Failed to run the processing module "NetworkAnalysis" for task #6164098: Traceback (most recent call last): File "/usr/local/lib/python2.7/dist-packages/cuckoo/core/plugins.py", line 250, in process data = current.run() File "/usr/local/lib/python2.7/dist-packages/cuckoo/processing/network.py", line 1026, in run results.update(Pcap(pcap_path, self.options).run()) File "/usr/local/lib/python2.7/dist-packages/cuckoo/processing/network.py", line 827, in run with geoip2.database.Reader(self.options.get("geoip_db")) as reader: File "/usr/local/lib/python2.7/dist-packages/geoip2/database.py", line 85, in __init__ self._db_reader = maxminddb.open_database(fileish, mode) File "/usr/local/lib/python2.7/dist-packages/maxminddb/__init__.py", line 46, in open_database return maxminddb.reader.Reader(database, mode) File "/usr/local/lib/python2.7/dist-packages/maxminddb/reader.py", line 52, in __init__ self._buffer = mmap.mmap(db_file.fileno(), 0, access=mmap.ACCESS_READ) ValueError: cannot mmap an empty file
click to expand / collapse this errorSize | 76.5KB |
---|---|
Type | PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows |
MD5 | 597086e812a9c46f1bcde79b2e81dc6e |
SHA1 | 5b0563363ef1d08e7006b5f77be7c65cd7b30318 |
SHA256 | 91ae3791df3c17c5591539c6c22e4a6c0dd3d137e08706345dbef09024c1add5 |
SHA512 |
ad77ff877daa84af1229e8ca40372c8216f3054024ca12dea6be9108abf0a2cba2440f1e0d3a5f431765515cd2e342dd23efdd86f57228cea10fd54c77f754ac
|
CRC32 | F950D6AD |
ssdeep | None |
Yara |
|
This file is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | March 27, 2025, 1:48 a.m. | March 27, 2025, 1:55 a.m. | 396 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-03-25 08:07:40,015 [analyzer] DEBUG: Starting analyzer from: C:\tmp2zg5xi 2025-03-25 08:07:40,015 [analyzer] DEBUG: Pipe server name: \??\PIPE\wVAHOJExtokLwiUPS 2025-03-25 08:07:40,030 [analyzer] DEBUG: Log pipe server name: \??\PIPE\CAvqCpUFMRHHUXdvuucjRcEndyLoD 2025-03-25 08:07:40,296 [analyzer] DEBUG: Started auxiliary module Curtain 2025-03-25 08:07:40,296 [analyzer] DEBUG: Started auxiliary module DbgView 2025-03-25 08:07:40,733 [analyzer] DEBUG: Started auxiliary module Disguise 2025-03-25 08:07:40,953 [analyzer] DEBUG: Loaded monitor into process with pid 512 2025-03-25 08:07:40,953 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-03-25 08:07:40,953 [analyzer] DEBUG: Started auxiliary module Human 2025-03-25 08:07:40,953 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-03-25 08:07:40,953 [analyzer] DEBUG: Started auxiliary module Reboot 2025-03-25 08:07:41,015 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-03-25 08:07:41,015 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-03-25 08:07:41,015 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-03-25 08:07:41,015 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-03-25 08:07:41,187 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\91ae3791df3c17c5591539c6c22e4a6c0dd3d137e08706345dbef09024c1add5.exe' with arguments '' and pid 1836 2025-03-25 08:07:41,358 [analyzer] DEBUG: Loaded monitor into process with pid 1836 2025-03-25 08:07:41,358 [analyzer] INFO: Added new file to list with pid 1836 and path C:\Users\Administrator\AppData\Local\Temp\z1TBK_0706.exe 2025-03-25 08:07:41,530 [analyzer] INFO: Injected into process with pid 2804 and name u'z1TBK_0706.exe' 2025-03-25 08:07:41,703 [analyzer] DEBUG: Loaded monitor into process with pid 2804 2025-03-25 08:07:41,703 [analyzer] INFO: Added new file to list with pid 2804 and path C:\Users\Administrator\AppData\Local\Temp\MAINEXE.exe 2025-03-25 08:07:41,703 [analyzer] INFO: Injected into process with pid 2556 and name u'cmd.exe' 2025-03-25 08:07:41,828 [analyzer] INFO: Injected into process with pid 2856 and name u'MAINEXE.exe' 2025-03-25 08:08:10,187 [analyzer] INFO: Analysis timeout hit, terminating analysis. 2025-03-25 08:08:10,750 [analyzer] INFO: Terminating remaining processes before shutdown. 2025-03-25 08:08:10,750 [lib.api.process] INFO: Successfully terminated process with pid 2556. 2025-03-25 08:08:10,750 [lib.api.process] INFO: Successfully terminated process with pid 2856. 2025-03-25 08:08:10,765 [analyzer] WARNING: File at path u'c:\\users\\administrator\\appdata\\local\\temp\\z1tbk_0706.exe' does not exist, skip. 2025-03-25 08:08:10,765 [analyzer] INFO: Analysis completed.
2025-03-27 01:48:56,221 [cuckoo.core.scheduler] INFO: Task #6164098: acquired machine win7x6410 (label=win7x6410) 2025-03-27 01:48:56,222 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.210 for task #6164098 2025-03-27 01:48:56,952 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 1214359 (interface=vboxnet0, host=192.168.168.210) 2025-03-27 01:48:57,109 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x6410 2025-03-27 01:48:58,274 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x6410 to vmcloak 2025-03-27 01:51:54,811 [cuckoo.core.guest] INFO: Starting analysis #6164098 on guest (id=win7x6410, ip=192.168.168.210) 2025-03-27 01:51:56,090 [cuckoo.core.guest] DEBUG: win7x6410: not ready yet 2025-03-27 01:52:01,124 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x6410, ip=192.168.168.210) 2025-03-27 01:52:01,214 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x6410, ip=192.168.168.210, monitor=latest, size=6660546) 2025-03-27 01:52:02,972 [cuckoo.core.resultserver] DEBUG: Task #6164098: live log analysis.log initialized. 2025-03-27 01:52:03,569 [cuckoo.core.resultserver] DEBUG: Task #6164098 is sending a BSON stream 2025-03-27 01:52:03,905 [cuckoo.core.resultserver] DEBUG: Task #6164098 is sending a BSON stream 2025-03-27 01:52:04,245 [cuckoo.core.resultserver] DEBUG: Task #6164098 is sending a BSON stream 2025-03-27 01:52:04,449 [cuckoo.core.resultserver] DEBUG: Task #6164098 is sending a BSON stream 2025-03-27 01:52:04,559 [cuckoo.core.resultserver] DEBUG: Task #6164098 is sending a BSON stream 2025-03-27 01:52:04,755 [cuckoo.core.resultserver] DEBUG: Task #6164098: File upload for 'shots/0001.jpg' 2025-03-27 01:52:04,778 [cuckoo.core.resultserver] DEBUG: Task #6164098 uploaded file length: 133465 2025-03-27 01:52:17,212 [cuckoo.core.guest] DEBUG: win7x6410: analysis #6164098 still processing 2025-03-27 01:52:32,383 [cuckoo.core.guest] DEBUG: win7x6410: analysis #6164098 still processing 2025-03-27 01:52:33,048 [cuckoo.core.resultserver] DEBUG: Task #6164098: File upload for 'curtain/1742886490.42.curtain.log' 2025-03-27 01:52:33,052 [cuckoo.core.resultserver] DEBUG: Task #6164098 uploaded file length: 36 2025-03-27 01:52:33,340 [cuckoo.core.resultserver] DEBUG: Task #6164098: File upload for 'sysmon/1742886490.66.sysmon.xml' 2025-03-27 01:52:33,379 [cuckoo.core.resultserver] DEBUG: Task #6164098 uploaded file length: 1547296 2025-03-27 01:52:33,396 [cuckoo.core.resultserver] DEBUG: Task #6164098: File upload for 'files/dac2188c436443ea_mainexe.exe' 2025-03-27 01:52:33,410 [cuckoo.core.resultserver] DEBUG: Task #6164098 uploaded file length: 62976 2025-03-27 01:52:33,719 [cuckoo.core.resultserver] DEBUG: Task #6164098 had connection reset for <Context for LOG> 2025-03-27 01:52:35,397 [cuckoo.core.guest] INFO: win7x6410: analysis completed successfully 2025-03-27 01:52:35,414 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-03-27 01:52:35,452 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-03-27 01:52:36,944 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x6410 to path /srv/cuckoo/cwd/storage/analyses/6164098/memory.dmp 2025-03-27 01:52:36,945 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x6410 2025-03-27 01:55:32,382 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.210 for task #6164098 2025-03-27 01:55:32,853 [cuckoo.core.scheduler] DEBUG: Released database task #6164098 2025-03-27 01:55:32,866 [cuckoo.core.scheduler] INFO: Task #6164098: analysis procedure completed
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Affect system registries | rule | win_registry | ||||||
description | Affect private profile | rule | win_files_operation |
resource name | JPEG |
file | C:\Users\Administrator\AppData\Local\Temp\z1TBK_0706.exe |
file | C:\Users\Administrator\AppData\Local\Temp\MAINEXE.exe |
cmdline | cmd.exe /c del /A C:\Users\ADMINI~1\AppData\Local\Temp\Z1TBK_~1.EXE |
cmdline | cmd.exe /c del /A C:\Users\ADMINI~1\AppData\Local\Temp\91AE37~1.EXE |
cmdline | "C:\Windows\System32\cmd.exe" /c del /A C:\Users\ADMINI~1\AppData\Local\Temp\91AE37~1.EXE |
cmdline | "C:\Windows\System32\cmd.exe" /c del /A C:\Users\ADMINI~1\AppData\Local\Temp\Z1TBK_~1.EXE |
file | C:\Users\Administrator\AppData\Local\Temp\MAINEXE.exe |
file | C:\Users\Administrator\AppData\Local\Temp\MAINEXE.exe |
cmdline | cmd.exe /c del /A C:\Users\ADMINI~1\AppData\Local\Temp\Z1TBK_~1.EXE |
cmdline | cmd.exe /c del /A C:\Users\ADMINI~1\AppData\Local\Temp\91AE37~1.EXE |
cmdline | "C:\Windows\System32\cmd.exe" /c del /A C:\Users\ADMINI~1\AppData\Local\Temp\91AE37~1.EXE |
cmdline | "C:\Windows\System32\cmd.exe" /c del /A C:\Users\ADMINI~1\AppData\Local\Temp\Z1TBK_~1.EXE |
G Data Antivirus (Windows) | Virus: Gen:Variant.Babar.586509 (Engine A) |
Avast Core Security (Linux) | Win32:Malware-gen |
C4S ClamAV (Linux) | Win.Trojan.Dorifel-174 |
WithSecure (Linux) | Trojan.TR/Comispro.J.1 |
eScan Antivirus (Linux) | Gen:Variant.Babar.586509(DB) |
ESET Security (Windows) | a variant of Win32/TrojanDropper.Agent.QQH trojan |
Sophos Anti-Virus (Linux) | Mal/Generic-S |
DrWeb Antivirus (Linux) | Trojan.MulDrop8.57425 |
ClamAV (Linux) | Win.Trojan.Dorifel-174 |
Bitdefender Antivirus (Linux) | Gen:Variant.Babar.586509 |
Kaspersky Standard (Windows) | Trojan.Win32.Agent.ilaf |
Emsisoft Commandline Scanner (Windows) | Gen:Variant.Babar.586509 (B) |
Lionic | Trojan.Win32.Dorifel.4!c |
Cynet | Malicious (score: 99) |
ALYac | Gen:Variant.Babar.586509 |
Cylance | Unsafe |
VIPRE | Gen:Variant.Babar.586509 |
CrowdStrike | win/malicious_confidence_100% (W) |
BitDefender | Gen:Variant.Babar.586509 |
Arcabit | Trojan.Babar.D8F30D |
Symantec | ML.Attribute.HighConfidence |
Elastic | malicious (high confidence) |
ESET-NOD32 | a variant of Win32/TrojanDropper.Agent.QQH |
APEX | Malicious |
Avast | Win32:Malware-gen |
ClamAV | Win.Trojan.Dorifel-174 |
Kaspersky | UDS:Trojan.Win32.Agent.ilaf |
Alibaba | TrojanDropper:Win32/Comispro.35e9e5e6 |
NANO-Antivirus | Trojan.Win32.Dorifel.rlbvp |
MicroWorld-eScan | Gen:Variant.Babar.586509 |
Rising | Malware.Unwaders!8.FFE4 (TFE:5:n12OqTGrsu) |
Emsisoft | Gen:Variant.Babar.586509 (B) |
F-Secure | Trojan.TR/Comispro.J.1 |
DrWeb | Trojan.MulDrop8.57425 |
Zillya | Dropper.Dorifel.Win32.839 |
McAfeeD | ti!91AE3791DF3C |
CTX | exe.trojan.dorifel |
Sophos | Mal/Generic-S |
SentinelOne | Static AI - Suspicious PE |
FireEye | Generic.mg.597086e812a9c46f |
Jiangmin | Trojan/JboxGeneric.mi |
Webroot | W32.Rogue.Gen |
Detected | |
Avira | TR/Comispro.J.1 |
Antiy-AVL | Trojan[Dropper]/Win32.Dorifel |
Kingsoft | malware.kb.a.963 |
Gridinsoft | Trojan.Win32.Agent.oa!s1 |
Microsoft | Trojan:Win32/Phonzy.B!ml |
GData | Gen:Variant.Babar.586509 |
McAfee | GenericRXWQ-WK!597086E812A9 |
DeepInstinct | MALICIOUS |
VBA32 | TrojanDropper.Dorifel |
Malwarebytes | Generic.Malware/Suspicious |
Ikarus | Backdoor.Win32.Rbot |
Tencent | Malware.Win32.Gencirc.11d3a6e0 |
Yandex | Trojan.GenAsa!KCoV07Tto4I |
huorong | Trojan/Agent.ho |
MaxSecure | Trojan.Malware.1728101.susgen |
Fortinet | W32/Dorifel.BSU!tr |
AVG | Win32:Malware-gen |
alibabacloud | Trojan[dropper]:Win/Comispro.e4aec4ad |