| download: | File_pass1234.7z |
| Full analysis: | https://app.any.run/tasks/f29222a2-d055-4537-be61-167bfb2b3981 |
| Verdict: | Malicious activity |
| Threats: | Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks. |
| Analysis date: | June 28, 2023, 11:20:20 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-7z-compressed |
| File info: | 7-zip archive data, version 0.4 |
| MD5: | 3C2AF2430010E312D337D776CCF090B4 |
| SHA1: | E44D3E1A90D427AE5C18FDE94DD3A9F280FDE3B3 |
| SHA256: | F8258E5F0B1154BD3DF426661F578AF3CDB52E7A77030C6549A8D1CC5541A9C1 |
| SSDEEP: | 98304:J/u1EAMekXkRZf0CExiEDua0eYacrWFuacM9ovT3Gj0fzBraemIHBOj6VDXXCxPr:JGSbfGZfoIEKa0evciUM9q/NZHBOMDXy |
| .7z | | | 7-Zip compressed archive (v0.4) (57.1) |
|---|---|---|
| .7z | | | 7-Zip compressed archive (gen) (42.8) |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 116 | C:\Users\admin\AppData\Local\Temp\IXP002.TMP\v6153492.exe | C:\Users\admin\AppData\Local\Temp\IXP002.TMP\v6153492.exe | v8483071.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Win32 Cabinet Self-Extractor Exit code: 0 Version: 11.00.17763.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 128 | C:\Windows\system32\RAServer.exe /offerraupdate | C:\Windows\System32\raserver.exe | — | services.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Remote Assistance COM Server Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 600 | C:\Users\admin\AppData\Roaming\{846ee340-7039-11de-9d20-806e6f6e6963}\P3DoLAorJ.exe | — | RefSpacer628.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 616 | "C:\Windows\System32\sc.exe" start cxutzohb | C:\Windows\SysWOW64\sc.exe | — | 2JopeOHvjj3afHSIa7r5gDa6.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: A tool to aid in developing services for WindowsNT Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 616 | "C:\Users\admin\Documents\jmFvusbCB4U7RJdpoa9YwPqO.exe" | C:\Users\admin\Documents\jmFvusbCB4U7RJdpoa9YwPqO.exe | G8Ke6lDpgrWAks8QyCWKap5R.exe | ||||||||||||
User: admin Company: N-able Take Control Integrity Level: HIGH Description: TCDirectChat Exit code: 0 Version: 7.0.45.1145 Modules
| |||||||||||||||
| 624 | "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&" | C:\Windows\SysWOW64\forfiles.exe | — | Install.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: ForFiles - Executes a command on selected files Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 684 | C:\Windows\SysWOW64\cxutzohb\mcyniayg.exe /d"C:\Users\admin\Pictures\Minor Policy\2JopeOHvjj3afHSIa7r5gDa6.exe" | C:\Windows\SysWOW64\cxutzohb\mcyniayg.exe | — | services.exe | |||||||||||
User: SYSTEM Integrity Level: SYSTEM Exit code: 0 Modules
| |||||||||||||||
| 700 | "C:\Users\admin\Pictures\Minor Policy\G8Ke6lDpgrWAks8QyCWKap5R.exe" | C:\Users\admin\Pictures\Minor Policy\G8Ke6lDpgrWAks8QyCWKap5R.exe | File.exe | ||||||||||||
User: admin Company: N-able Take Control Integrity Level: HIGH Description: TCDirectChat Exit code: 0 Version: 7.0.45.1145 Modules
| |||||||||||||||
| 1032 | "C:\Users\admin\Pictures\Minor Policy\0_7MNb1uVdQPQUexq9UQSRa7.exe" | C:\Users\admin\Pictures\Minor Policy\0_7MNb1uVdQPQUexq9UQSRa7.exe | File.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 1160 | C:\Users\admin\AppData\Local\Temp\IXP001.TMP\v8483071.exe | C:\Users\admin\AppData\Local\Temp\IXP001.TMP\v8483071.exe | v7192759.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Win32 Cabinet Self-Extractor Exit code: 0 Version: 11.00.17763.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (1960) explorer.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\14C\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (1960) explorer.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0 |
| Operation: | write | Name: | CheckSetting |
Value: 01000000D08C9DDF0115D1118C7A00C04FC297EB0100000040131FD0E0B45449B5325CF35709B45A0000000002000000000010660000000100002000000097BA847E5D0827CAFBC4D33F7B8AFE8834428DFEF065FA018D8CAB90C5710B0A000000000E8000000002000020000000703BDF28CF4D9DFCAB7DDC229F11B838657F02A563D675B7BA5A582848A73F4F300000008091631BBFD318C1A67DDE62193EF5F65F823DF6F3FB12C344A857963FC714699639A04F9F66927C69CA8E9AC61E02154000000007CED62AF9113E09870DE72EB5744E2CBFDC316C2CF8607885EA5CBB68D61BE0CFB49EE1C4CAF8F2769692B62252F8AB0F88C1F92875F93F72FE70BCC896EFE4 | |||
| (PID) Process: | (2580) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\14C\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (1960) explorer.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count |
| Operation: | write | Name: | {6Q809377-6NS0-444O-8957-N3773S02200R}\JvaENE\JvaENE.rkr |
Value: 000000000B000000050000001E9A0000000080BF000080BF000080BF000080BF000080BF000080BF000080BF000080BF000080BF000080BFFFFFFFFF30D9B8CEF2F1D80100000000 | |||
| (PID) Process: | (1960) explorer.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count |
| Operation: | write | Name: | HRZR_PGYFRFFVBA |
Value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| |||
| (PID) Process: | (2580) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip | |||
| (PID) Process: | (2580) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\Win7AndW2K8R2-KB3191566-x64.zip | |||
| (PID) Process: | (2580) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\Desktop\phacker.zip | |||
| (PID) Process: | (2580) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (2580) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2580 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXb2580.23183\File.exe | — | |
MD5:— | SHA256:— | |||
| 2544 | File.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\J06UCEIP.txt | text | |
MD5:2080ACA3D8E39A477F0A75B1525EEEDD | SHA256:F2D7069BED2035ECCECBAE50DC64BC9F9FF45B4D055FF423D8CF89FC309EB510 | |||
| 2544 | File.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BDW1XBVN\setup[1].exe | executable | |
MD5:2B046520B577691511FD925ED9F00624 | SHA256:B9703314498FA31879F4FCBC532361E13C2E5CE8DB8C3E90EE29340036C088C0 | |||
| 2544 | File.exe | C:\Windows\System32\GroupPolicy\Machine\Registry.pol | binary | |
MD5:CDFD60E717A44C2349B553E011958B85 | SHA256:0EE08DA4DA3E4133E1809099FC646468E7156644C9A772F704B80E338015211F | |||
| 2544 | File.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BDW1XBVN\2[1].exe | executable | |
MD5:2EFB4C902EBBC6B351954EBBDD7F13B9 | SHA256:8302C7AD199E5BA118A309E5304970362EF1087C53612B4D3FA300822926E36E | |||
| 2544 | File.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\F433SGDE.txt | text | |
MD5:FCF7470BF6185427622A1DB55805EAAC | SHA256:D1D733BF957BF5EE6D9CAEA35FBF5F9AD5870FA619CB5DF93E1B05BE8F89A443 | |||
| 2544 | File.exe | C:\Users\admin\Pictures\Minor Policy\oQAQe7wE61HNek19Ntr3LPgr.exe | html | |
MD5:7A6364A82A2DE55DFFB7126319D1BA21 | SHA256:F1F9CAA274DC42C373320AEC93F6A6724C9C719E82480DA9EEC6A8BCCF7476C3 | |||
| 2544 | File.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BDW1XBVN\Service32[1].exe | executable | |
MD5:831F2A5B64F7C7193B2D54777DCF3C14 | SHA256:7A650B7AF16721E46686633A253C967184414183A7D2BE0CB64978E4D8880BA6 | |||
| 2544 | File.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HQYU0XHJ\WWW1[1].bmp | — | |
MD5:— | SHA256:— | |||
| 2544 | File.exe | C:\Users\admin\Pictures\Minor Policy\x34mqdPHZOJJaR4PWoCpjZnh.exe | — | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2544 | File.exe | HEAD | 200 | 163.123.143.4:80 | http://163.123.143.4/download/Service32.exe | unknown | — | — | malicious |
2544 | File.exe | HEAD | — | 176.113.115.239:80 | http://176.113.115.239:8080/4.php | RU | — | — | suspicious |
2544 | File.exe | GET | — | 45.12.253.74:80 | http://45.12.253.74/pineapple.php?pub=mixinte | BG | — | — | malicious |
2544 | File.exe | HEAD | 200 | 83.97.73.134:80 | http://83.97.73.134/gallery/photo085.exe | unknown | — | — | malicious |
2544 | File.exe | HEAD | 200 | 45.12.253.74:80 | http://45.12.253.74/pineapple.php?pub=mixinte | BG | — | — | malicious |
2544 | File.exe | GET | — | 156.236.72.121:80 | http://zzz.fhauiehgha.com/m/okka25.exe | US | — | — | malicious |
2544 | File.exe | HEAD | 200 | 45.9.74.6:80 | http://45.9.74.6/2.exe | SC | — | — | malicious |
2544 | File.exe | GET | — | 163.123.143.4:80 | http://163.123.143.4/download/Service32.exe | unknown | — | — | malicious |
2544 | File.exe | GET | — | 176.113.115.239:8080 | http://176.113.115.239:8080/4.php | RU | — | — | suspicious |
2544 | File.exe | GET | — | 83.97.73.134:80 | http://83.97.73.134/gallery/photo085.exe | unknown | — | — | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
2544 | File.exe | 131.255.7.10:80 | callusoyasociados.com.ar | InterBS S.R.L. BAEHOST | AR | suspicious |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
328 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
2544 | File.exe | 94.142.138.131:80 | — | Network Management Ltd | RU | malicious |
2544 | File.exe | 104.26.8.59:443 | api.myip.com | CLOUDFLARENET | US | suspicious |
2544 | File.exe | 87.240.129.133:80 | vk.com | VKontakte Ltd | RU | malicious |
2544 | File.exe | 34.117.59.81:443 | ipinfo.io | GOOGLE-CLOUD-PLATFORM | US | whitelisted |
2544 | File.exe | 87.240.129.133:443 | vk.com | VKontakte Ltd | RU | malicious |
2544 | File.exe | 87.240.132.72:443 | vk.com | VKontakte Ltd | RU | suspicious |
2544 | File.exe | 87.240.137.164:80 | vk.com | VKontakte Ltd | RU | suspicious |
Domain | IP | Reputation |
|---|---|---|
api.myip.com |
| suspicious |
ipinfo.io |
| shared |
teredo.ipv6.microsoft.com |
| whitelisted |
vk.com |
| whitelisted |
dns.msftncsi.com |
| shared |
zzz.fhauiehgha.com |
| malicious |
hugersi.com |
| suspicious |
traffic-to.site |
| unknown |
bitbucket.org |
| shared |
callusoyasociados.com.ar |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
2544 | File.exe | Device Retrieving External IP Address Detected | ET INFO Observed External IP Lookup Domain in TLS SNI (api .myip .com) |
2544 | File.exe | Malware Command and Control Activity Detected | ET MALWARE Win32/BeamWinHTTP CnC Activity M2 (GET) |
2544 | File.exe | Device Retrieving External IP Address Detected | ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io) |
2544 | File.exe | Generic Protocol Command Decode | SURICATA HTTP Unexpected Request body |
2544 | File.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
2544 | File.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
2544 | File.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
2544 | File.exe | Potentially Bad Traffic | ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response |
2544 | File.exe | Misc activity | ET INFO EXE - Served Attached HTTP |
2544 | File.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |