| File name: | 87467eface309ac95e0df4afd0bea2a3.exe |
| Full analysis: | https://app.any.run/tasks/3446ef9f-28e8-4315-8b27-091f2dcde547 |
| Verdict: | Malicious activity |
| Threats: | Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks. |
| Analysis date: | August 10, 2023, 06:34:10 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | 87467EFACE309AC95E0DF4AFD0BEA2A3 |
| SHA1: | 0689ED36F00A6AE85FD827CC55B15CE59829091C |
| SHA256: | FFD6751DE1DB3DBD68D7E10F164D5BF464BAD385AB1DEBF5C5EFC156BC0F3DB7 |
| SSDEEP: | 12288:EMr2y90j48288+FmnyOz/d0XLWG0sbPZMZ0iOAkl1U:6yw13BFcV0XLW3sSZEAkly |
| .exe | | | Win32 Executable MS Visual C++ (generic) (42.2) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (37.3) |
| .dll | | | Win32 Dynamic Link Library (generic) (8.8) |
| .exe | | | Win32 Executable (generic) (6) |
| .exe | | | Generic Win/DOS Executable (2.7) |
| ProductVersion: | 11.00.17763.1 |
|---|---|
| ProductName: | Internet Explorer |
| OriginalFileName: | WEXTRACT.EXE .MUI |
| LegalCopyright: | © Microsoft Corporation. All rights reserved. |
| InternalName: | Wextract |
| FileVersion: | 11.00.17763.1 (WinBuild.160101.0800) |
| FileDescription: | Win32 Cabinet Self-Extractor |
| CompanyName: | Microsoft Corporation |
| CharacterSet: | Unicode |
| LanguageCode: | English (U.S.) |
| FileSubtype: | - |
| ObjectFileType: | Executable application |
| FileOS: | Windows NT 32-bit |
| FileFlags: | (none) |
| FileFlagsMask: | 0x003f |
| ProductVersionNumber: | 11.0.17763.1 |
| FileVersionNumber: | 11.0.17763.1 |
| Subsystem: | Windows GUI |
| SubsystemVersion: | 6 |
| ImageVersion: | 10 |
| OSVersion: | 10 |
| EntryPoint: | 0x6a60 |
| UninitializedDataSize: | - |
| InitializedDataSize: | 544768 |
| CodeSize: | 25600 |
| LinkerVersion: | 14.13 |
| PEType: | PE32 |
| ImageFileCharacteristics: | Executable, 32-bit |
| TimeStamp: | 2022:05:24 22:49:06+00:00 |
| MachineType: | Intel 386 or later, and compatibles |
| Architecture: | IMAGE_FILE_MACHINE_I386 |
|---|---|
| Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
| Compilation Date: | 24-May-2022 22:49:06 |
| Detected languages: |
|
| Debug artifacts: |
|
| CompanyName: | Microsoft Corporation |
| FileDescription: | Win32 Cabinet Self-Extractor |
| FileVersion: | 11.00.17763.1 (WinBuild.160101.0800) |
| InternalName: | Wextract |
| LegalCopyright: | © Microsoft Corporation. All rights reserved. |
| OriginalFilename: | WEXTRACT.EXE .MUI |
| ProductName: | Internet Explorer |
| ProductVersion: | 11.00.17763.1 |
| Magic number: | MZ |
|---|---|
| Bytes on last page of file: | 0x0090 |
| Pages in file: | 0x0003 |
| Relocations: | 0x0000 |
| Size of header: | 0x0004 |
| Min extra paragraphs: | 0x0000 |
| Max extra paragraphs: | 0xFFFF |
| Initial SS value: | 0x0000 |
| Initial SP value: | 0x00B8 |
| Checksum: | 0x0000 |
| Initial IP value: | 0x0000 |
| Initial CS value: | 0x0000 |
| Overlay number: | 0x0000 |
| OEM identifier: | 0x0000 |
| OEM information: | 0x0000 |
| Address of NE header: | 0x000000E0 |
| Signature: | PE |
|---|---|
| Machine: | IMAGE_FILE_MACHINE_I386 |
| Number of sections: | 5 |
| Time date stamp: | 24-May-2022 22:49:06 |
| Pointer to Symbol Table: | 0x00000000 |
| Number of symbols: | 0 |
| Size of Optional Header: | 0x00E0 |
| Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
|---|---|---|---|---|---|
.text | 0x00001000 | 0x00006314 | 0x00006400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.31416 |
.data | 0x00008000 | 0x00001A48 | 0x00000200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.97064 |
.idata | 0x0000A000 | 0x00001052 | 0x00001200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.02595 |
.rsrc | 0x0000C000 | 0x00084000 | 0x00083200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.89023 |
.reloc | 0x00090000 | 0x00000888 | 0x00000A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 6.22264 |
Title | Entropy | Size | Codepage | Language | Type |
|---|---|---|---|---|---|
1 | 5.00338 | 2018 | Latin 1 / Western European | English - United States | RT_MANIFEST |
2 | 3.15864 | 744 | Latin 1 / Western European | English - United States | RT_ICON |
3 | 3.07737 | 488 | Latin 1 / Western European | English - United States | RT_ICON |
4 | 3.50949 | 296 | Latin 1 / Western European | English - United States | RT_ICON |
5 | 5.56662 | 3752 | Latin 1 / Western European | English - United States | RT_ICON |
6 | 5.94251 | 2216 | Latin 1 / Western European | English - United States | RT_ICON |
7 | 5.99361 | 1736 | Latin 1 / Western European | English - United States | RT_ICON |
8 | 3.37828 | 1384 | Latin 1 / Western European | English - United States | RT_ICON |
9 | 7.98515 | 55762 | Latin 1 / Western European | English - United States | RT_ICON |
10 | 5.33023 | 9640 | Latin 1 / Western European | English - United States | RT_ICON |
ADVAPI32.dll |
COMCTL32.dll |
Cabinet.dll |
GDI32.dll |
KERNEL32.dll |
USER32.dll |
VERSION.dll |
msvcrt.dll |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 124 | C:\Users\admin\AppData\Local\Temp\IXP001.TMP\i4182369.exe | C:\Users\admin\AppData\Local\Temp\IXP001.TMP\i4182369.exe | x8914411.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Description: Nirtro CPU Exit code: 0 Version: 15.9.1.22 Modules
| |||||||||||||||
| 460 | C:\Windows\system32\cmd.exe /S /D /c" echo Y" | C:\Windows\SysWOW64\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 988 | C:\Users\admin\AppData\Local\Temp\IXP002.TMP\g3596809.exe | C:\Users\admin\AppData\Local\Temp\IXP002.TMP\g3596809.exe | x1128234.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 1212 | CACLS "pdates.exe" /P "admin:N" | C:\Windows\SysWOW64\cacls.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Control ACLs Program Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1748 | C:\Users\admin\AppData\Local\Temp\925e7e99c5\pdates.exe | C:\Users\admin\AppData\Local\Temp\925e7e99c5\pdates.exe | — | taskeng.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 1812 | CACLS "..\925e7e99c5" /P "admin:R" /E | C:\Windows\SysWOW64\cacls.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Control ACLs Program Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2032 | "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN pdates.exe /TR "C:\Users\admin\AppData\Local\Temp\925e7e99c5\pdates.exe" /F | C:\Windows\SysWOW64\schtasks.exe | — | pdates.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Manages scheduled tasks Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2200 | "C:\Windows\System32\rundll32.exe" C:\Users\admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main | C:\Windows\SysWOW64\rundll32.exe | — | pdates.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows host process (Rundll32) Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2244 | C:\Users\admin\AppData\Local\Temp\IXP000.TMP\j2474423.exe | C:\Users\admin\AppData\Local\Temp\IXP000.TMP\j2474423.exe | 87467eface309ac95e0df4afd0bea2a3.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 1 Modules
| |||||||||||||||
| 2288 | C:\Users\admin\AppData\Local\Temp\IXP002.TMP\h8637401.exe | C:\Users\admin\AppData\Local\Temp\IXP002.TMP\h8637401.exe | — | x1128234.exe | |||||||||||
User: admin Integrity Level: MEDIUM Description: Healer Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
| (PID) Process: | (988) g3596809.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (988) g3596809.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (988) g3596809.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (988) g3596809.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (2892) pdates.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders |
| Operation: | write | Name: | Startup |
Value: %USERPROFILE%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup | |||
| (PID) Process: | (2892) pdates.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (2892) pdates.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (2892) pdates.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (2892) pdates.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (2892) pdates.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2604 | x8914411.exe | C:\Users\admin\AppData\Local\Temp\IXP001.TMP\x1128234.exe | executable | |
MD5:C8C2F464B0E44B76D0881CFDD1697237 | SHA256:5D82C9BAA2DF6CA7608BDD03241EBE3E76E8AAC455C8809A636695F1EACBD391 | |||
| 2304 | x1128234.exe | C:\Users\admin\AppData\Local\Temp\IXP002.TMP\g3596809.exe | executable | |
MD5:AEA234064483F651010CF9D981F59FEA | SHA256:58B02C8B4BC2BF7F5F1E8E45D7C206956F188AE56B648922CA75987B999DB503 | |||
| 2556 | 87467eface309ac95e0df4afd0bea2a3.exe | C:\Users\admin\AppData\Local\Temp\IXP000.TMP\x8914411.exe | executable | |
MD5:22A93B65851ACEDDE79FBC72FC6F0C8F | SHA256:95DE6FCEE41BB021D51C93F5912B846FB2EFFD0BFDD3B78C79E07F0EEED33E52 | |||
| 2556 | 87467eface309ac95e0df4afd0bea2a3.exe | C:\Users\admin\AppData\Local\Temp\IXP000.TMP\j2474423.exe | executable | |
MD5:29456B9717E85BEDA547E6272F8EA41F | SHA256:5565513617FCF913A26555F1FA1E81943678653B53E2472535F3FB273AD89116 | |||
| 2892 | pdates.exe | C:\Users\admin\AppData\Roaming\006700e5a2ab05\cred64.dll | html | |
MD5:9851B884BF4AADFADE57D911A3F03332 | SHA256:03AFB988F3EEC62C2DA682AF371625ADCAC5A0E69615298F83D99365AB07AC0F | |||
| 2244 | j2474423.exe | C:\Users\admin\AppData\Local\Temp\4375vtb45tv8225nv4285n2.txt | text | |
MD5:8EB5AF4EE6535481154194A1131445DB | SHA256:498BFCDDE8631BF94A045CA3DB6386B1B26698457E90F30F639F7217AEC87123 | |||
| 2892 | pdates.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BDW1XBVN\clip64[1].dll | executable | |
MD5:2392B231CF4A80739B5CB09BF808127D | SHA256:2244B4DC9AFC6CFAB7EF1DEA92420E2ACD275BAC7349B929A69F3C1AE25F5E2F | |||
| 2304 | x1128234.exe | C:\Users\admin\AppData\Local\Temp\IXP002.TMP\h8637401.exe | executable | |
MD5:7E93BACBBC33E6652E147E7FE07572A0 | SHA256:850CD190AAEEBCF1505674D97F51756F325E650320EAF76785D954223A9BEE38 | |||
| 988 | g3596809.exe | C:\Users\admin\AppData\Local\Temp\925e7e99c5\pdates.exe | executable | |
MD5:AEA234064483F651010CF9D981F59FEA | SHA256:58B02C8B4BC2BF7F5F1E8E45D7C206956F188AE56B648922CA75987B999DB503 | |||
| 2604 | x8914411.exe | C:\Users\admin\AppData\Local\Temp\IXP001.TMP\i4182369.exe | executable | |
MD5:2FE82DC1F9AAA4120C3510FA419AC8F5 | SHA256:19EA5B5506F3F6D2273B59B6AC944E53DEC6FA33FA2682BA8C3EB039BB73279B | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2892 | pdates.exe | GET | 200 | 77.91.68.61:80 | http://77.91.68.61/rock/Plugins/clip64.dll | RU | executable | 89.0 Kb | malicious |
2244 | j2474423.exe | POST | 200 | 193.233.254.61:80 | http://193.233.254.61/loghub/master | RU | text | 8 b | malicious |
2892 | pdates.exe | GET | 404 | 77.91.68.61:80 | http://77.91.68.61/rock/Plugins/cred64.dll | RU | html | 273 b | malicious |
2892 | pdates.exe | POST | 200 | 77.91.68.61:80 | http://77.91.68.61/rock/index.php | RU | text | 6 b | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
328 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
124 | i4182369.exe | 77.91.124.156:19071 | — | Foton Telecom CJSC | RU | malicious |
2892 | pdates.exe | 77.91.68.61:80 | — | Foton Telecom CJSC | RU | malicious |
2244 | j2474423.exe | 193.233.254.61:80 | — | LLC Baxet | RU | malicious |
PID | Process | Class | Message |
|---|---|---|---|
124 | i4182369.exe | Potentially Bad Traffic | ET INFO Microsoft net.tcp Connection Initialization Activity |
124 | i4182369.exe | A Network Trojan was detected | ET MALWARE Redline Stealer TCP CnC Activity |
124 | i4182369.exe | A Network Trojan was detected | ET MALWARE [ANY.RUN] RedLine Stealer Related (MC-NMF Authorization) |
124 | i4182369.exe | A Network Trojan was detected | ET MALWARE Redline Stealer TCP CnC - Id1Response |
2892 | pdates.exe | Malware Command and Control Activity Detected | ET MALWARE Amadey CnC Check-In |
2892 | pdates.exe | A Network Trojan was detected | ET MALWARE Win32/Amadey Bot Activity (POST) M2 |
2892 | pdates.exe | A Network Trojan was detected | AV TROJAN Agent.DHOA System Info Exfiltration |
— | — | A Network Trojan was detected | ET MALWARE Redline Stealer TCP CnC Activity |
124 | i4182369.exe | A Network Trojan was detected | ET MALWARE Redline Stealer TCP CnC Activity |
124 | i4182369.exe | A Network Trojan was detected | ET MALWARE Redline Stealer Activity (Response) |
Process | Message |
|---|---|
j2474423.exe | 2023-08-10 06:34:43 [j2474423.exe 2244] Trying to connect to http://193.233.254.61/
|
j2474423.exe | 2023-08-10 06:34:43 [j2474423.exe 2244] ERROR in ..\stealer\stealer.cpp, line 156, function Start. Failed to connect to http://193.233.254.61/
|