| File name: | 4363463463464363463463463.exe.zip |
| Full analysis: | https://app.any.run/tasks/65460073-67e5-43ef-bf57-573cf2699efa |
| Verdict: | Malicious activity |
| Threats: | Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks. |
| Analysis date: | June 26, 2025, 21:49:56 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/zip |
| File info: | Zip archive data, at least v5.1 to extract, compression method=AES Encrypted |
| MD5: | 4C712F3A263A9EABB939F27B8CCDDF6B |
| SHA1: | A3646B75E9F955CD0225BD5E003F9BB4AFEC4E7A |
| SHA256: | C49C08555180E8DD1900506836FF516E8E52185F56D7487C28B0FC9FB8282D5E |
| SSDEEP: | 96:60OMpWP3p5peb3lugL62tDCOVUkAtQ+hEK7Jap4EYumcwKvqHW84XAsFyyOzqWnt:ejNAVuyDY4UXtQ+qQ5KvJAsFcTt |
| .zip | | | ZIP compressed archive (100) |
|---|
| ZipRequiredVersion: | 51 |
|---|---|
| ZipBitFlag: | 0x0009 |
| ZipCompression: | Unknown (99) |
| ZipModifyDate: | 2025:06:26 21:31:52 |
| ZipCRC: | 0x31d44928 |
| ZipCompressedSize: | 4869 |
| ZipUncompressedSize: | 10752 |
| ZipFileName: | 4363463463464363463463463.exe.bin |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 32 | "C:\Users\admin\Desktop\Files\HDDrive1095_XinAnPlug3030_20230619_inno.exe" | C:\Users\admin\Desktop\Files\HDDrive1095_XinAnPlug3030_20230619_inno.exe | 4363463463464363463463463.exe | ||||||||||||
User: admin Company: LNCA Company, Inc. Integrity Level: HIGH Description: 辽宁CA客户端 Exit code: 2 Version: 3.0.3.0 Modules
| |||||||||||||||
| 304 | cmd /c copy /b Avi + Hits + Joyce + Desk + Cheers + Cleanup + Generate + Hobbies + Possible + Rover + Notifications + Unique + Helpful + Constantly + Namibia + Revolution + Transfers + Index + Colors 437570\b | C:\Windows\SysWOW64\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 304 | "C:\Program Files (x86)\Internet Explorer\iexplore.exe" | C:\Program Files (x86)\Internet Explorer\iexplore.exe | — | msdcsc.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Internet Explorer Exit code: 0 Version: 11.00.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 684 | "C:\Users\admin\Desktop\Files\tomcat8.exe" | C:\Users\admin\Desktop\Files\tomcat8.exe | — | 4363463463464363463463463.exe | |||||||||||
User: admin Company: Apache Software Foundation Integrity Level: HIGH Description: Commons Daemon Service Runner Exit code: 2 Version: 1.0.15.0 Modules
| |||||||||||||||
| 724 | timeout 3 | C:\Windows\SysWOW64\timeout.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: timeout - pauses command processing Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 868 | "C:\Windows\SysWOW64\explorer.exe" | C:\Windows\SysWOW64\explorer.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Version: 10.0.19041.3758 (WinBuild.160101.0800) Modules
Formbook(PID) Process(868) explorer.exe C2www.cjc-nm.vip/tu90/ Strings (79)USERNAME LOCALAPPDATA USERPROFILE APPDATA TEMP ProgramFiles CommonProgramFiles ALLUSERSPROFILE /c copy " /c del " \Run \Policies \Explorer \Registry\User \Registry\Machine \SOFTWARE\Microsoft\Windows\CurrentVersion Office\15.0\Outlook\Profiles\Outlook\ NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\ \SOFTWARE\Mozilla\Mozilla \Mozilla Username: Password: formSubmitURL usernameField encryptedUsername encryptedPassword \logins.json \signons.sqlite \Microsoft\Vault\ SELECT encryptedUsername, encryptedPassword, formSubmitURL FROM moz_logins \Google\Chrome\User Data\Default\Login Data SELECT origin_url, username_value, password_value FROM logins .exe .com .scr .pif .cmd .bat ms win gdi mfc vga igfx user help config update regsvc chkdsk systray audiodg certmgr autochk taskhost colorcpl services IconCache ThumbCache Cookies SeDebugPrivilege SeShutdownPrivilege \BaseNamedObjects config.php POST HTTP/1.1 Host: Connection: close Content-Length: Cache-Control: no-cache Origin: http:// User-Agent: Mozilla Firefox/4.0 Content-Type: application/x-www-form-urlencoded Accept: */* Referer: http:// Accept-Language: en-US Accept-Encoding: gzip, deflate
dat= f-start f-end Decoy C2 (64)952734073.xyz l2d35efae0yw1rvt9qefw8cfg.net 87445.pizza idlersinduedinfeft.cloud whichwe.live 100449.net chinaclean.xyz olding-beds-61261.bond leadmagnetcpa.shop video-games-97741.bond marvelterbang.shop video1.net perfectdrishti.info mantispms.net matalan.jobs greenblockventures.net pagamentoseguroficial.pro leadmagnetppc.shop 77578.shop tdnimji.buzz zainnova.shop roofing-services-34072.bond topisalpert.shop cleaning-services-40215.bond abandoned-houses-38551.bond 59hl.net fromscratch.top vincnakliye.xyz cars-3549835.zone setpink.life soggilysootsstative.cloud thinkhuman.net estieaaa.xyz sharelaunch.xyz simplycandles.shop ufalosdmsz.shop influencer-marketing-61296.bond newcarfi.info oxvia.homes cvkisegy.shop pin-up-slot-fast.buzz work-abroad-52523.bond j2st.info cataract-surgery-63955.bond pl-oferta2759576.cfd xinshengyou.xyz rockystatue.shop guidacorsa.corsica jfdjn.autos roofing-jobs-26086.bond your-swsolutions.info xzgdp.autos 0v3py92izrp23yy.xyz aborteracciteadmetus.cloud security-jobs-cl-3.today marpiset.shop fashionstore1999.shop knapsackdisplay.shop whuastp.info wall-repair-10251.bond frau-tonis-parfum.shop binarybingenbiscay.cloud yuuk1.click parposaltguide.cyou | |||||||||||||||
| 892 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | mimilove.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1052 | "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe | — | qwalphaqw.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Visual C# Command Line Compiler Exit code: 0 Version: 4.8.9037.0 built by: NET481REL1 Modules
| |||||||||||||||
| 1056 | "C:\Users\admin\Desktop\Files\Sentil.exe" | C:\Users\admin\Desktop\Files\Sentil.exe | 4363463463464363463463463.exe | ||||||||||||
User: admin Integrity Level: HIGH Description: Quasar Client Exit code: 3 Version: 1.4.1 Modules
| |||||||||||||||
| 1128 | "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\admin\Desktop\Files\Dark_Brout_ncrypt.exe" +s +h | C:\Windows\SysWOW64\cmd.exe | — | Dark_Brout_ncrypt.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (3540) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 3 |
Value: C:\Users\admin\Desktop\preferences.zip | |||
| (PID) Process: | (3540) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\chromium_ext.zip | |||
| (PID) Process: | (3540) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\omni_23_10_2024_.zip | |||
| (PID) Process: | (3540) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\AppData\Local\Temp\4363463463464363463463463.exe.zip | |||
| (PID) Process: | (3540) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (3540) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (3540) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (3540) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
| (PID) Process: | (3540) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtBMP |
Value: | |||
| (PID) Process: | (3540) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtIcon |
Value: | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3672 | 4363463463464363463463463.exe | C:\Users\admin\Desktop\Files\neploskiy_crypted_LAB.exe | executable | |
MD5:6FDD3FC5B0799393D7EA782B9A5B84BC | SHA256:2D93BC4EF064B8A824825AF4672DA00B1651EA42B9B58009816019D801F7EF0D | |||
| 4156 | QQHelper_1540.exe | C:\Users\admin\Desktop\Files\xml\JprrFGqH.uTMP | — | |
MD5:— | SHA256:— | |||
| 4156 | QQHelper_1540.exe | C:\Users\admin\Desktop\Files\xml\rGqzXyMQ.uTMP | — | |
MD5:— | SHA256:— | |||
| 4156 | QQHelper_1540.exe | C:\Users\admin\Desktop\Files\xml\CkJyuzaV.uTMP | — | |
MD5:— | SHA256:— | |||
| 4772 | explorer.exe | C:\Users\admin\Desktop\4363463463464363463463463.exe.bin | executable | |
MD5:2A94F3960C58C6E70826495F76D00B85 | SHA256:2FCAD226B17131DA4274E1B9F8F31359BDD325C9568665F08FD1F6C5D06A23CE | |||
| 4772 | explorer.exe | C:\Users\admin\Desktop\4363463463464363463463463.exe | executable | |
MD5:2A94F3960C58C6E70826495F76D00B85 | SHA256:2FCAD226B17131DA4274E1B9F8F31359BDD325C9568665F08FD1F6C5D06A23CE | |||
| 4156 | QQHelper_1540.exe | C:\Users\admin\Desktop\Files\¹Ù·½ÍøÕ¾.url | binary | |
MD5:E7087BFE4C6DEE47A5C0B64DACE49392 | SHA256:67165D96FE685002147A4712AC93659FAF3E2C122CB22FAA68DD3EBE7DFB18F0 | |||
| 1056 | Sentil.exe | C:\Users\admin\AppData\Roaming\SubDir\Client1.exe | executable | |
MD5:CFF3E677B6383632EFF6D1B52CD6D277 | SHA256:0D57B81C8C42D3450782AF358D0938D813ABC28EC18B3AD6C81BD680A3EFBBEA | |||
| 3672 | 4363463463464363463463463.exe | C:\Users\admin\Desktop\Files\Sentil.exe | executable | |
MD5:CFF3E677B6383632EFF6D1B52CD6D277 | SHA256:0D57B81C8C42D3450782AF358D0938D813ABC28EC18B3AD6C81BD680A3EFBBEA | |||
| 3672 | 4363463463464363463463463.exe | C:\Users\admin\Desktop\Files\QQHelper_1540.exe | executable | |
MD5:5A39D66E2B925F7B7F9F39DE2F9C5FA0 | SHA256:4F91F9C5D3BAF612A1920AE8B2C49A1EE9850D018E308F8E65184A9046138658 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2876 | svchost.exe | GET | 200 | 2.23.77.188:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
1268 | svchost.exe | GET | 200 | 2.23.246.101:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
6780 | SIHClient.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
6780 | SIHClient.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
3672 | 4363463463464363463463463.exe | GET | 301 | 140.82.112.4:80 | http://github.com/rimase12/urika/raw/refs/heads/main/vtoroy.exe | unknown | — | — | whitelisted |
3672 | 4363463463464363463463463.exe | GET | 200 | 185.156.72.61:80 | http://185.156.72.61/inc/neploskiy_crypted_LAB.exe | unknown | — | — | malicious |
1268 | svchost.exe | GET | 200 | 2.16.168.124:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
3672 | 4363463463464363463463463.exe | GET | 200 | 180.163.146.102:80 | http://down.qqfarmer.com.cn/QQHelper_1540.exe | unknown | — | — | unknown |
3672 | 4363463463464363463463463.exe | GET | 301 | 140.82.112.4:80 | http://github.com/ff245185/payload/raw/refs/heads/main/Fast%20Download.exe | unknown | — | — | whitelisted |
3672 | 4363463463464363463463463.exe | GET | 200 | 34.240.189.130:80 | http://sg123.net/files/update.exe | unknown | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
5944 | MoUsoCoreWorker.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
1268 | svchost.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4916 | RUXIMICS.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
1268 | svchost.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
1268 | svchost.exe | 2.16.168.124:80 | crl.microsoft.com | Akamai International B.V. | RU | whitelisted |
1268 | svchost.exe | 2.23.246.101:80 | www.microsoft.com | Ooredoo Q.S.C. | QA | whitelisted |
2876 | svchost.exe | 20.190.160.2:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
2876 | svchost.exe | 2.23.77.188:80 | ocsp.digicert.com | AKAMAI-AS | DE | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
nexusrules.officeapps.live.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
— | — | Unknown Traffic | ET USER_AGENTS Microsoft Dr Watson User-Agent (MSDW) |
2200 | svchost.exe | Not Suspicious Traffic | INFO [ANY.RUN] Attempting to access raw user content on GitHub |
3672 | 4363463463464363463463463.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
3672 | 4363463463464363463463463.exe | Potential Corporate Privacy Violation | ET INFO PE EXE or DLL Windows file download HTTP |
3672 | 4363463463464363463463463.exe | Potentially Bad Traffic | ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response |
3672 | 4363463463464363463463463.exe | Potentially Bad Traffic | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |
— | — | Potential Corporate Privacy Violation | ET INFO PE EXE or DLL Windows file download HTTP |
— | — | Misc activity | ET HUNTING EXE Downloaded from Github |
— | — | Misc activity | ET INFO Packed Executable Download |
2272 | MSBuild.exe | Misc activity | ET INFO Observed Telegram Domain (t .me in TLS SNI) |
Process | Message |
|---|---|
4363463463464363463463463.exe | The specified executable is not a valid application for this OS platform.
|
4363463463464363463463463.exe | The specified executable is not a valid application for this OS platform.
|
mmc.exe | "C:\WINDOWS\system32\compmgmt.msc" "C:\WINDOWS\system32\compmgmt.msc" |
mmc.exe | |
mmc.exe | ViewerAdminViewsPath = 'C:\ProgramData\Microsoft\Event Viewer\Views\ApplicationViewsRootNode': Microsoft.Windows.ManagementUI.CombinedControls.EventsNode
|
mmc.exe | ViewerConfigPath = 'C:\ProgramData\Microsoft\Event Viewer': Microsoft.Windows.ManagementUI.CombinedControls.EventsNode
|
mmc.exe | ViewerExternalLogsPath = 'C:\ProgramData\Microsoft\Event Viewer\ExternalLogs': Microsoft.Windows.ManagementUI.CombinedControls.EventsNode
|
mmc.exe | ViewerViewsFolderPath = 'C:\ProgramData\Microsoft\Event Viewer\Views': Microsoft.Windows.ManagementUI.CombinedControls.EventsNode
|
mmc.exe | AddIcons: Microsoft.TaskScheduler.SnapIn.TaskSchedulerExtension
|
Assiah.exe | Ready to work
|