Size | 409.5KB |
---|---|
Type | PE32 executable (GUI) Intel 80386, for MS Windows |
MD5 | b582f9ff334ba6fa3f7b8e32c574e0f2 |
SHA1 | 87ded03f159f4a64f9af1496478b2908da899f18 |
SHA256 | 7190f8700b30e7ad7876805de73a385cd46dd895d17a8cd96665854da2c0d66a |
SHA512 |
642064796541e0e0bc696d5300fd26ddf824f7274270d461f590cb721c1ca37d06acf9f6600f133164c7b2f4889faef26c80cb2d96ad202f34b0123fc4e26b9e
|
CRC32 | 450AC6E9 |
ssdeep | None |
Yara |
|
This file is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | April 7, 2025, 2:12 p.m. | April 7, 2025, 2:18 p.m. | 338 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-04-05 23:51:54,015 [analyzer] DEBUG: Starting analyzer from: C:\tmppw5mq4 2025-04-05 23:51:54,015 [analyzer] DEBUG: Pipe server name: \??\PIPE\FoPCvrLkEPLzCgePwbqOoe 2025-04-05 23:51:54,015 [analyzer] DEBUG: Log pipe server name: \??\PIPE\PhtYaDLRrHMVfviljiFEnZVIlwrnZs 2025-04-05 23:51:54,296 [analyzer] DEBUG: Started auxiliary module Curtain 2025-04-05 23:51:54,296 [analyzer] DEBUG: Started auxiliary module DbgView 2025-04-05 23:51:54,890 [analyzer] DEBUG: Started auxiliary module Disguise 2025-04-05 23:51:55,140 [analyzer] DEBUG: Loaded monitor into process with pid 504 2025-04-05 23:51:55,140 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-04-05 23:51:55,140 [analyzer] DEBUG: Started auxiliary module Human 2025-04-05 23:51:55,140 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-04-05 23:51:55,140 [analyzer] DEBUG: Started auxiliary module Reboot 2025-04-05 23:51:55,187 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-04-05 23:51:55,203 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-04-05 23:51:55,203 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-04-05 23:51:55,203 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-04-05 23:51:55,375 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\7190f8700b30e7ad7876805de73a385cd46dd895d17a8cd96665854da2c0d66a.exe' with arguments '' and pid 2184 2025-04-05 23:51:55,562 [analyzer] DEBUG: Loaded monitor into process with pid 2184 2025-04-05 23:52:24,375 [analyzer] INFO: Analysis timeout hit, terminating analysis. 2025-04-05 23:52:24,812 [analyzer] INFO: Terminating remaining processes before shutdown. 2025-04-05 23:52:24,812 [lib.api.process] INFO: Successfully terminated process with pid 2184. 2025-04-05 23:52:24,812 [analyzer] INFO: Analysis completed.
2025-04-07 14:12:53,722 [cuckoo.core.scheduler] INFO: Task #6241065: acquired machine win7x646 (label=win7x646) 2025-04-07 14:12:53,723 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.206 for task #6241065 2025-04-07 14:12:54,157 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 363894 (interface=vboxnet0, host=192.168.168.206) 2025-04-07 14:12:55,980 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x646 2025-04-07 14:12:56,640 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x646 to vmcloak 2025-04-07 14:15:59,622 [cuckoo.core.guest] INFO: Starting analysis #6241065 on guest (id=win7x646, ip=192.168.168.206) 2025-04-07 14:16:00,630 [cuckoo.core.guest] DEBUG: win7x646: not ready yet 2025-04-07 14:16:05,659 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x646, ip=192.168.168.206) 2025-04-07 14:16:05,737 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x646, ip=192.168.168.206, monitor=latest, size=6660546) 2025-04-07 14:16:07,373 [cuckoo.core.resultserver] DEBUG: Task #6241065: live log analysis.log initialized. 2025-04-07 14:16:08,561 [cuckoo.core.resultserver] DEBUG: Task #6241065 is sending a BSON stream 2025-04-07 14:16:08,861 [cuckoo.core.resultserver] DEBUG: Task #6241065 is sending a BSON stream 2025-04-07 14:16:09,701 [cuckoo.core.resultserver] DEBUG: Task #6241065: File upload for 'shots/0001.jpg' 2025-04-07 14:16:09,750 [cuckoo.core.resultserver] DEBUG: Task #6241065 uploaded file length: 136587 2025-04-07 14:16:22,213 [cuckoo.core.guest] DEBUG: win7x646: analysis #6241065 still processing 2025-04-07 14:16:37,319 [cuckoo.core.guest] DEBUG: win7x646: analysis #6241065 still processing 2025-04-07 14:16:37,952 [cuckoo.core.resultserver] DEBUG: Task #6241065: File upload for 'curtain/1743889944.56.curtain.log' 2025-04-07 14:16:37,954 [cuckoo.core.resultserver] DEBUG: Task #6241065 uploaded file length: 36 2025-04-07 14:16:38,158 [cuckoo.core.resultserver] DEBUG: Task #6241065: File upload for 'sysmon/1743889944.77.sysmon.xml' 2025-04-07 14:16:38,189 [cuckoo.core.resultserver] DEBUG: Task #6241065 uploaded file length: 1998950 2025-04-07 14:16:38,483 [cuckoo.core.resultserver] DEBUG: Task #6241065: File upload for 'shots/0002.jpg' 2025-04-07 14:16:38,492 [cuckoo.core.resultserver] DEBUG: Task #6241065 uploaded file length: 133471 2025-04-07 14:16:38,505 [cuckoo.core.resultserver] DEBUG: Task #6241065 had connection reset for <Context for LOG> 2025-04-07 14:16:40,329 [cuckoo.core.guest] INFO: win7x646: analysis completed successfully 2025-04-07 14:16:40,341 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-04-07 14:16:40,367 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-04-07 14:16:41,492 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x646 to path /srv/cuckoo/cwd/storage/analyses/6241065/memory.dmp 2025-04-07 14:16:41,494 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x646 2025-04-07 14:18:30,941 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.206 for task #6241065 2025-04-07 14:18:31,670 [cuckoo.core.scheduler] DEBUG: Released database task #6241065 2025-04-07 14:18:31,689 [cuckoo.core.scheduler] INFO: Task #6241065: analysis procedure completed
description | Listen for incoming communication | rule | network_tcp_listen | ||||||
description | Communications over RAW socket | rule | network_tcp_socket | ||||||
description | Communications use DNS | rule | network_dns | ||||||
description | Take screenshot | rule | screenshot | ||||||
description | Run a keylogger | rule | keylogger | ||||||
description | Affect system registries | rule | win_registry | ||||||
description | Affect private profile | rule | win_private_profile | ||||||
description | Affect private profile | rule | win_files_operation | ||||||
description | Affect hook table | rule | win_hook |
section | CODE |
section | DATA |
section | BSS |
Avast Core Security (Linux) | Win32:Crypt-SWW [Inf] |
Sophos Anti-Virus (Linux) | Mal/Generic-S |
DrWeb Antivirus (Linux) | Trojan.Siggen6.53799 |
Lionic | Trojan.Win32.Generic.4!c |
CAT-QuickHeal | Trojan.Ghanarava.162896927774e0f2 |
Cylance | Unsafe |
Sangfor | Trojan.Win32.Wacatac.C |
CrowdStrike | win/malicious_confidence_90% (D) |
K7GW | Trojan ( 7000000f1 ) |
K7AntiVirus | Trojan ( 7000000f1 ) |
Symantec | ML.Attribute.HighConfidence |
Elastic | malicious (high confidence) |
APEX | Malicious |
Avast | Win32:Crypt-SWW [Inf] |
Alibaba | Trojan:Win32/Generic.e3b850ce |
NANO-Antivirus | Trojan.Win32.TrjGen.iicjmv |
Rising | Trojan.Win32.Generic.191AA397 (C64:YzY0Ov7Tr942ZAcD) |
DrWeb | Trojan.Siggen6.53799 |
Sophos | Generic ML PUA (PUA) |
FireEye | Generic.mg.b582f9ff334ba6fa |
Webroot | W32.Malware.gen |
Detected | |
Antiy-AVL | Trojan/Win32.Wacatac |
Kingsoft | Win32.Troj.Generic.a |
Microsoft | PWS:Win32/Zbot!ml |
McAfee | Artemis!B582F9FF334B |
DeepInstinct | MALICIOUS |
Malwarebytes | Generic.Malware/Suspicious |
Ikarus | Trojan.Crypt |
MaxSecure | Trojan.Malware.74474375.susgen |
AVG | Win32:Crypt-SWW [Inf] |
Paloalto | generic.ml |