File ac7411080aeab46a_flatout(serial).exe

Size 90.5KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 0f31e2e60f24de2de0b7320fa85c3e2d
SHA1 8227d105893fe313652a6b02ddde25b24aff24ca
SHA256 ac7411080aeab46a23965518900e0123c2aced3b937b27facda8497bf1b34df1
SHA512
afeaf839a50b269ca49d12a36b0932930ae53a90eba199ccb5503ece641506e1037e23661d7b072a3be7ee90d14b12ea7a7ff76bfa8b181f53e6d8bfd8670de5
CRC32 F30EBE29
ssdeep None
Yara
  • network_irc - Communications over IRC network
  • network_dropper - File downloader/dropper
  • network_tcp_socket - Communications over RAW socket
  • network_dns - Communications use DNS
  • keylogger - Run a keylogger
  • spreading_share - Malware can spread east-west using share drive
  • win_mutex - Create or check mutex
  • win_registry - Affect system registries
  • win_private_profile - Affect private profile
  • win_files_operation - Affect private profile

Score

This file is very suspicious, with a score of 9.1 out of 10!

Please notice: The scoring system is currently still in development and should be considered an alpha feature.


Autosubmit

Parent_Task_ID:6227050

Feedback

Expecting different results? Send us this analysis and we will inspect it. Click here

Information on Execution

Analysis
Category Started Completed Duration Routing Logs
FILE April 7, 2025, 1:26 a.m. April 7, 2025, 1:35 a.m. 581 seconds internet Show Analyzer Log
Show Cuckoo Log

Analyzer Log

2025-04-05 13:06:33,015 [analyzer] DEBUG: Starting analyzer from: C:\tmpriinqn
2025-04-05 13:06:33,015 [analyzer] DEBUG: Pipe server name: \??\PIPE\OvDrISsiJKGYtzKzTUrL
2025-04-05 13:06:33,015 [analyzer] DEBUG: Log pipe server name: \??\PIPE\rqoloDXzSPWpvSDzliRhejqobfW
2025-04-05 13:06:33,015 [analyzer] DEBUG: No analysis package specified, trying to detect it automagically.
2025-04-05 13:06:33,030 [analyzer] INFO: Automatically selected analysis package "exe"
2025-04-05 13:06:33,390 [analyzer] DEBUG: Started auxiliary module Curtain
2025-04-05 13:06:33,390 [analyzer] DEBUG: Started auxiliary module DbgView
2025-04-05 13:06:33,905 [analyzer] DEBUG: Started auxiliary module Disguise
2025-04-05 13:06:34,108 [analyzer] DEBUG: Loaded monitor into process with pid 512
2025-04-05 13:06:34,108 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets
2025-04-05 13:06:34,108 [analyzer] DEBUG: Started auxiliary module Human
2025-04-05 13:06:34,108 [analyzer] DEBUG: Started auxiliary module InstallCertificate
2025-04-05 13:06:34,125 [analyzer] DEBUG: Started auxiliary module Reboot
2025-04-05 13:06:34,233 [analyzer] DEBUG: Started auxiliary module RecentFiles
2025-04-05 13:06:34,233 [analyzer] DEBUG: Started auxiliary module Screenshots
2025-04-05 13:06:34,233 [analyzer] DEBUG: Started auxiliary module Sysmon
2025-04-05 13:06:34,233 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n
2025-04-05 13:06:34,405 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\ac7411080aeab46a_flatout(serial).exe' with arguments '' and pid 2592
2025-04-05 13:06:34,608 [analyzer] DEBUG: Loaded monitor into process with pid 2592
2025-04-05 13:06:34,625 [analyzer] INFO: Added new file to list with pid 2592 and path C:\Windows\win32dc\UT2004(patch).exe
2025-04-05 13:06:34,640 [analyzer] INFO: Added new file to list with pid 2592 and path C:\Windows\win32dc\BattleField 1942(nocd).exe
2025-04-05 13:06:34,655 [analyzer] INFO: Added new file to list with pid 2592 and path C:\Windows\win32dc\BattleField 1942_hack.exe
2025-04-05 13:06:34,655 [analyzer] INFO: Added new file to list with pid 2592 and path C:\Windows\win32dc\FlatOut + nocd.exe
2025-04-05 13:06:34,687 [analyzer] INFO: Added new file to list with pid 2592 and path C:\Windows\win32dc\Half-Life 2 nocd.exe
2025-04-05 13:06:34,703 [analyzer] INFO: Added new file to list with pid 2592 and path C:\Windows\win32dc\Half-Life 2(cheat).exe
2025-04-05 13:09:53,405 [analyzer] INFO: Analysis timeout hit, terminating analysis.
2025-04-05 13:09:54,592 [analyzer] INFO: Terminating remaining processes before shutdown.
2025-04-05 13:09:54,592 [lib.api.process] INFO: Successfully terminated process with pid 2592.
2025-04-05 13:09:54,640 [analyzer] INFO: Analysis completed.

Cuckoo Log

2025-04-07 01:26:23,973 [cuckoo.core.scheduler] DEBUG: Task #6237353: no machine available yet
2025-04-07 01:26:25,126 [cuckoo.core.scheduler] INFO: Task #6237353: acquired machine win7x6426 (label=win7x6426)
2025-04-07 01:26:25,132 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.226 for task #6237353
2025-04-07 01:26:25,555 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 3432332 (interface=vboxnet0, host=192.168.168.226)
2025-04-07 01:26:26,278 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x6426
2025-04-07 01:26:26,875 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x6426 to vmcloak
2025-04-07 01:29:46,734 [cuckoo.core.guest] INFO: Starting analysis #6237353 on guest (id=win7x6426, ip=192.168.168.226)
2025-04-07 01:29:47,742 [cuckoo.core.guest] DEBUG: win7x6426: not ready yet
2025-04-07 01:29:52,773 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x6426, ip=192.168.168.226)
2025-04-07 01:29:52,846 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x6426, ip=192.168.168.226, monitor=latest, size=6660546)
2025-04-07 01:29:54,593 [cuckoo.core.resultserver] DEBUG: Task #6237353: live log analysis.log initialized.
2025-04-07 01:29:55,726 [cuckoo.core.resultserver] DEBUG: Task #6237353 is sending a BSON stream
2025-04-07 01:29:56,237 [cuckoo.core.resultserver] DEBUG: Task #6237353 is sending a BSON stream
2025-04-07 01:29:57,101 [cuckoo.core.resultserver] DEBUG: Task #6237353: File upload for 'shots/0001.jpg'
2025-04-07 01:29:57,170 [cuckoo.core.resultserver] DEBUG: Task #6237353 uploaded file length: 136297
2025-04-07 01:30:09,483 [cuckoo.core.guest] DEBUG: win7x6426: analysis #6237353 still processing
2025-04-07 01:30:24,810 [cuckoo.core.guest] DEBUG: win7x6426: analysis #6237353 still processing
2025-04-07 01:30:40,339 [cuckoo.core.guest] DEBUG: win7x6426: analysis #6237353 still processing
2025-04-07 01:30:55,636 [cuckoo.core.guest] DEBUG: win7x6426: analysis #6237353 still processing
2025-04-07 01:31:10,808 [cuckoo.core.guest] DEBUG: win7x6426: analysis #6237353 still processing
2025-04-07 01:31:26,022 [cuckoo.core.guest] DEBUG: win7x6426: analysis #6237353 still processing
2025-04-07 01:31:41,264 [cuckoo.core.guest] DEBUG: win7x6426: analysis #6237353 still processing
2025-04-07 01:31:56,399 [cuckoo.core.guest] DEBUG: win7x6426: analysis #6237353 still processing
2025-04-07 01:32:11,820 [cuckoo.core.guest] DEBUG: win7x6426: analysis #6237353 still processing
2025-04-07 01:32:27,101 [cuckoo.core.guest] DEBUG: win7x6426: analysis #6237353 still processing
2025-04-07 01:32:42,238 [cuckoo.core.guest] DEBUG: win7x6426: analysis #6237353 still processing
2025-04-07 01:32:57,346 [cuckoo.core.guest] DEBUG: win7x6426: analysis #6237353 still processing
2025-04-07 01:33:12,590 [cuckoo.core.guest] DEBUG: win7x6426: analysis #6237353 still processing
2025-04-07 01:33:15,204 [cuckoo.core.resultserver] DEBUG: Task #6237353: File upload for 'curtain/1743851393.59.curtain.log'
2025-04-07 01:33:15,207 [cuckoo.core.resultserver] DEBUG: Task #6237353 uploaded file length: 36
2025-04-07 01:33:16,112 [cuckoo.core.resultserver] DEBUG: Task #6237353: File upload for 'sysmon/1743851394.5.sysmon.xml'
2025-04-07 01:33:16,209 [cuckoo.core.resultserver] DEBUG: Task #6237353 uploaded file length: 12156024
2025-04-07 01:33:16,229 [cuckoo.core.resultserver] DEBUG: Task #6237353: File upload for 'files/d0a82d09ef2cded6_battlefield 1942_hack.exe'
2025-04-07 01:33:16,232 [cuckoo.core.resultserver] DEBUG: Task #6237353: File upload for 'files/aa98656d83868f69_battlefield 1942(nocd).exe'
2025-04-07 01:33:16,234 [cuckoo.core.resultserver] DEBUG: Task #6237353 uploaded file length: 92592
2025-04-07 01:33:16,236 [cuckoo.core.resultserver] DEBUG: Task #6237353: File upload for 'files/f0789ed4ed931492_ut2004(patch).exe'
2025-04-07 01:33:16,238 [cuckoo.core.resultserver] DEBUG: Task #6237353: File upload for 'files/fb845a47924e6b3e_half-life 2 nocd.exe'
2025-04-07 01:33:16,239 [cuckoo.core.resultserver] DEBUG: Task #6237353 uploaded file length: 93616
2025-04-07 01:33:16,241 [cuckoo.core.resultserver] DEBUG: Task #6237353 uploaded file length: 92592
2025-04-07 01:33:16,243 [cuckoo.core.resultserver] DEBUG: Task #6237353 uploaded file length: 93616
2025-04-07 01:33:16,244 [cuckoo.core.resultserver] DEBUG: Task #6237353: File upload for 'files/b9e5ae92ac566f36_flatout + nocd.exe'
2025-04-07 01:33:16,247 [cuckoo.core.resultserver] DEBUG: Task #6237353 uploaded file length: 95664
2025-04-07 01:33:16,249 [cuckoo.core.resultserver] DEBUG: Task #6237353: File upload for 'files/4710f09bc6af97b7_half-life 2(cheat).exe'
2025-04-07 01:33:16,253 [cuckoo.core.resultserver] DEBUG: Task #6237353 uploaded file length: 96688
2025-04-07 01:33:16,272 [cuckoo.core.resultserver] DEBUG: Task #6237353 had connection reset for <Context for LOG>
2025-04-07 01:33:18,631 [cuckoo.core.guest] INFO: win7x6426: analysis completed successfully
2025-04-07 01:33:18,643 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks
2025-04-07 01:33:18,662 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer
2025-04-07 01:33:19,687 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x6426 to path /srv/cuckoo/cwd/storage/analyses/6237353/memory.dmp
2025-04-07 01:33:19,688 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x6426
2025-04-07 01:35:57,110 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.226 for task #6237353
2025-04-07 01:35:58,010 [cuckoo.core.scheduler] DEBUG: Released database task #6237353
2025-04-07 01:35:58,061 [cuckoo.core.scheduler] INFO: Task #6237353: analysis procedure completed

Signatures

Yara rules detected for file (10 events)
description Communications over IRC network rule network_irc
description File downloader/dropper rule network_dropper
description Communications over RAW socket rule network_tcp_socket
description Communications use DNS rule network_dns
description Run a keylogger rule keylogger
description Malware can spread east-west using share drive rule spreading_share
description Create or check mutex rule win_mutex
description Affect system registries rule win_registry
description Affect private profile rule win_private_profile
description Affect private profile rule win_files_operation
The executable contains unknown PE section names indicative of a packer (could be a false positive) (3 events)
section CODE
section DATA
section BSS
Creates executable files on the filesystem (6 events)
file C:\Windows\win32dc\BattleField 1942_hack.exe
file C:\Windows\win32dc\BattleField 1942(nocd).exe
file C:\Windows\win32dc\UT2004(patch).exe
file C:\Windows\win32dc\Half-Life 2 nocd.exe
file C:\Windows\win32dc\FlatOut + nocd.exe
file C:\Windows\win32dc\Half-Life 2(cheat).exe
File has been identified by 13 AntiVirus engine on IRMA as malicious (13 events)
G Data Antivirus (Windows) Virus: Dropped:Generic.Malware.S!dld!.C425D330 (Engine A), Win32.Worm.MyDoom.B (Engine B)
Avast Core Security (Linux) Win32:IRCBot-EXE [Trj]
C4S ClamAV (Linux) Win.Trojan.Delf-6717398-0
Trend Micro SProtect (Linux) TROJ_DELF.SMUA
Trellix (Linux) Generic BackDoor.ww trojan
WithSecure (Linux) Worm.WORM/Rbot.Gen
eScan Antivirus (Linux) Dropped:Generic.Malware.S!dld!.C425D330(DB)
ESET Security (Windows) a variant of Win32/LunaStorm.D worm
Sophos Anti-Virus (Linux) Troj/Luiha-BN
DrWeb Antivirus (Linux) Trojan.Siggen3.61286
ClamAV (Linux) Win.Trojan.Delf-6717398-0
Bitdefender Antivirus (Linux) Dropped:Generic.Malware.S!dld!.C425D330
Emsisoft Commandline Scanner (Windows) Dropped:Generic.Malware.S!dld!.C425D330 (B)
Screenshots
Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action VT Location
No hosts contacted.
Cuckoo

We're processing your submission... This could take a few seconds.