| File name: | 6523.exe |
| Full analysis: | https://app.any.run/tasks/24500a1f-61a8-490b-8e0c-75449e6cc68b |
| Verdict: | Malicious activity |
| Threats: | Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks. |
| Analysis date: | August 24, 2023, 15:07:16 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | F6D72F673EE8F3DA01014DFDCCE476F2 |
| SHA1: | 075D81F03B2AE15F95FD0A87D329A933D1B328E6 |
| SHA256: | BF375CDE510406F6CBE633C67360D65D5852A89DEC7EE555CCA04812A7F04313 |
| SSDEEP: | 3072:KSdr5Y4TCy+dCzA4isaFpGbsZAUuoanfmiZpPtWtMmEPFP9z+Y:K8/+dN4hwG7Uu9T6ymEPFP9z+ |
| .exe | | | Win64 Executable (generic) (76.4) |
|---|---|---|
| .exe | | | Win32 Executable (generic) (12.4) |
| .exe | | | Generic Win/DOS Executable (5.5) |
| .exe | | | DOS Executable Generic (5.5) |
| ProductVersions: | 10.25.70.52 |
|---|---|
| ProductName: | Gammy |
| LegalCopyrights: | Challangers kamboja |
| InternalName: | Literally.exe |
| FileVersion: | 46.76.12.71 |
| CompanyName: | Thunderstack |
| CharacterSet: | Unknown (85B2) |
| LanguageCode: | Unknown (0293) |
| FileSubtype: | - |
| ObjectFileType: | Executable application |
| FileOS: | Windows NT 32-bit |
| FileFlags: | (none) |
| FileFlagsMask: | 0x003f |
| ProductVersionNumber: | 26.0.0.0 |
| FileVersionNumber: | 86.0.0.0 |
| Subsystem: | Windows GUI |
| SubsystemVersion: | 5.1 |
| ImageVersion: | - |
| OSVersion: | 5.1 |
| EntryPoint: | 0x7db2 |
| UninitializedDataSize: | - |
| InitializedDataSize: | 32301568 |
| CodeSize: | 154112 |
| LinkerVersion: | 10 |
| PEType: | PE32 |
| ImageFileCharacteristics: | No relocs, Executable, 32-bit |
| TimeStamp: | 2022:05:31 07:26:36+00:00 |
| MachineType: | Intel 386 or later, and compatibles |
| Architecture: | IMAGE_FILE_MACHINE_I386 |
|---|---|
| Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
| Compilation Date: | 31-May-2022 07:26:36 |
| Detected languages: |
|
| CompanyName: | Thunderstack |
| FileVersion: | 46.76.12.71 |
| InternalName: | Literally.exe |
| LegalCopyrights: | Challangers kamboja |
| ProductName: | Gammy |
| ProductVersions: | 10.25.70.52 |
| Magic number: | MZ |
|---|---|
| Bytes on last page of file: | 0x0090 |
| Pages in file: | 0x0003 |
| Relocations: | 0x0000 |
| Size of header: | 0x0004 |
| Min extra paragraphs: | 0x0000 |
| Max extra paragraphs: | 0xFFFF |
| Initial SS value: | 0x0000 |
| Initial SP value: | 0x00B8 |
| Checksum: | 0x0000 |
| Initial IP value: | 0x0000 |
| Initial CS value: | 0x0000 |
| Overlay number: | 0x0000 |
| OEM identifier: | 0x0000 |
| OEM information: | 0x0000 |
| Address of NE header: | 0x000000E0 |
| Signature: | PE |
|---|---|
| Machine: | IMAGE_FILE_MACHINE_I386 |
| Number of sections: | 3 |
| Time date stamp: | 31-May-2022 07:26:36 |
| Pointer to Symbol Table: | 0x00000000 |
| Number of symbols: | 0 |
| Size of Optional Header: | 0x00E0 |
| Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
|---|---|---|---|---|---|
.text | 0x00001000 | 0x00025902 | 0x00025A00 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 5.35933 |
.data | 0x00027000 | 0x01EBBE48 | 0x00016800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 7.24456 |
.rsrc | 0x01EE3000 | 0x00007508 | 0x00007600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.04778 |
Title | Entropy | Size | Codepage | Language | Type |
|---|---|---|---|---|---|
1 | 3.38159 | 584 | UNKNOWN | UNKNOWN | RT_VERSION |
2 | 4.02242 | 1736 | UNKNOWN | Portuguese - Portugal | RT_ICON |
3 | 3.28195 | 1384 | UNKNOWN | Portuguese - Portugal | RT_ICON |
4 | 2.3839 | 4264 | UNKNOWN | Portuguese - Portugal | RT_ICON |
5 | 2.39543 | 2440 | UNKNOWN | Portuguese - Portugal | RT_ICON |
6 | 2.5278 | 1128 | UNKNOWN | Portuguese - Portugal | RT_ICON |
7 | 3.62407 | 9640 | UNKNOWN | Portuguese - Portugal | RT_ICON |
8 | 3.76944 | 2440 | UNKNOWN | Portuguese - Portugal | RT_ICON |
9 | 2.96984 | 2216 | UNKNOWN | UNKNOWN | RT_CURSOR |
24 | 2.26539 | 88 | UNKNOWN | Portuguese - Portugal | RT_STRING |
GDI32.dll |
KERNEL32.dll |
USER32.dll |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 308 | CACLS "yiueea.exe" /P "admin:N" | C:\Windows\SysWOW64\cacls.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Control ACLs Program Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1036 | C:\Users\admin\AppData\Local\Temp\42F5.exe | C:\Users\admin\AppData\Local\Temp\42F5.exe | 42F5.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 1064 | "C:\Users\admin\AppData\Local\1eeddeb8-137a-48a4-b7d0-28e9ea8fe9eb\build2.exe" | C:\Users\admin\AppData\Local\1eeddeb8-137a-48a4-b7d0-28e9ea8fe9eb\build2.exe | build2.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 1080 | "C:\Users\admin\AppData\Local\Temp\42F5.exe" --Admin IsNotAutoStart IsNotTask | C:\Users\admin\AppData\Local\Temp\42F5.exe | 42F5.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 1636 | "C:\Users\admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe" | C:\Users\admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | — | 397D.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 1680 | "C:\Users\admin\AppData\Local\Temp\latestplayer.exe" | C:\Users\admin\AppData\Local\Temp\latestplayer.exe | 397D.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 1872 | C:\Windows\system32\cmd.exe /S /D /c" echo Y" | C:\Windows\SysWOW64\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1912 | CACLS "..\577f58beff" /P "admin:R" /E | C:\Windows\SysWOW64\cacls.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Control ACLs Program Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1924 | C:\Windows\Explorer.EXE | C:\Windows\explorer.exe | — | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1976 | C:\Users\admin\AppData\Local\Temp\D469.exe | C:\Users\admin\AppData\Local\Temp\D469.exe | — | explorer.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| (PID) Process: | (1924) explorer.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0 |
| Operation: | write | Name: | CheckSetting |
Value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| |||
| (PID) Process: | (1924) explorer.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count |
| Operation: | write | Name: | HRZR_PGYFRFFVBA |
Value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| |||
| (PID) Process: | (1924) explorer.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count |
| Operation: | write | Name: | HRZR_PGYFRFFVBA |
Value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| |||
| (PID) Process: | (2224) D469.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
| Operation: | write | Name: | ProxyEnable |
Value: 0 | |||
| (PID) Process: | (2224) D469.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections |
| Operation: | write | Name: | SavedLegacySettings |
Value: 46000000B1000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
| (PID) Process: | (2224) D469.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (2224) D469.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (2224) D469.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (2224) D469.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (2224) D469.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 1924 | explorer.exe | C:\Users\admin\AppData\Roaming\jbhtujv | executable | |
MD5:F6D72F673EE8F3DA01014DFDCCE476F2 | SHA256:BF375CDE510406F6CBE633C67360D65D5852A89DEC7EE555CCA04812A7F04313 | |||
| 1924 | explorer.exe | C:\Users\admin\AppData\Local\Temp\5DD0.exe | executable | |
MD5:3899665B1157EB9FD99B2D4000EB3C59 | SHA256:EDB3454E0261F85C26ACDC1FD5365DAE5D1EC5F05C97991DBAAF3ADA0791A484 | |||
| 2940 | 397D.exe | C:\Users\admin\AppData\Local\Temp\toolspub2.exe | executable | |
MD5:222A4C7E494A2314E9E1D0A07ABECEE9 | SHA256:60E8EEF70C565EC2ABBE7D16157A0EDC4F8DBF8938363680AC6362620114C436 | |||
| 1924 | explorer.exe | C:\Users\admin\AppData\Local\Temp\D469.exe | executable | |
MD5:630CCCA3B919FD2013B6ACE25E3599F7 | SHA256:B7E4ABE438C0D0A04B6CF3DA4EE41480648A88A55924678EC08685A0045D6172 | |||
| 1924 | explorer.exe | C:\Users\admin\AppData\Local\Temp\4093.dll | executable | |
MD5:23669981F056DC7F590989DE5F67A347 | SHA256:2AA0F01B5361AD61BF9C0C85FC000C1857BF1C3CA87932D028F20E84A095382C | |||
| 2940 | 397D.exe | C:\Users\admin\AppData\Local\Temp\latestplayer.exe | executable | |
MD5:55F845C433E637594AAF872E41FDA207 | SHA256:F9F9B154F928549C7A4B484909F41352048CE8148C678F4EC32C807C1D173A39 | |||
| 1924 | explorer.exe | C:\Users\admin\AppData\Local\Temp\397D.exe | executable | |
MD5:739AC92D82F9AE4F557923EE2689099A | SHA256:E9DC3C310187D5AA3A5451C4C6799792B5E6C501DA776F0ADEAF16302AA84E6E | |||
| 2308 | 42F5.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HQYU0XHJ\geo[1].json | binary | |
MD5:3C040CDE576B927DFB696D7E092BC16A | SHA256:DA912266563C379D960EDD0F44C2123CD130442F6D81EEDF122488DB620EEAC3 | |||
| 1924 | explorer.exe | C:\Users\admin\AppData\Local\Temp\42F5.exe | executable | |
MD5:EAB15E545C8A2B1CEFCAEBC4D5D0973E | SHA256:808AD7486D9AFE9291AE54E5D20B5F3CF843791BFEE6C88460494A56EF254FEB | |||
| 3452 | D469.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HQYU0XHJ\get[1].htm | binary | |
MD5:439448755EF112F23F85F9E31931708D | SHA256:6A207324F8A36A2228ADD791AC3D314DA8B65D6CE14A7020DB1ECA5FBC730A18 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
1924 | explorer.exe | POST | 404 | 188.114.96.3:80 | http://potunulit.org/ | US | binary | 8 b | malicious |
1924 | explorer.exe | POST | 404 | 188.114.96.3:80 | http://potunulit.org/ | US | html | 401 b | malicious |
1924 | explorer.exe | POST | 404 | 188.114.96.3:80 | http://potunulit.org/ | US | html | 401 b | malicious |
1924 | explorer.exe | POST | 404 | 188.114.96.3:80 | http://potunulit.org/ | US | binary | 51 b | malicious |
1924 | explorer.exe | POST | 404 | 188.114.96.3:80 | http://potunulit.org/ | US | binary | 378 Kb | malicious |
1924 | explorer.exe | POST | 404 | 188.114.96.3:80 | http://potunulit.org/ | US | binary | 378 Kb | malicious |
1924 | explorer.exe | POST | 404 | 188.114.96.3:80 | http://potunulit.org/ | US | binary | 44 b | malicious |
1924 | explorer.exe | POST | 404 | 188.114.96.3:80 | http://potunulit.org/ | US | binary | 42 b | malicious |
1924 | explorer.exe | POST | 404 | 188.114.96.3:80 | http://potunulit.org/ | US | binary | 2.50 Mb | malicious |
3196 | yiueea.exe | POST | 200 | 79.137.192.18:80 | http://79.137.192.18/9bDc8sQ/index.php | RU | text | 6 b | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
1924 | explorer.exe | 211.40.39.251:80 | colisumy.com | LG DACOM Corporation | KR | malicious |
2224 | D469.exe | 162.0.217.254:443 | api.2ip.ua | NAMECHEAP-NET | NL | suspicious |
1924 | explorer.exe | 79.137.192.18:80 | — | Partner LLC | RU | malicious |
2664 | aafg31.exe | 156.236.72.121:443 | z.nnnaajjjgc.com | YISU CLOUD LTD | US | malicious |
3196 | yiueea.exe | 79.137.192.18:80 | — | Partner LLC | RU | malicious |
1036 | 42F5.exe | 162.0.217.254:443 | api.2ip.ua | NAMECHEAP-NET | NL | suspicious |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1208 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
332 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
Domain | IP | Reputation |
|---|---|---|
potunulit.org |
| malicious |
admaiscont.com.br |
| unknown |
colisumy.com |
| malicious |
api.2ip.ua |
| shared |
dns.msftncsi.com |
| shared |
z.nnnaajjjgc.com |
| suspicious |
zexeq.com |
| malicious |
host-file-host6.com |
| malicious |
host-host-file8.com |
| malicious |
filebin.net |
| suspicious |
PID | Process | Class | Message |
|---|---|---|---|
332 | svchost.exe | A Network Trojan was detected | ET MALWARE DNS Query to SmokeLoader Domain (potunulit .org) |
1924 | explorer.exe | A Network Trojan was detected | ET MALWARE Suspected Smokeloader Activity (POST) |
1924 | explorer.exe | A Network Trojan was detected | ET MALWARE Suspected Smokeloader Activity (POST) |
1924 | explorer.exe | A Network Trojan was detected | ET MALWARE Suspected Smokeloader Activity (POST) |
1924 | explorer.exe | A Network Trojan was detected | ET MALWARE Suspected Smokeloader Activity (POST) |
1924 | explorer.exe | A Network Trojan was detected | ET MALWARE Suspected Smokeloader Activity (POST) |
1924 | explorer.exe | A Network Trojan was detected | ET MALWARE Suspected Smokeloader Activity (POST) |
1924 | explorer.exe | A Network Trojan was detected | ET MALWARE Suspected Smokeloader Activity (POST) |
3908 | AppLaunch.exe | Potentially Bad Traffic | ET INFO Microsoft net.tcp Connection Initialization Activity |
3908 | AppLaunch.exe | A Network Trojan was detected | ET MALWARE Redline Stealer TCP CnC Activity |