Size | 416.0KB |
---|---|
Type | PE32+ executable (DLL) (console) x86-64, for MS Windows |
MD5 | 89b36ba9e558050101a5fb01dda865a1 |
SHA1 | c41deefbe93301cc2e1a24b993cb067d961839b3 |
SHA256 | a146661a25ed66b335ffa57f39f91bf8f12981da102ad245cd85cfd4fd34a942 |
SHA512 |
110b101c336bd80c6e686c1778bd28652158b3e42d8d9f2694c051c5de7da2ca119887054c119b6c87e2b83e8143d0c1c96c9667dd108cd20dae1ee0c7fd62f5
|
CRC32 | B8C9A2F2 |
ssdeep | None |
Yara |
|
This file is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | Feb. 5, 2025, 11:16 a.m. | Feb. 5, 2025, 11:19 a.m. | 189 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-02-03 15:48:39,015 [analyzer] DEBUG: Starting analyzer from: C:\tmptisd8w 2025-02-03 15:48:39,015 [analyzer] DEBUG: Pipe server name: \??\PIPE\VyvqJKULBNshlujEHzOrmXcqzUQ 2025-02-03 15:48:39,015 [analyzer] DEBUG: Log pipe server name: \??\PIPE\INFSiMHitSOCeZDhWHFlv 2025-02-03 15:48:39,280 [analyzer] DEBUG: Started auxiliary module Curtain 2025-02-03 15:48:39,280 [analyzer] DEBUG: Started auxiliary module DbgView 2025-02-03 15:48:39,640 [analyzer] DEBUG: Started auxiliary module Disguise 2025-02-03 15:48:39,842 [analyzer] DEBUG: Loaded monitor into process with pid 508 2025-02-03 15:48:39,842 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-02-03 15:48:39,842 [analyzer] DEBUG: Started auxiliary module Human 2025-02-03 15:48:39,842 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-02-03 15:48:39,842 [analyzer] DEBUG: Started auxiliary module Reboot 2025-02-03 15:48:39,937 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-02-03 15:48:39,937 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-02-03 15:48:39,937 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-02-03 15:48:39,937 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-02-03 15:48:39,983 [lib.api.process] ERROR: Failed to execute process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\a146661a25ed66b335ffa57f39f91bf8f12981da102ad245cd85cfd4fd34a94.exe' with arguments ['bin\\inject-x64.exe', '--app', u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\a146661a25ed66b335ffa57f39f91bf8f12981da102ad245cd85cfd4fd34a94.exe', '--only-start', '--curdir', 'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp'] (Error: Command '['bin\\inject-x64.exe', '--app', u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\a146661a25ed66b335ffa57f39f91bf8f12981da102ad245cd85cfd4fd34a94.exe', '--only-start', '--curdir', 'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp']' returned non-zero exit status 1)
2025-02-05 11:16:07,989 [cuckoo.core.scheduler] INFO: Task #5902719: acquired machine win7x647 (label=win7x647) 2025-02-05 11:16:07,990 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.207 for task #5902719 2025-02-05 11:16:08,369 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 101393 (interface=vboxnet0, host=192.168.168.207) 2025-02-05 11:16:08,662 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x647 2025-02-05 11:16:09,681 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x647 to vmcloak 2025-02-05 11:17:44,743 [cuckoo.core.guest] INFO: Starting analysis #5902719 on guest (id=win7x647, ip=192.168.168.207) 2025-02-05 11:17:45,748 [cuckoo.core.guest] DEBUG: win7x647: not ready yet 2025-02-05 11:17:50,771 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x647, ip=192.168.168.207) 2025-02-05 11:17:50,856 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x647, ip=192.168.168.207, monitor=latest, size=6660546) 2025-02-05 11:17:52,234 [cuckoo.core.resultserver] DEBUG: Task #5902719: live log analysis.log initialized. 2025-02-05 11:17:53,024 [cuckoo.core.resultserver] DEBUG: Task #5902719 is sending a BSON stream 2025-02-05 11:17:54,333 [cuckoo.core.resultserver] DEBUG: Task #5902719: File upload for 'shots/0001.jpg' 2025-02-05 11:17:54,354 [cuckoo.core.resultserver] DEBUG: Task #5902719 uploaded file length: 133474 2025-02-05 11:17:54,852 [cuckoo.core.guest] WARNING: win7x647: analysis #5902719 caught an exception Traceback (most recent call last): File "C:/tmptisd8w/analyzer.py", line 824, in <module> success = analyzer.run() File "C:/tmptisd8w/analyzer.py", line 673, in run pids = self.package.start(self.target) File "C:\tmptisd8w\modules\packages\exe.py", line 34, in start return self.execute(path, args=shlex.split(args)) File "C:\tmptisd8w\lib\common\abstracts.py", line 205, in execute "Unable to execute the initial process, analysis aborted." CuckooPackageError: Unable to execute the initial process, analysis aborted. 2025-02-05 11:17:54,866 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-02-05 11:17:54,902 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-02-05 11:17:56,054 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x647 to path /srv/cuckoo/cwd/storage/analyses/5902719/memory.dmp 2025-02-05 11:17:56,055 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x647 2025-02-05 11:19:16,857 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.207 for task #5902719 2025-02-05 11:19:16,858 [cuckoo.core.resultserver] DEBUG: Cancel <Context for LOG> for task 5902719 2025-02-05 11:19:17,277 [cuckoo.core.scheduler] DEBUG: Released database task #5902719 2025-02-05 11:19:17,300 [cuckoo.core.scheduler] INFO: Task #5902719: analysis procedure completed
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Affect private profile | rule | win_files_operation |
section | .00cfg |
section | .gxfg |
section | .retplne |
section | _RDATA |
section | {u'size_of_data': u'0x0002e000', u'virtual_address': u'0x00042000', u'entropy': 7.774416732133869, u'name': u'.rsrc', u'virtual_size': u'0x0002dfe8'} | entropy | 7.77441673213 | description | A section with a high entropy has been found | |||||||||
entropy | 0.443373493976 | description | Overall entropy of this PE file is high |
G Data Antivirus (Windows) | Virus: Trojan.Agent.FWDC (Engine A) |
Avast Core Security (Linux) | Win64:BankerX-gen [Trj] |
C4S ClamAV (Linux) | Win.Trojan.Emotet-9950298-0 |
F-Secure Antivirus (Linux) | Trojan.TR/AD.GenSHCode.cucuj [Aquarius] |
Sophos Anti-Virus (Linux) | Troj/Emotet-DAY |
eScan Antivirus (Linux) | Trojan.Agent.FWDC(DB) |
ESET Security (Windows) | a variant of Win64/Kryptik.DBF trojan |
McAfee CLI scanner (Linux) | Emotet-FTN |
DrWeb Antivirus (Linux) | Trojan.Siggen17.52278 |
Trend Micro SProtect (Linux) | TROJ_FRS.0NA103EI22 |
ClamAV (Linux) | Win.Trojan.Emotet-9950298-0 |
Bitdefender Antivirus (Linux) | Trojan.Agent.FWDC |
Kaspersky Standard (Windows) | UDS:Trojan-Banker.Win32.Emotet.gino |
Emsisoft Commandline Scanner (Windows) | Trojan.Emotet (A) |
Bkav | W64.AIDetectMalware |
Lionic | Trojan.Win32.Emotet.L!c |
Cynet | Malicious (score: 100) |
Skyhigh | BehavesLike.Win64.Emotet.gc |
ALYac | Trojan.Agent.Emotet |
Cylance | Unsafe |
VIPRE | Trojan.Agent.FWDC |
Sangfor | Trojan.Win32.Save.a |
CrowdStrike | win/malicious_confidence_100% (D) |
BitDefender | Trojan.Agent.FWDC |
K7GW | Trojan ( 00599aad1 ) |
K7AntiVirus | Trojan ( 00599aad1 ) |
Arcabit | Trojan.Agent.FWDC |
VirIT | Trojan.Win64.Emotet.DIE |
Symantec | Trojan.Emotet!g15 |
Elastic | malicious (high confidence) |
ESET-NOD32 | a variant of Win64/Kryptik.DBF |
APEX | Malicious |
Avast | Win64:BankerX-gen [Trj] |
ClamAV | Win.Trojan.Emotet-9950298-0 |
Kaspersky | HEUR:Trojan-Banker.Win64.Convagent.gen |
Alibaba | Trojan:Win64/Emotet.bf3e8118 |
NANO-Antivirus | Trojan.Win64.Nekark.jrwcyb |
SUPERAntiSpyware | Trojan.Agent/Gen-Emotet |
MicroWorld-eScan | Trojan.Agent.FWDC |
Rising | Trojan.Kryptik@AI.89 (RDML:+RVW7ucIibLSi03iDyG4vw) |
Emsisoft | Trojan.Emotet (A) |
F-Secure | Trojan.TR/AD.GenSHCode.cucuj |
DrWeb | Trojan.Siggen17.52278 |
Zillya | Trojan.Emotet.Win64.189 |
TrendMicro | TROJ_FRS.0NA103EI22 |
McAfeeD | ti!A146661A25ED |
CTX | dll.trojan.fwdc |
Sophos | Troj/Emotet-DAY |
SentinelOne | Static AI - Suspicious PE |
FireEye | Generic.mg.89b36ba9e5580501 |
Jiangmin | Trojan.Banker.Emotet.rmv |
Webroot | W32.Trojan.Emotet |
Detected | |
Avira | TR/AD.GenSHCode.cucuj |
Antiy-AVL | Trojan[Banker]/Win32.Emotet |
Xcitium | Malware@#w2d36bib8b9g |
Microsoft | Trojan:Win64/Emotet.BC!MTB |
ZoneAlarm | HEUR:Trojan-Banker.Win64.Convagent.gen |
GData | Trojan.Agent.FWDC |
Varist | W64/S-b910a652!Eldorado |
AhnLab-V3 | Trojan/Win.Agent.R492926 |
Acronis | suspicious |
McAfee | Emotet-FTN!89B36BA9E558 |
TACHYON | Banker/W64.Emotet.425984 |