File name:

Setup.exe

Full analysis: https://app.any.run/tasks/7b90dd8a-e27a-4a32-a73d-bc6579b83228
Verdict: Malicious activity
Threats:

Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks.

Analysis date: November 05, 2024, 04:58:06
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
lumma
stealer
amadey
botnet
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

65BB8F238E7AB57D49BB97571E96ABBE

SHA1:

91D2BA33479066D957B917B59CE5DD4091C645BB

SHA256:

CACC573A567A5B3DD379E8D9CBAC8E5B4F325F77D8C2814BC3B678BB084D71DC

SSDEEP:

98304:23Vj8l+OF4wAgIVHqGg7qYOE7qH0jdCflzJcJvx5CukXy910ohYIWZAuQIQmW9V9:HP8dzWh

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • LUMMA has been detected (SURICATA)

      • Kobzar.pif (PID: 6336)
      • svchost.exe (PID: 2172)
    • Connects to the CnC server

      • svchost.exe (PID: 2172)
      • explorer.exe (PID: 6552)
    • AMADEY has been detected (SURICATA)

      • explorer.exe (PID: 6552)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 6368)
    • Stealers network behavior

      • svchost.exe (PID: 2172)
    • Changes powershell execution policy (Bypass)

      • Kobzar.pif (PID: 6336)
  • SUSPICIOUS

    • Contacting a server suspected of hosting an CnC

      • Kobzar.pif (PID: 6336)
      • svchost.exe (PID: 2172)
      • explorer.exe (PID: 6552)
    • Executable content was dropped or overwritten

      • choice.exe (PID: 6676)
      • Kobzar.pif (PID: 6336)
      • AutoIt3.exe (PID: 7024)
    • Starts POWERSHELL.EXE for commands execution

      • Kobzar.pif (PID: 6336)
    • The process executes Powershell scripts

      • Kobzar.pif (PID: 6336)
    • Starts application with an unusual extension

      • choice.exe (PID: 6676)
    • Starts itself from another location

      • Kobzar.pif (PID: 6336)
  • INFO

    • Reads the computer name

      • Setup.exe (PID: 6548)
    • Checks supported languages

      • Setup.exe (PID: 6548)
    • Create files in a temporary directory

      • Setup.exe (PID: 6548)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | InstallShield setup (21.9)
.exe | Win64 Executable (generic) (14.1)
.exe | Win32 Executable (generic) (2.3)
.exe | Generic Win/DOS Executable (1)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2018:07:03 09:45:42+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 9
CodeSize: 3918848
InitializedDataSize: 6190592
UninitializedDataSize: -
EntryPoint: 0x7d090
OSVersion: 5
ImageVersion: -
SubsystemVersion: 5
Subsystem: Windows GUI
FileVersionNumber: 3.8.21.1854
ProductVersionNumber: 3.8.21.1854
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: This installation was built with Inno Setup.
CompanyName: Argon Digital FZ-LLC
FileDescription: UDL Client Installer
FileVersion: 3.8.21.1854
LegalCopyright: Argon Digital, 2023
OriginalFileName:
ProductName: UDL Client
ProductVersion: 3.8.21.1854
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
181
Monitored processes
52
Malicious processes
7
Suspicious processes
0

Behavior graph

Click at the process to see the details
start setup.exe no specs choice.exe conhost.exe no specs #LUMMA kobzar.pif #LUMMA svchost.exe w153rev153vsix6zanppodpwytt9ec.exe no specs powershell.exe no specs conhost.exe no specs choice.exe no specs conhost.exe no specs autoit3.exe microsoftedgeupdatecore.exe no specs microsoftedgeupdatecore.exe no specs microsoftedgeupdatecore.exe no specs microsoftedgeupdatecore.exe no specs microsoftedgeupdatecore.exe no specs microsoftedgeupdatecore.exe no specs microsoftedgeupdatecore.exe no specs microsoftedgeupdatecore.exe no specs microsoftedgeupdatecore.exe no specs microsoftedgeupdatecore.exe no specs microsoftedgeupdatecore.exe no specs microsoftedgeupdatecore.exe no specs microsoftedgeupdatecore.exe no specs microsoftedgeupdatecore.exe no specs microsoftedgeupdatecore.exe no specs microsoftedgeupdatecore.exe no specs microsoftedgeupdatecore.exe no specs microsoftedgeupdatecore.exe no specs microsoftedgeupdatecore.exe no specs microsoftedgeupdatecore.exe no specs microsoftedgeupdatecore.exe no specs microsoftedgeupdatecore.exe no specs microsoftedgeupdatecore.exe no specs microsoftedgeupdatecore.exe no specs microsoftedgeupdatecore.exe no specs microsoftedgeupdatecore.exe no specs microsoftedgeupdatecore.exe no specs microsoftedgeupdatecore.exe no specs microsoftedgeupdatecore.exe no specs microsoftedgeupdatecore.exe no specs microsoftedgeupdatecore.exe no specs microsoftedgeupdatecore.exe no specs microsoftedgeupdatecore.exe no specs microsoftedgeupdatecore.exe no specs microsoftedgeupdatecore.exe no specs microsoftedgeupdatecore.exe no specs microsoftedgeupdatecore.exe no specs microsoftedgeupdatecore.exe no specs microsoftedgeupdatecore.exe no specs microsoftedgeupdatecore.exe no specs #AMADEY explorer.exe

Process information

PID
CMD
Path
Indicators
Parent process
616"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.17\MicrosoftEdgeUpdateCore.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.17\MicrosoftEdgeUpdateCore.exeAutoIt3.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge Update
Exit code:
0
Version:
1.3.185.17
Modules
Images
c:\program files (x86)\microsoft\edgeupdate\1.3.185.17\microsoftedgeupdatecore.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
1332"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.17\MicrosoftEdgeUpdateCore.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.17\MicrosoftEdgeUpdateCore.exeAutoIt3.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge Update
Exit code:
0
Version:
1.3.185.17
Modules
Images
c:\program files (x86)\microsoft\edgeupdate\1.3.185.17\microsoftedgeupdatecore.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
1576"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.17\MicrosoftEdgeUpdateCore.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.17\MicrosoftEdgeUpdateCore.exeAutoIt3.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge Update
Exit code:
0
Version:
1.3.185.17
Modules
Images
c:\program files (x86)\microsoft\edgeupdate\1.3.185.17\microsoftedgeupdatecore.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
2140"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.17\MicrosoftEdgeUpdateCore.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.17\MicrosoftEdgeUpdateCore.exeAutoIt3.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge Update
Exit code:
0
Version:
1.3.185.17
Modules
Images
c:\program files (x86)\microsoft\edgeupdate\1.3.185.17\microsoftedgeupdatecore.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
2172C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2420"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.17\MicrosoftEdgeUpdateCore.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.17\MicrosoftEdgeUpdateCore.exeAutoIt3.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge Update
Exit code:
0
Version:
1.3.185.17
Modules
Images
c:\program files (x86)\microsoft\edgeupdate\1.3.185.17\microsoftedgeupdatecore.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
2648"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.17\MicrosoftEdgeUpdateCore.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.17\MicrosoftEdgeUpdateCore.exeAutoIt3.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge Update
Exit code:
0
Version:
1.3.185.17
Modules
Images
c:\program files (x86)\microsoft\edgeupdate\1.3.185.17\microsoftedgeupdatecore.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
2780"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.17\MicrosoftEdgeUpdateCore.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.17\MicrosoftEdgeUpdateCore.exeAutoIt3.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge Update
Exit code:
0
Version:
1.3.185.17
Modules
Images
c:\program files (x86)\microsoft\edgeupdate\1.3.185.17\microsoftedgeupdatecore.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
3028"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.17\MicrosoftEdgeUpdateCore.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.17\MicrosoftEdgeUpdateCore.exeAutoIt3.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge Update
Exit code:
0
Version:
1.3.185.17
Modules
Images
c:\program files (x86)\microsoft\edgeupdate\1.3.185.17\microsoftedgeupdatecore.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
3508"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.17\MicrosoftEdgeUpdateCore.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.17\MicrosoftEdgeUpdateCore.exeAutoIt3.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge Update
Exit code:
0
Version:
1.3.185.17
Modules
Images
c:\program files (x86)\microsoft\edgeupdate\1.3.185.17\microsoftedgeupdatecore.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
Total events
5 949
Read events
5 944
Write events
5
Delete events
0

Modification events

(PID) Process:(5084) W153REV153VSIX6ZANPPODPWYTT9EC.exeKey:HKEY_CURRENT_USER\SOFTWARE\PSPad
Operation:writeName:Ready5
Value:
0
(PID) Process:(7024) AutoIt3.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
Operation:writeName:ebhhaeg
Value:
"C:\hbcfbdf\AutoIt3.exe" C:\hbcfbdf\ebhhaeg.a3x
(PID) Process:(6552) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(6552) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(6552) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
Executable files
4
Suspicious files
8
Text files
5
Unknown types
0

Dropped files

PID
Process
Filename
Type
6676choice.exeC:\Users\admin\AppData\Local\Temp\has
MD5:
SHA256:
6336Kobzar.pifC:\Users\admin\AppData\Local\Temp\N660U5\Afflicted.a3x
MD5:
SHA256:
7024AutoIt3.exeC:\hbcfbdf\ebhhaeg.a3x
MD5:
SHA256:
6364choice.exeC:\Users\admin\AppData\Local\Temp\iaysd
MD5:
SHA256:
6676choice.exeC:\Users\admin\AppData\Local\Temp\Kobzar.pifexecutable
MD5:3F58A517F1F4796225137E7659AD2ADB
SHA256:1DA298CAB4D537B0B7B5DABF09BFF6A212B9E45731E0CC772F99026005FB9E48
6368powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_qhk2hj14.uue.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
6548Setup.exeC:\Users\admin\AppData\Local\Temp\7b27eb7cbinary
MD5:EA21187C43A834A6925E4820BA30CB7B
SHA256:08F786E23DA4253C57C3539E0576E5BF937D9D1A96349DD250EF540EC66F00F2
5084W153REV153VSIX6ZANPPODPWYTT9EC.exeC:\Users\admin\AppData\Local\Temp\83661d78binary
MD5:2DAAA38C23AFED2FA7FABF05F1CA862D
SHA256:1C143E659F2326ABEE9F59256FAAD47E74964E9ACAC0FCEC03487A28E0708F58
6336Kobzar.pifC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12binary
MD5:0364690C1436C5EDD33DE3F198E996A7
SHA256:C5FEFAF39C09530BD298A6FFF4ACFA9453A47424C10F090930673699405FDA2D
5084W153REV153VSIX6ZANPPODPWYTT9EC.exeC:\Users\admin\AppData\Local\Temp\83409c42image
MD5:8027FB9A4AB045ABA5C0FB3ED0189993
SHA256:DD431C8543292D40ACA382DAAFB3E658AC235FD99B66104796487F6B9B563D6E
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
11
TCP/UDP connections
50
DNS requests
32
Threats
15

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6944
svchost.exe
GET
200
23.32.238.107:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6944
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5232
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
4360
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
3948
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5232
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6464
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
6336
Kobzar.pif
GET
200
142.250.181.227:80
http://c.pki.goog/r/gsr1.crl
unknown
whitelisted
6336
Kobzar.pif
GET
200
142.250.181.227:80
http://c.pki.goog/r/r4.crl
unknown
whitelisted
6552
explorer.exe
POST
200
104.21.23.211:80
http://moviecentral-petparade.com/g9jvjfd73/index.php
unknown
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
944
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
104.126.37.144:443
www.bing.com
Akamai International B.V.
DE
whitelisted
5488
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6944
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
6944
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6944
svchost.exe
23.32.238.107:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
6944
svchost.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5488
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 4.231.128.59
  • 20.73.194.208
whitelisted
www.bing.com
  • 104.126.37.144
  • 104.126.37.178
  • 104.126.37.153
  • 104.126.37.139
  • 104.126.37.136
  • 104.126.37.186
  • 104.126.37.131
  • 104.126.37.128
  • 104.126.37.130
  • 104.126.37.137
  • 104.126.37.154
  • 104.126.37.123
  • 104.126.37.145
whitelisted
google.com
  • 142.250.185.142
whitelisted
crl.microsoft.com
  • 23.32.238.107
  • 23.32.238.112
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
login.live.com
  • 20.190.159.0
  • 40.126.31.71
  • 20.190.159.23
  • 20.190.159.4
  • 20.190.159.73
  • 40.126.31.67
  • 20.190.159.71
  • 20.190.159.75
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
th.bing.com
  • 104.126.37.130
  • 104.126.37.139
  • 104.126.37.144
  • 104.126.37.137
  • 104.126.37.154
  • 104.126.37.123
  • 104.126.37.145
  • 104.126.37.131
  • 104.126.37.128
whitelisted
go.microsoft.com
  • 184.30.17.189
whitelisted
slscr.update.microsoft.com
  • 52.149.20.212
whitelisted

Threats

PID
Process
Class
Message
2172
svchost.exe
Domain Observed Used for C2 Detected
ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (proggresinvj .cyou)
6336
Kobzar.pif
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (proggresinvj .cyou in TLS SNI)
6336
Kobzar.pif
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (proggresinvj .cyou in TLS SNI)
6336
Kobzar.pif
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (proggresinvj .cyou in TLS SNI)
6336
Kobzar.pif
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (proggresinvj .cyou in TLS SNI)
6336
Kobzar.pif
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (proggresinvj .cyou in TLS SNI)
6336
Kobzar.pif
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Lumma Stealer Related Domain (proggresinvj .cyou in TLS SNI)
2172
svchost.exe
Domain Observed Used for C2 Detected
STEALER [ANY.RUN] Domain has been identified as part of Lumma Stealer's infrastructure (creative-habitat .shop)
2172
svchost.exe
Domain Observed Used for C2 Detected
STEALER [ANY.RUN] Domain has been identified as part of Lumma Stealer's infrastructure (creative-habitat .shop)
2172
svchost.exe
Domain Observed Used for C2 Detected
STEALER [ANY.RUN] Domain has been identified as part of Lumma Stealer's infrastructure (creative-habitat .shop)
4 ETPRO signatures available at the full report
No debug info