Size | 947.5KB |
---|---|
Type | PE32 executable (GUI) Intel 80386, for MS Windows |
MD5 | 803f31e5907300228221edef2b2c2610 |
SHA1 | cf5db695ca67451f31233938455503949896f8d9 |
SHA256 | 4cf74d8265047ea4a4b64222ad17709ebed8140a20d1f290c021a1aa4ca97bfa |
SHA512 |
f9bfca75caa001311a4985d2de43293565bd8ae92c9c7e926f895ca9d9f3056cfc6c1a5b830d33329be430d62dd9586fc5ca688862dbe0d537f574c7b5951349
|
CRC32 | 2EAD65E5 |
ssdeep | None |
Yara |
|
This file is very suspicious, with a score of 9.4 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | April 17, 2025, 7:38 a.m. | April 17, 2025, 7:39 a.m. | 64 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-04-17 07:38:44,015 [analyzer] DEBUG: Starting analyzer from: C:\tmpsgyfoe 2025-04-17 07:38:44,015 [analyzer] DEBUG: Pipe server name: \??\PIPE\QyytuywYCDhtREJOev 2025-04-17 07:38:44,015 [analyzer] DEBUG: Log pipe server name: \??\PIPE\EdAUgNhGtOXgfWHzLHayiTD 2025-04-17 07:38:44,280 [analyzer] DEBUG: Started auxiliary module Curtain 2025-04-17 07:38:44,280 [analyzer] DEBUG: Started auxiliary module DbgView 2025-04-17 07:38:44,717 [analyzer] DEBUG: Started auxiliary module Disguise 2025-04-17 07:38:44,905 [analyzer] DEBUG: Loaded monitor into process with pid 516 2025-04-17 07:38:44,905 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-04-17 07:38:44,905 [analyzer] DEBUG: Started auxiliary module Human 2025-04-17 07:38:44,905 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-04-17 07:38:44,905 [analyzer] DEBUG: Started auxiliary module Reboot 2025-04-17 07:38:44,967 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-04-17 07:38:44,967 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-04-17 07:38:44,967 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-04-17 07:38:44,967 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-04-17 07:38:45,140 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\random.exe' with arguments '' and pid 2112 2025-04-17 07:38:45,405 [analyzer] DEBUG: Loaded monitor into process with pid 2112 2025-04-17 07:38:46,578 [analyzer] INFO: Injected into process with pid 3052 and name u'taskkill.exe' 2025-04-17 07:38:46,828 [analyzer] DEBUG: Loaded monitor into process with pid 3052 2025-04-17 07:38:47,140 [analyzer] INFO: Process with pid 3052 has terminated 2025-04-17 06:39:46,131 [analyzer] INFO: Analysis timeout hit, terminating analysis. 2025-04-17 06:39:46,506 [analyzer] INFO: Terminating remaining processes before shutdown. 2025-04-17 06:39:46,506 [lib.api.process] INFO: Successfully terminated process with pid 2112. 2025-04-17 06:39:46,506 [analyzer] INFO: Analysis completed.
2025-04-17 07:38:53,756 [cuckoo.core.scheduler] INFO: Task #6297164: acquired machine win7x6413 (label=win7x6413) 2025-04-17 07:38:53,756 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.213 for task #6297164 2025-04-17 07:38:54,101 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 2276561 (interface=vboxnet0, host=192.168.168.213) 2025-04-17 07:38:55,329 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x6413 2025-04-17 07:38:55,988 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x6413 to vmcloak 2025-04-17 07:39:08,707 [cuckoo.core.guest] INFO: Starting analysis #6297164 on guest (id=win7x6413, ip=192.168.168.213) 2025-04-17 07:39:09,713 [cuckoo.core.guest] DEBUG: win7x6413: not ready yet 2025-04-17 07:39:14,741 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x6413, ip=192.168.168.213) 2025-04-17 07:39:14,805 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x6413, ip=192.168.168.213, monitor=latest, size=6660546) 2025-04-17 07:39:16,040 [cuckoo.core.resultserver] DEBUG: Task #6297164: live log analysis.log initialized. 2025-04-17 07:39:16,888 [cuckoo.core.resultserver] DEBUG: Task #6297164 is sending a BSON stream 2025-04-17 07:39:17,356 [cuckoo.core.resultserver] DEBUG: Task #6297164 is sending a BSON stream 2025-04-17 07:39:18,153 [cuckoo.core.resultserver] DEBUG: Task #6297164: File upload for 'shots/0001.jpg' 2025-04-17 07:39:18,165 [cuckoo.core.resultserver] DEBUG: Task #6297164 uploaded file length: 133718 2025-04-17 07:39:18,778 [cuckoo.core.resultserver] DEBUG: Task #6297164 is sending a BSON stream 2025-04-17 07:39:30,704 [cuckoo.core.guest] DEBUG: win7x6413: analysis #6297164 still processing 2025-04-17 07:39:45,794 [cuckoo.core.guest] DEBUG: win7x6413: analysis #6297164 still processing 2025-04-17 07:39:46,446 [cuckoo.core.resultserver] DEBUG: Task #6297164: File upload for 'curtain/1744864786.38.curtain.log' 2025-04-17 07:39:46,449 [cuckoo.core.resultserver] DEBUG: Task #6297164 uploaded file length: 36 2025-04-17 07:39:46,555 [cuckoo.core.resultserver] DEBUG: Task #6297164: File upload for 'sysmon/1744864786.49.sysmon.xml' 2025-04-17 07:39:46,560 [cuckoo.core.resultserver] DEBUG: Task #6297164 uploaded file length: 135798 2025-04-17 07:39:47,046 [cuckoo.core.resultserver] DEBUG: Task #6297164 had connection reset for <Context for LOG> 2025-04-17 07:39:48,807 [cuckoo.core.guest] INFO: win7x6413: analysis completed successfully 2025-04-17 07:39:48,817 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-04-17 07:39:48,838 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-04-17 07:39:49,786 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x6413 to path /srv/cuckoo/cwd/storage/analyses/6297164/memory.dmp 2025-04-17 07:39:49,791 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x6413 2025-04-17 07:39:57,363 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.213 for task #6297164 2025-04-17 07:39:57,633 [cuckoo.core.scheduler] DEBUG: Released database task #6297164 2025-04-17 07:39:57,652 [cuckoo.core.scheduler] INFO: Task #6297164: analysis procedure completed
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Code injection with CreateRemoteThread in a remote process | rule | inject_thread | ||||||
description | Communications over HTTP | rule | network_http | ||||||
description | Escalade priviledges | rule | escalate_priv | ||||||
description | Take screenshot | rule | screenshot | ||||||
description | Run a keylogger | rule | keylogger | ||||||
description | Affect system registries | rule | win_registry | ||||||
description | Affect system token | rule | win_token | ||||||
description | Affect private profile | rule | win_files_operation |
file | C:\Program Files\Mozilla Firefox\firefox.exe |
wmi | SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process |
section | {u'size_of_data': u'0x00016400', u'virtual_address': u'0x000d4000', u'entropy': 7.171868724806777, u'name': u'.rsrc', u'virtual_size': u'0x0001625c'} | entropy | 7.17186872481 | description | A section with a high entropy has been found |
cmdline | taskkill /F /IM firefox.exe /T |
cmdline | taskkill /F /IM chrome.exe /T |
C4S ClamAV (Linux) | Sanesecurity.Malware.27686.AidExe.UNOFFICIAL |
WithSecure (Linux) | Trojan.TR/ATRAPS.Gen |
DrWeb Antivirus (Linux) | Trojan.Siggen30.18127 |
ClamAV (Linux) | Sanesecurity.Malware.27686.AidExe.UNOFFICIAL |
Kaspersky Standard (Windows) | HEUR:Trojan.Script.Agent.gen |