scheduled tasks Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 952 | netsh wlan show profiles | C:\Windows\System32\netsh.exe | — | rundll32.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Network Command Shell Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| (PID) Process: | (1944) explorer.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0 |
| Operation: | write | Name: | CheckSetting |
Value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| |||
| (PID) Process: | (2600) SecuriteInfo.com.IL.Trojan.MSILZilla.30886.28966.14387.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (2600) SecuriteInfo.com.IL.Trojan.MSILZilla.30886.28966.14387.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (2600) SecuriteInfo.com.IL.Trojan.MSILZilla.30886.28966.14387.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (2600) SecuriteInfo.com.IL.Trojan.MSILZilla.30886.28966.14387.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (2216) CasPol.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (2216) CasPol.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (2216) CasPol.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (2216) CasPol.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (2216) CasPol.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\156\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2688 | powershell.exe | C:\Users\admin\AppData\Local\Temp\4rrzzgez.kkl.ps1 | binary | |
MD5:C4CA4238A0B923820DCC509A6F75849B | SHA256:— | |||
| 2216 | CasPol.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\rvD9Uh32eAiUWIlWpndcTcCd.bat | text | |
MD5:551C094FD9FA59F53712942B17C3C861 | SHA256:84E4F8AC550F97F873F4BB72C54F9636B8B9CA75F13C30A9D755296DF3EC385E | |||
| 2216 | CasPol.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506 | binary | |
MD5:D2EA26272B29FF50BA34005F5A7C8904 | SHA256:A4257D9548AE2C7230B681211579C2DB5E726A363E6C43303A006C5F1BA4C24A | |||
| 2216 | CasPol.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506 | compressed | |
MD5:F3441B8572AAE8801C04F3060B550443 | SHA256:6720349E7D82EE0A8E73920D3C2B7CB2912D9FCF2EDB6FD98F2F12820158B0BF | |||
| 2216 | CasPol.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\diNZO6Ju1QuyXdnbOdInEkAq.bat | text | |
MD5:DA4DC5159590C47D79E773BCFD41B568 | SHA256:149A93E06C5ECDEC428E80D07803E06061842F0413B7022F68A24B056C422FD9 | |||
| 2216 | CasPol.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cWNW1W269g8rBAMfjoV1wrYF.bat | text | |
MD5:215EC79401F7A5EEA6208ECE34D8DDA9 | SHA256:D8CC534C3F48E98E08D7BAF6E91FBA1D3FDB36D791D1CF82C5C27F84B953D95B | |||
| 2216 | CasPol.exe | C:\Users\admin\AppData\Local\Temp\CabAE66.tmp | compressed | |
MD5:F3441B8572AAE8801C04F3060B550443 | SHA256:6720349E7D82EE0A8E73920D3C2B7CB2912D9FCF2EDB6FD98F2F12820158B0BF | |||
| 2216 | CasPol.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\yJhL1PbjVCXIov1qA13ZnUpZ.bat | text | |
MD5:1678F55E2FD81934827D9A256DD4D33D | SHA256:175D90C35D32104217A9E66A064C98EC21EDE781C504E96D8BB6EF1BD0AAA76D | |||
| 2688 | powershell.exe | C:\Users\admin\AppData\Local\Temp\q4suzkr4.pjo.psm1 | binary | |
MD5:C4CA4238A0B923820DCC509A6F75849B | SHA256:— | |||
| 2216 | CasPol.exe | C:\Users\admin\AppData\Local\sRT5FIRBYyNVK3oT41ztRfpI.exe | html | |
MD5:FCAD815E470706329E4E327194ACC07C | SHA256:280D939A66A0107297091B3B6F86D6529EF6FAC222A85DBC82822C3D5DC372B8 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2220 | dLU2QMHGwPdQRsBLpbT0UhfT.exe | GET | 200 | 116.203.165.60:2087 | http://116.203.165.60:2087/ | unknown | — | — | unknown |
2216 | CasPol.exe | GET | 200 | 95.214.26.28:80 | http://galandskiyher5.com/downloads/toolspub1.exe | unknown | executable | 318 Kb | unknown |
2216 | CasPol.exe | GET | 200 | 194.49.94.48:80 | http://194.49.94.48/InstallSetup3.exe | unknown | executable | 2.55 Mb | unknown |
2216 | CasPol.exe | GET | 200 | 194.49.94.67:80 | http://194.49.94.67/files/My2.exe | unknown | executable | 5.24 Mb | unknown |
2216 | CasPol.exe | GET | 301 | 185.26.182.111:80 | http://net.geo.opera.com/opera/stable/windows/?utm_medium=apb&utm_source=mkt&utm_campaign=767 | unknown | html | 162 b | unknown |
2216 | CasPol.exe | GET | 200 | 85.209.11.204:80 | http://85.209.11.204/api/files/software/s5.exe | unknown | executable | 387 Kb | unknown |
2216 | CasPol.exe | GET | 200 | 89.191.234.21:80 | http://gobo11fc.top/build.exe | unknown | executable | 324 Kb | unknown |
2216 | CasPol.exe | GET | 200 | 93.184.221.240:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?f0f0f46a9543f796 | unknown | compressed | 61.6 Kb | unknown |
2220 | dLU2QMHGwPdQRsBLpbT0UhfT.exe | POST | 200 | 116.203.165.60:2087 | http://116.203.165.60:2087/ | unknown | text | 48 b | unknown |
1940 | B5jzgU6zAoh3YKAvZrsoxE5C.exe | GET | 200 | 85.209.11.204:80 | http://85.209.11.204/api/files/client/s51 | unknown | executable | 887 Kb | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
2216 | CasPol.exe | 188.114.96.3:443 | yip.su | CLOUDFLARENET | NL | unknown |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1956 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
2216 | CasPol.exe | 104.20.68.143:443 | pastebin.com | CLOUDFLARENET | — | unknown |
2216 | CasPol.exe | 177.229.198.250:443 | etiquetaspiura.com | Mega Cable, S.A. de C.V. | MX | unknown |
2216 | CasPol.exe | 103.55.39.107:443 | wahyurahmat.id | PT Cloud Hosting Indonesia | ID | unknown |
2216 | CasPol.exe | 85.209.11.204:80 | — | LLC Baxet | RU | malicious |
2216 | CasPol.exe | 95.214.26.28:80 | galandskiyher5.com | Enes Koken | US | unknown |
2216 | CasPol.exe | 194.49.94.48:80 | — | Enes Koken | DE | unknown |
Domain | IP | Reputation |
|---|---|---|
pastebin.com |
| shared |
yip.su |
| whitelisted |
etiquetaspiura.com |
| unknown |
wahyurahmat.id |
| unknown |
galandskiyher5.com |
| malicious |
flyawayaero.net |
| unknown |
gons07fc.top |
| unknown |
gobo11fc.top |
| unknown |
lycheepanel.info |
| unknown |
laubenstein.space |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
324 | svchost.exe | Potentially Bad Traffic | ET DNS Query for .su TLD (Soviet Union) Often Malware Related |
324 | svchost.exe | Potentially Bad Traffic | ET DNS Query to a *.top domain - Likely Hostile |
2216 | CasPol.exe | Potential Corporate Privacy Violation | AV POLICY HTTP request for .exe file with no User-Agent |
2216 | CasPol.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
2216 | CasPol.exe | Potential Corporate Privacy Violation | AV POLICY HTTP request for .exe file with no User-Agent |
2216 | CasPol.exe | Potentially Bad Traffic | ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile |
2216 | CasPol.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
2216 | CasPol.exe | Misc activity | ET INFO Packed Executable Download |
2216 | CasPol.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
2216 | CasPol.exe | Potentially Bad Traffic | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |