Failed to run the processing module "NetworkAnalysis" for task #6168995: Traceback (most recent call last): File "/usr/local/lib/python2.7/dist-packages/cuckoo/core/plugins.py", line 250, in process data = current.run() File "/usr/local/lib/python2.7/dist-packages/cuckoo/processing/network.py", line 1026, in run results.update(Pcap(pcap_path, self.options).run()) File "/usr/local/lib/python2.7/dist-packages/cuckoo/processing/network.py", line 827, in run with geoip2.database.Reader(self.options.get("geoip_db")) as reader: File "/usr/local/lib/python2.7/dist-packages/geoip2/database.py", line 85, in __init__ self._db_reader = maxminddb.open_database(fileish, mode) File "/usr/local/lib/python2.7/dist-packages/maxminddb/__init__.py", line 46, in open_database return maxminddb.reader.Reader(database, mode) File "/usr/local/lib/python2.7/dist-packages/maxminddb/reader.py", line 52, in __init__ self._buffer = mmap.mmap(db_file.fileno(), 0, access=mmap.ACCESS_READ) ValueError: cannot mmap an empty file
click to expand / collapse this errorSize | 1.8MB |
---|---|
Type | PE32 executable (GUI) Intel 80386, for MS Windows |
MD5 | 7190fc76bd485beeda368a639a86b4e7 |
SHA1 | e0cc060616ecdf37ffe592a458fd3464b5208bdb |
SHA256 | 3d518af39fd86ff12df0735f58bc3c1aca56f668e05bee6d3ee67a4c118d5c2f |
SHA512 |
deb031f335f1c092a59c949193cfcb9c8689936e1653d6ad113eb0da6a348c51eb6d580ef704bad23beda33a892abb8353d993b519ebe90f5f250cdaf7e8fc6b
|
CRC32 | B1B368CE |
ssdeep | None |
Yara |
|
This file is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | March 27, 2025, 8:39 p.m. | March 27, 2025, 8:46 p.m. | 418 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-03-26 00:24:43,015 [analyzer] DEBUG: Starting analyzer from: C:\tmp1xmcit 2025-03-26 00:24:43,030 [analyzer] DEBUG: Pipe server name: \??\PIPE\eqdSpJmFgKCdXcqKUcYWuWqhFLbE 2025-03-26 00:24:43,030 [analyzer] DEBUG: Log pipe server name: \??\PIPE\nGextKxvMWWyGNhkUr 2025-03-26 00:24:43,312 [analyzer] DEBUG: Started auxiliary module Curtain 2025-03-26 00:24:43,312 [analyzer] DEBUG: Started auxiliary module DbgView 2025-03-26 00:24:43,858 [analyzer] DEBUG: Started auxiliary module Disguise 2025-03-26 00:24:44,062 [analyzer] DEBUG: Loaded monitor into process with pid 508 2025-03-26 00:24:44,062 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-03-26 00:24:44,062 [analyzer] DEBUG: Started auxiliary module Human 2025-03-26 00:24:44,062 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-03-26 00:24:44,062 [analyzer] DEBUG: Started auxiliary module Reboot 2025-03-26 00:24:44,155 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-03-26 00:24:44,155 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-03-26 00:24:44,155 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-03-26 00:24:44,155 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-03-26 00:24:44,328 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\3d518af39fd86ff12df0735f58bc3c1aca56f668e05bee6d3ee67a4c118d5c2f.exe' with arguments '' and pid 2784 2025-03-26 00:24:44,530 [analyzer] DEBUG: Loaded monitor into process with pid 2784 2025-03-26 00:24:45,092 [analyzer] INFO: Added new file to list with pid 2784 and path C:\Users\Administrator\AppData\Local\Temp\is-1GBOF.tmp\3d518af39fd86ff12df0735f58bc3c1aca56f668e05bee6d3ee67a4c118d5c2f.tmp 2025-03-26 00:24:45,312 [analyzer] INFO: Injected into process with pid 2824 and name '' 2025-03-26 00:24:45,500 [analyzer] DEBUG: Loaded monitor into process with pid 2824 2025-03-26 00:24:45,592 [analyzer] INFO: Added new file to list with pid 2824 and path C:\Users\Administrator\AppData\Local\Temp\is-7KB9L.tmp\_isetup\_setup64.tmp 2025-03-26 00:24:45,640 [analyzer] INFO: Added new file to list with pid 2824 and path C:\Users\Administrator\AppData\Local\Temp\is-7KB9L.tmp\idp.dll 2025-03-26 00:25:13,328 [analyzer] INFO: Analysis timeout hit, terminating analysis. 2025-03-26 00:25:14,358 [analyzer] INFO: Terminating remaining processes before shutdown. 2025-03-26 00:25:14,358 [lib.api.process] INFO: Successfully terminated process with pid 2784. 2025-03-26 00:25:14,358 [lib.api.process] INFO: Successfully terminated process with pid 2824. 2025-03-26 00:25:14,500 [analyzer] INFO: Analysis completed.
2025-03-27 20:39:23,675 [cuckoo.core.scheduler] INFO: Task #6168995: acquired machine win7x6414 (label=win7x6414) 2025-03-27 20:39:23,707 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.214 for task #6168995 2025-03-27 20:39:24,458 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 2885656 (interface=vboxnet0, host=192.168.168.214) 2025-03-27 20:41:00,985 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x6414 2025-03-27 20:41:02,256 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x6414 to vmcloak 2025-03-27 20:42:54,414 [cuckoo.core.guest] INFO: Starting analysis #6168995 on guest (id=win7x6414, ip=192.168.168.214) 2025-03-27 20:42:55,743 [cuckoo.core.guest] DEBUG: win7x6414: not ready yet 2025-03-27 20:43:00,772 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x6414, ip=192.168.168.214) 2025-03-27 20:43:00,888 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x6414, ip=192.168.168.214, monitor=latest, size=6660546) 2025-03-27 20:43:03,183 [cuckoo.core.resultserver] DEBUG: Task #6168995: live log analysis.log initialized. 2025-03-27 20:43:04,160 [cuckoo.core.resultserver] DEBUG: Task #6168995 is sending a BSON stream 2025-03-27 20:43:05,014 [cuckoo.core.resultserver] DEBUG: Task #6168995 is sending a BSON stream 2025-03-27 20:43:05,728 [cuckoo.core.resultserver] DEBUG: Task #6168995: File upload for 'shots/0001.jpg' 2025-03-27 20:43:05,771 [cuckoo.core.resultserver] DEBUG: Task #6168995 uploaded file length: 133514 2025-03-27 20:43:05,778 [cuckoo.core.resultserver] DEBUG: Task #6168995 is sending a BSON stream 2025-03-27 20:43:06,990 [cuckoo.core.resultserver] DEBUG: Task #6168995: File upload for 'shots/0002.jpg' 2025-03-27 20:43:07,034 [cuckoo.core.resultserver] DEBUG: Task #6168995 uploaded file length: 134195 2025-03-27 20:43:18,533 [cuckoo.core.guest] DEBUG: win7x6414: analysis #6168995 still processing 2025-03-27 20:43:33,755 [cuckoo.core.resultserver] DEBUG: Task #6168995: File upload for 'curtain/1742945113.58.curtain.log' 2025-03-27 20:43:33,780 [cuckoo.core.resultserver] DEBUG: Task #6168995 uploaded file length: 36 2025-03-27 20:43:34,462 [cuckoo.core.resultserver] DEBUG: Task #6168995: File upload for 'sysmon/1742945113.88.sysmon.xml' 2025-03-27 20:43:34,497 [cuckoo.core.guest] DEBUG: win7x6414: analysis #6168995 still processing 2025-03-27 20:43:34,550 [cuckoo.core.resultserver] DEBUG: Task #6168995 uploaded file length: 1685310 2025-03-27 20:43:34,584 [cuckoo.core.resultserver] DEBUG: Task #6168995: File upload for 'files/ba3451c55212e722_3d518af39fd86ff12df0735f58bc3c1aca56f668e05bee6d3ee67a4c118d5c2f.tmp' 2025-03-27 20:43:34,670 [cuckoo.core.resultserver] DEBUG: Task #6168995 uploaded file length: 3518976 2025-03-27 20:43:34,689 [cuckoo.core.resultserver] DEBUG: Task #6168995: File upload for 'files/54e7e0ad32a22b77_idp.dll' 2025-03-27 20:43:34,694 [cuckoo.core.resultserver] DEBUG: Task #6168995: File upload for 'files/388a796580234efc__setup64.tmp' 2025-03-27 20:43:34,698 [cuckoo.core.resultserver] DEBUG: Task #6168995 uploaded file length: 6144 2025-03-27 20:43:34,703 [cuckoo.core.resultserver] DEBUG: Task #6168995 uploaded file length: 237568 2025-03-27 20:43:34,708 [cuckoo.core.resultserver] DEBUG: Task #6168995 had connection reset for <Context for LOG> 2025-03-27 20:43:37,526 [cuckoo.core.guest] INFO: win7x6414: analysis completed successfully 2025-03-27 20:43:37,561 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-03-27 20:43:37,601 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-03-27 20:43:39,228 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x6414 to path /srv/cuckoo/cwd/storage/analyses/6168995/memory.dmp 2025-03-27 20:43:39,235 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x6414 2025-03-27 20:46:20,560 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.214 for task #6168995 2025-03-27 20:46:20,990 [cuckoo.core.scheduler] DEBUG: Released database task #6168995 2025-03-27 20:46:21,294 [cuckoo.core.scheduler] INFO: Task #6168995: analysis procedure completed
description | Bypass DEP | rule | disable_dep | ||||||
description | Escalade priviledges | rule | escalate_priv | ||||||
description | Affect system registries | rule | win_registry | ||||||
description | Affect system token | rule | win_token | ||||||
description | Affect private profile | rule | win_files_operation |
section | .itext |
section | .didata |
file | C:\Users\Administrator\AppData\Local\Temp\is-7KB9L.tmp\idp.dll |
Avast Core Security (Linux) | FileRepMalware [Misc] |
WithSecure (Linux) | Trojan.TR/AVI.Agent.bimaa |
ESET Security (Windows) | a variant of Win32/TrojanDownloader.Agent.HIO trojan |
Sophos Anti-Virus (Linux) | Mal/Generic-S |
DrWeb Antivirus (Linux) | Trojan.DownLoad4.17525 |
Kaspersky Standard (Windows) | UDS:Trojan-Downloader.Win32.OffLoader |
Bkav | W32.AIDetectMalware |
Lionic | Trojan.Win32.Generic.4!c |
Cynet | Malicious (score: 99) |
Skyhigh | BehavesLike.Win32.ObfuscatedPoly.tc |
Cylance | Unsafe |
Sangfor | Downloader.Win32.Agent.Vhff |
K7GW | Trojan-Downloader ( 005aded81 ) |
K7AntiVirus | Trojan-Downloader ( 005aded81 ) |
Symantec | Trojan.Gen.MBT |
Elastic | malicious (high confidence) |
ESET-NOD32 | a variant of Win32/TrojanDownloader.Agent.HIO |
APEX | Malicious |
Avast | FileRepMalware [Misc] |
Rising | Downloader.Agent/IFPS!1.12740 (CLASSIC) |
F-Secure | Trojan.TR/AVI.Agent.bimaa |
DrWeb | Trojan.DownLoad4.17525 |
McAfeeD | ti!3D518AF39FD8 |
CTX | exe.trojan.generic |
Sophos | Mal/Generic-S |
Webroot | W32.Cheat.Roblox |
Detected | |
Avira | TR/AVI.Agent.bimaa |
Gridinsoft | Trojan.Win32.Gen.dd!n |
GData | Win32.Trojan.Agent.PXGZ47 |
Varist | W32/ABDownloader.NWZT-4676 |
AhnLab-V3 | Infostealer/Win.InnoLoader.R697471 |
McAfee | Artemis!7190FC76BD48 |
DeepInstinct | MALICIOUS |
Malwarebytes | Trojan.Downloader |
Ikarus | Trojan.Win32.Agent |
Tencent | Win32.Trojan-Downloader.Oader.Qgil |
Fortinet | W32/DBadur.A!tr.dldr |
AVG | FileRepMalware [Misc] |