| File name: | Amadey.zip |
| Full analysis: | https://app.any.run/tasks/c4f14a3f-5445-4ffe-b565-5f9340149c74 |
| Verdict: | Malicious activity |
| Threats: | Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks. |
| Analysis date: | February 09, 2024, 16:39:30 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/zip |
| File info: | Zip archive data, at least v5.1 to extract, compression method=AES Encrypted |
| MD5: | DAB5EFE9859A5B12FE00F4029DA6C3CB |
| SHA1: | C4B58A48D6618961EAEE6BC55C78D69DD7BC92E5 |
| SHA256: | DEA89F7CB29C4B385392AA46211C67605C7AAD51530A2CE8A7F24E5694BF9224 |
| SSDEEP: | 98304:DIMHtqmBSvt3krTNOlW2nWdsrFU3MMsRIYy84khdlPeH5HtXdwReJPWs46V/wcwT:ROFIGvnpIsmSw4fFHWH/o |
| .zip | | | ZIP compressed archive (100) |
|---|
| ZipRequiredVersion: | 51 |
|---|---|
| ZipBitFlag: | 0x0003 |
| ZipCompression: | Unknown (99) |
| ZipModifyDate: | 2024:01:29 07:52:10 |
| ZipCRC: | 0x1504441e |
| ZipCompressedSize: | 5799910 |
| ZipUncompressedSize: | 5951840 |
| ZipFileName: | e36fd0749bb46197c3c9de8ae137d0564898932124f74ddda170ee1f203d72d0.exe |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 712 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2116 --field-trial-handle=1160,i,1320336932810761098,10248675653920352427,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:1 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 109.0.5414.120 Modules
| |||||||||||||||
| 1348 | powershell -Command Compress-Archive -Path 'C:\Users\admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\admin\AppData\Local\Temp\302019708150_Desktop.zip' -CompressionLevel Optimal | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | rundll32.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 10.0.14409.1005 (rs1_srvoob.161208-1155) Modules
| |||||||||||||||
| 1696 | "C:\Windows\System32\rundll32.exe" C:\Users\admin\AppData\Roaming\80c6bf70bf3f8f\cred.dll, Main | C:\Windows\System32\rundll32.exe | Utsysc.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows host process (Rundll32) Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2000 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=109.0.5414.120 --initial-client-data=0xc8,0xcc,0xd0,0x9c,0xd4,0x6bcd8b38,0x6bcd8b48,0x6bcd8b54 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: MEDIUM Description: Google Chrome Exit code: 0 Version: 109.0.5414.120 Modules
| |||||||||||||||
| 2260 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1140 --field-trial-handle=1160,i,1320336932810761098,10248675653920352427,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:2 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 109.0.5414.120 Modules
| |||||||||||||||
| 2348 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1528 --field-trial-handle=1160,i,1320336932810761098,10248675653920352427,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:2 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 109.0.5414.120 Modules
| |||||||||||||||
| 2484 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --disable-quic --mojo-platform-channel-handle=1612 --field-trial-handle=1160,i,1320336932810761098,10248675653920352427,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 109.0.5414.120 Modules
| |||||||||||||||
| 2588 | "C:\Windows\System32\rundll32.exe" C:\Users\admin\AppData\Roaming\80c6bf70bf3f8f\clip.dll, Main | C:\Windows\System32\rundll32.exe | Utsysc.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows host process (Rundll32) Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2592 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --disable-quic --mojo-platform-channel-handle=1316 --field-trial-handle=1160,i,1320336932810761098,10248675653920352427,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 | C:\Program Files\Google\Chrome\Application\chrome.exe | chrome.exe | ||||||||||||
User: admin Company: Google LLC Integrity Level: MEDIUM Description: Google Chrome Exit code: 0 Version: 109.0.5414.120 Modules
| |||||||||||||||
| 2648 | netsh wlan show profiles | C:\Windows\System32\netsh.exe | — | rundll32.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Network Command Shell Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| (PID) Process: | (3668) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtBMP |
Value: | |||
| (PID) Process: | (3668) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtIcon |
Value: | |||
| (PID) Process: | (3668) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (3668) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 3 |
Value: C:\Users\admin\Desktop\phacker.zip | |||
| (PID) Process: | (3668) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\Win7-KB3191566-x86.zip | |||
| (PID) Process: | (3668) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\curl-8.5.0_1-win32-mingw.zip | |||
| (PID) Process: | (3668) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\AppData\Local\Temp\Amadey.zip | |||
| (PID) Process: | (3668) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (3668) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (3668) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3776 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old~RF18a071.TMP | — | |
MD5:— | SHA256:— | |||
| 3776 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old | — | |
MD5:— | SHA256:— | |||
| 3972 | e36fd0749bb46197c3c9de8ae137d0564898932124f74ddda170ee1f203d72d0.exe | C:\Users\admin\AppData\Local\Temp\4fdb51ccdc\Utsysc.exe | executable | |
MD5:807D1D2867127684704CDCED73584329 | SHA256:E36FD0749BB46197C3C9DE8AE137D0564898932124F74DDDA170EE1F203D72D0 | |||
| 3732 | Utsysc.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\cred[1].dll | executable | |
MD5:81281144EBEB9A8B40E6FDDC29C2AAAD | SHA256:DA7F5DA28E9058208A0BC4278218C75C603F56E5190FE8456E39843BBCC32917 | |||
| 3732 | Utsysc.exe | C:\Users\admin\AppData\Local\Temp\302019708150 | image | |
MD5:53706D3F72276C355979E269CA60E93E | SHA256:E93B840504914A845FA26EAC20AA957704B65B9F008D2C1E8098D849C78ABCC3 | |||
| 3776 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Variations | binary | |
MD5:961E3604F228B0D10541EBF921500C86 | SHA256:F7B24F2EB3D5EB0550527490395D2F61C3D2FE74BB9CB345197DAD81B58B5FED | |||
| 1348 | powershell.exe | C:\Users\admin\AppData\Local\Temp\cesknmqk.5n4.ps1 | binary | |
MD5:C4CA4238A0B923820DCC509A6F75849B | SHA256:— | |||
| 1348 | powershell.exe | C:\Users\admin\AppData\Local\Temp\ptdq0p5d.i5y.psm1 | binary | |
MD5:C4CA4238A0B923820DCC509A6F75849B | SHA256:— | |||
| 3668 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXb3668.26768\e36fd0749bb46197c3c9de8ae137d0564898932124f74ddda170ee1f203d72d0.exe | executable | |
MD5:807D1D2867127684704CDCED73584329 | SHA256:E36FD0749BB46197C3C9DE8AE137D0564898932124F74DDDA170EE1F203D72D0 | |||
| 3732 | Utsysc.exe | C:\Users\admin\AppData\Roaming\80c6bf70bf3f8f\cred.dll | executable | |
MD5:81281144EBEB9A8B40E6FDDC29C2AAAD | SHA256:DA7F5DA28E9058208A0BC4278218C75C603F56E5190FE8456E39843BBCC32917 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3732 | Utsysc.exe | POST | 200 | 185.172.128.5:80 | http://185.172.128.5/v8sjh3hs8/index.php | unknown | text | 7 b | unknown |
1696 | rundll32.exe | POST | 200 | 185.172.128.5:80 | http://185.172.128.5/v8sjh3hs8/index.php | unknown | binary | 1 b | unknown |
2588 | rundll32.exe | POST | 200 | 185.172.128.5:80 | http://185.172.128.5/v8sjh3hs8/index.php | unknown | text | 34 b | unknown |
3732 | Utsysc.exe | GET | 200 | 185.172.128.5:80 | http://185.172.128.5/v8sjh3hs8/Plugins/clip.dll | unknown | executable | 102 Kb | unknown |
3732 | Utsysc.exe | GET | 200 | 185.172.128.5:80 | http://185.172.128.5/v8sjh3hs8/Plugins/cred.dll | unknown | executable | 1.03 Mb | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1080 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
3732 | Utsysc.exe | 185.172.128.5:80 | — | OOO Nadym Svyaz Service | RU | malicious |
1696 | rundll32.exe | 185.172.128.5:80 | — | OOO Nadym Svyaz Service | RU | malicious |
3776 | chrome.exe | 239.255.255.250:1900 | — | — | — | unknown |
2592 | chrome.exe | 172.217.16.195:443 | clientservices.googleapis.com | GOOGLE | US | whitelisted |
2592 | chrome.exe | 74.125.71.84:443 | accounts.google.com | GOOGLE | US | unknown |
2592 | chrome.exe | 142.250.186.164:443 | www.google.com | GOOGLE | US | whitelisted |
2588 | rundll32.exe | 185.172.128.5:80 | — | OOO Nadym Svyaz Service | RU | malicious |
Domain | IP | Reputation |
|---|---|---|
clientservices.googleapis.com |
| whitelisted |
accounts.google.com |
| shared |
www.google.com |
| whitelisted |
update.googleapis.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
3732 | Utsysc.exe | Potentially Bad Traffic | ET INFO Dotted Quad Host DLL Request |
3732 | Utsysc.exe | Potential Corporate Privacy Violation | AV POLICY HTTP request for .dll file with no User-Agent |
3732 | Utsysc.exe | A Network Trojan was detected | ET MALWARE Win32/Amadey Payload Request (GET) M2 |
3732 | Utsysc.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
3732 | Utsysc.exe | Potentially Bad Traffic | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |
1696 | rundll32.exe | Successful Credential Theft Detected | SUSPICIOUS [ANY.RUN] Clear Text Password Exfiltration Atempt |
1696 | rundll32.exe | Successful Credential Theft Detected | SUSPICIOUS [ANY.RUN] Clear Text Password Exfiltration Atempt |
3732 | Utsysc.exe | Potentially Bad Traffic | ET INFO Dotted Quad Host DLL Request |
3732 | Utsysc.exe | Potential Corporate Privacy Violation | AV POLICY HTTP request for .dll file with no User-Agent |
3732 | Utsysc.exe | A Network Trojan was detected | ET MALWARE Win32/Amadey Payload Request (GET) M1 |