Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Aug. 7, 2023, 9:09 a.m. | Aug. 7, 2023, 9:11 a.m. |
-
-
-
schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN bstyoops.exe /TR "C:\Users\test22\AppData\Local\Temp\b6ba12ff32\bstyoops.exe" /F
2212 -
cmd.exe "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "bstyoops.exe" /P "test22:N"&&CACLS "bstyoops.exe" /P "test22:R" /E&&echo Y|CACLS "..\b6ba12ff32" /P "test22:N"&&CACLS "..\b6ba12ff32" /P "test22:R" /E&&Exit
2264-
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
2340 -
cacls.exe CACLS "bstyoops.exe" /P "test22:N"
2380 -
cacls.exe CACLS "bstyoops.exe" /P "test22:R" /E
2448 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo Y"
2496 -
cacls.exe CACLS "..\b6ba12ff32" /P "test22:N"
2532 -
cacls.exe CACLS "..\b6ba12ff32" /P "test22:R" /E
2588
-
-
-
-
explorer.exe C:\Windows\Explorer.EXE
1236
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
pdb_path | D:\Mktmp\Amadey\Release\Amadey.pdb |
description | bstyoops.exe tried to sleep 141 seconds, actually delayed analysis time by 141 seconds |
cmdline | SCHTASKS /Create /SC MINUTE /MO 1 /TN bstyoops.exe /TR "C:\Users\test22\AppData\Local\Temp\b6ba12ff32\bstyoops.exe" /F |
cmdline | "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "bstyoops.exe" /P "test22:N"&&CACLS "bstyoops.exe" /P "test22:R" /E&&echo Y|CACLS "..\b6ba12ff32" /P "test22:N"&&CACLS "..\b6ba12ff32" /P "test22:R" /E&&Exit |
cmdline | C:\Windows\system32\cmd.exe /S /D /c" echo Y" |
cmdline | "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN bstyoops.exe /TR "C:\Users\test22\AppData\Local\Temp\b6ba12ff32\bstyoops.exe" /F |
file | C:\Users\test22\AppData\Local\Temp\b6ba12ff32\bstyoops.exe |
file | C:\Users\test22\AppData\Local\Temp\b6ba12ff32\bstyoops.exe |
cmdline | SCHTASKS /Create /SC MINUTE /MO 1 /TN bstyoops.exe /TR "C:\Users\test22\AppData\Local\Temp\b6ba12ff32\bstyoops.exe" /F |
cmdline | "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN bstyoops.exe /TR "C:\Users\test22\AppData\Local\Temp\b6ba12ff32\bstyoops.exe" /F |
file | C:\ProgramData\AVAST Software |
file | C:\ProgramData\Avira |
file | C:\ProgramData\Kaspersky Lab |
file | C:\ProgramData\Panda Security |
file | C:\ProgramData\Bitdefender |
file | C:\ProgramData\AVG |
file | C:\ProgramData\Doctor Web |
cmdline | SCHTASKS /Create /SC MINUTE /MO 1 /TN bstyoops.exe /TR "C:\Users\test22\AppData\Local\Temp\b6ba12ff32\bstyoops.exe" /F |
cmdline | "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN bstyoops.exe /TR "C:\Users\test22\AppData\Local\Temp\b6ba12ff32\bstyoops.exe" /F |
cmdline | CACLS "..\b6ba12ff32" /P "test22:R" /E |
cmdline | CACLS "bstyoops.exe" /P "test22:R" /E |
cmdline | CACLS "bstyoops.exe" /P "test22:N" |
cmdline | "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "bstyoops.exe" /P "test22:N"&&CACLS "bstyoops.exe" /P "test22:R" /E&&echo Y|CACLS "..\b6ba12ff32" /P "test22:N"&&CACLS "..\b6ba12ff32" /P "test22:R" /E&&Exit |
cmdline | cmd /k echo Y|CACLS "bstyoops.exe" /P "test22:N"&&CACLS "bstyoops.exe" /P "test22:R" /E&&echo Y|CACLS "..\b6ba12ff32" /P "test22:N"&&CACLS "..\b6ba12ff32" /P "test22:R" /E&&Exit |
cmdline | CACLS "..\b6ba12ff32" /P "test22:N" |
Bkav | W32.AIDetectMalware |
Elastic | Windows.Trojan.Amadey |
Cynet | Malicious (score: 100) |
McAfee | Downloader-FCND!90E148220861 |
Cylance | unsafe |
Sangfor | Suspicious.Win32.Save.a |
K7AntiVirus | Trojan ( 005a7a4a1 ) |
Alibaba | TrojanDownloader:Win32/Amadey.3586b182 |
K7GW | Trojan ( 005a7a4a1 ) |
Cybereason | malicious.208611 |
Cyren | W32/Amadey.C1.gen!Eldorado |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of Win32/TrojanDownloader.Amadey.A |
APEX | Malicious |
ClamAV | Win.Malware.Doina-10001799-0 |
Kaspersky | HEUR:Trojan-Downloader.Win32.Deyma.gen |
BitDefender | Gen:Variant.Doina.60896 |
MicroWorld-eScan | Gen:Variant.Doina.60896 |
Avast | Win32:BotX-gen [Trj] |
Rising | Spyware.Agent!8.C6 (TFE:5:Ff7t0kYd78J) |
Emsisoft | Gen:Variant.Doina.60896 (B) |
F-Secure | Heuristic.HEUR/AGEN.1319380 |
VIPRE | Gen:Variant.Doina.60896 |
TrendMicro | Trojan.Win32.AMADEY.YXDHEZ |
McAfee-GW-Edition | BehavesLike.Win32.Generic.dh |
FireEye | Generic.mg.90e1482208611ebf |
Sophos | Mal/Generic-R |
SentinelOne | Static AI - Malicious PE |
GData | Gen:Variant.Doina.60896 |
Avira | HEUR/AGEN.1319380 |
MAX | malware (ai score=88) |
Antiy-AVL | Trojan[Downloader]/Win32.Amadey |
Arcabit | Trojan.Doina.DEDE0 |
ZoneAlarm | HEUR:Trojan-Downloader.Win32.Deyma.gen |
Microsoft | Trojan:Win32/Amadey.RDH!MTB |
Detected | |
AhnLab-V3 | Malware/Win.Trojanspy.C5238800 |
BitDefenderTheta | Gen:NN.ZexaF.36348.ouW@amEIRFpi |
ALYac | Gen:Variant.Doina.60896 |
Malwarebytes | Backdoor.Amadey |
Panda | Trj/Genetic.gen |
TrendMicro-HouseCall | Trojan.Win32.AMADEY.YXDHEZ |
Tencent | Win32.Trojan.Agen.Ddhl |
Ikarus | Trojan-Downloader.Win32.Amadey |
MaxSecure | Trojan.Malware.300983.susgen |
Fortinet | W32/Amadey.A!tr |
AVG | Win32:BotX-gen [Trj] |
DeepInstinct | MALICIOUS |
CrowdStrike | win/malicious_confidence_100% (W) |