Size | 7.0KB |
---|---|
Type | PE32+ executable (GUI) x86-64, for MS Windows |
MD5 | ec227e0d25e70cf2c6ccce025c718f57 |
SHA1 | 3212106e98105f62160e933869c78f3bab7d3146 |
SHA256 | 79fa1c501f3cd2092543a338b0694cb520662a54fb5c18a9dfc972c72bdc3b8b |
SHA512 |
2a7490422aa461c71c5103716c7d3ad08cbcee4e01310f4b38de69f020867f36324be6701d838f0a64f30da8bc606d535c3f5facddf0896746157d2c5954bf85
|
CRC32 | FA2AFA7F |
ssdeep | None |
Yara |
|
This file is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | April 18, 2025, 1:53 a.m. | April 18, 2025, 1:54 a.m. | 64 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-04-18 01:53:09,015 [analyzer] DEBUG: Starting analyzer from: C:\tmpj6atou 2025-04-18 01:53:09,030 [analyzer] DEBUG: Pipe server name: \??\PIPE\jURjMPQFFVWvUicu 2025-04-18 01:53:09,030 [analyzer] DEBUG: Log pipe server name: \??\PIPE\jwsblnFZGtjaIUqezGAsIZcWdpr 2025-04-18 01:53:09,280 [analyzer] DEBUG: Started auxiliary module Curtain 2025-04-18 01:53:09,280 [analyzer] DEBUG: Started auxiliary module DbgView 2025-04-18 01:53:09,733 [analyzer] DEBUG: Started auxiliary module Disguise 2025-04-18 01:53:09,921 [analyzer] DEBUG: Loaded monitor into process with pid 504 2025-04-18 01:53:09,921 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-04-18 01:53:09,921 [analyzer] DEBUG: Started auxiliary module Human 2025-04-18 01:53:09,921 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-04-18 01:53:09,921 [analyzer] DEBUG: Started auxiliary module Reboot 2025-04-18 01:53:09,983 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-04-18 01:53:09,983 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-04-18 01:53:10,000 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-04-18 01:53:10,000 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-04-18 01:53:10,108 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\tetris1.exe' with arguments '' and pid 1364 2025-04-18 01:53:10,328 [analyzer] DEBUG: Loaded monitor into process with pid 1364 2025-04-18 00:54:04,921 [analyzer] INFO: Analysis timeout hit, terminating analysis. 2025-04-18 00:54:05,217 [lib.api.process] ERROR: Failed to dump memory of 64-bit process with pid 1364. 2025-04-18 00:54:05,467 [analyzer] INFO: Terminating remaining processes before shutdown. 2025-04-18 00:54:05,467 [lib.api.process] INFO: Successfully terminated process with pid 1364. 2025-04-18 00:54:05,467 [analyzer] INFO: Analysis completed.
2025-04-18 01:53:11,864 [cuckoo.core.scheduler] INFO: Task #6297972: acquired machine win7x6416 (label=win7x6416) 2025-04-18 01:53:11,865 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.216 for task #6297972 2025-04-18 01:53:12,235 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 2880817 (interface=vboxnet0, host=192.168.168.216) 2025-04-18 01:53:12,269 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x6416 2025-04-18 01:53:13,021 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x6416 to vmcloak 2025-04-18 01:53:27,436 [cuckoo.core.guest] INFO: Starting analysis #6297972 on guest (id=win7x6416, ip=192.168.168.216) 2025-04-18 01:53:28,442 [cuckoo.core.guest] DEBUG: win7x6416: not ready yet 2025-04-18 01:53:33,472 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x6416, ip=192.168.168.216) 2025-04-18 01:53:33,543 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x6416, ip=192.168.168.216, monitor=latest, size=6660546) 2025-04-18 01:53:34,787 [cuckoo.core.resultserver] DEBUG: Task #6297972: live log analysis.log initialized. 2025-04-18 01:53:35,656 [cuckoo.core.resultserver] DEBUG: Task #6297972 is sending a BSON stream 2025-04-18 01:53:35,984 [cuckoo.core.resultserver] DEBUG: Task #6297972 is sending a BSON stream 2025-04-18 01:53:36,902 [cuckoo.core.resultserver] DEBUG: Task #6297972: File upload for 'shots/0001.jpg' 2025-04-18 01:53:36,916 [cuckoo.core.resultserver] DEBUG: Task #6297972 uploaded file length: 133566 2025-04-18 01:53:49,278 [cuckoo.core.guest] DEBUG: win7x6416: analysis #6297972 still processing 2025-04-18 01:54:04,379 [cuckoo.core.guest] DEBUG: win7x6416: analysis #6297972 still processing 2025-04-18 01:54:05,351 [cuckoo.core.resultserver] DEBUG: Task #6297972: File upload for 'curtain/1744930445.34.curtain.log' 2025-04-18 01:54:05,355 [cuckoo.core.resultserver] DEBUG: Task #6297972 uploaded file length: 36 2025-04-18 01:54:05,472 [cuckoo.core.resultserver] DEBUG: Task #6297972: File upload for 'sysmon/1744930445.47.sysmon.xml' 2025-04-18 01:54:05,476 [cuckoo.core.resultserver] DEBUG: Task #6297972 uploaded file length: 135230 2025-04-18 01:54:05,826 [cuckoo.core.resultserver] DEBUG: Task #6297972 had connection reset for <Context for LOG> 2025-04-18 01:54:07,390 [cuckoo.core.guest] INFO: win7x6416: analysis completed successfully 2025-04-18 01:54:07,403 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-04-18 01:54:07,423 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-04-18 01:54:08,508 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x6416 to path /srv/cuckoo/cwd/storage/analyses/6297972/memory.dmp 2025-04-18 01:54:08,509 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x6416 2025-04-18 01:54:16,261 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.216 for task #6297972 2025-04-18 01:54:16,538 [cuckoo.core.scheduler] DEBUG: Released database task #6297972 2025-04-18 01:54:16,559 [cuckoo.core.scheduler] INFO: Task #6297972: analysis procedure completed
description | Detect functions coded with ROR edi,D; Detect CobaltStrike used by differents groups APT | rule | Cobalt_functions |
section | .rolq |
G Data Antivirus (Windows) | Virus: Trojan.Metasploit.A (Engine A), Win64.Trojan.Rozena.A (Engine B) |
Avast Core Security (Linux) | Win32:MsfShell-V [Hack] |
C4S ClamAV (Linux) | C4S.MALWARE.SHA256.AUTOGEN.63947282.UNOFFICIAL |
Trend Micro SProtect (Linux) | Trojan.Win64.SHELMA.SM |
Trellix (Linux) | Trojan-FJIN |
WithSecure (Linux) | Trojan.TR/Crypt.XPACK.Gen7 |
eScan Antivirus (Linux) | Trojan.Metasploit.A(DB) |
ESET Security (Windows) | Win64/Rozena.J trojan |
Sophos Anti-Virus (Linux) | ATK/Meter-A |
DrWeb Antivirus (Linux) | BackDoor.Shell.244 |
ClamAV (Linux) | Win.Malware.Metasploit-10022275-0 |
Bitdefender Antivirus (Linux) | Trojan.Metasploit.A |
Kaspersky Standard (Windows) | Trojan.Win64.Shelma.b |
Emsisoft Commandline Scanner (Windows) | Trojan.Metasploit.A (B) |
Lionic | Trojan.Win64.Shelma.tplj |
Elastic | malicious (high confidence) |
Cynet | Malicious (score: 100) |
CAT-QuickHeal | HackTool.Metasploit.S9212471 |
McAfee | Trojan-FJIN!EC227E0D25E7 |
ALYac | Trojan.Metasploit.A |
Cylance | Unsafe |
VIPRE | Trojan.Win32.Generic!BT |
Paloalto | generic.ml |
Sangfor | Suspicious.Win32.Save.a |
CrowdStrike | win/malicious_confidence_100% (W) |
BitDefender | Trojan.Metasploit.A |
K7GW | Trojan ( 004fae881 ) |
K7AntiVirus | Trojan ( 004fae881 ) |
Arcabit | Trojan.Metasploit.A |
VirIT | Trojan.Win32.Generic.BZPS |
Cyren | W64/S-c4a4ef26!Eldorado |
ESET-NOD32 | Win64/Rozena.J |
APEX | Malicious |
Avast | FileRepMalware |
Kaspersky | Trojan.Win64.Shelma.b |
Alibaba | Trojan:Win64/Shelma.e5564532 |
SUPERAntiSpyware | Trojan.Agent/Gen-MalPack |
MicroWorld-eScan | Trojan.Metasploit.A |
Rising | Trojan.Kryptik!1.A2F4 (CLOUD) |
Ad-Aware | Trojan.Metasploit.A |
DrWeb | BackDoor.Shell.244 |
TrendMicro | Trojan.Win64.SHELMA.SM |
McAfee-GW-Edition | Trojan-FJIN!EC227E0D25E7 |
FireEye | Generic.mg.ec227e0d25e70cf2 |
Sophos | ML/PE-A + ATK/Meter-A |
Ikarus | Trojan.Win64.Meterpreter |
Jiangmin | Trojan.Generic.fxrt |
Webroot | W32.Malware.Gen |
Avira | TR/Crypt.XPACK.Gen7 |
MAX | malware (ai score=86) |
Gridinsoft | Trojan.Win64.ShellCode.sd!s1 |
Microsoft | Trojan:Win64/Meterpreter.E |
GData | Win64.Trojan.Rozena.A |
AhnLab-V3 | Trojan/Win64.RL_Shelma.R272960 |
Acronis | suspicious |
VBA32 | Trojan.Win64.Shelma |
Malwarebytes | Trojan.MalPack |
TrendMicro-HouseCall | Trojan.Win64.SHELMA.SM |
Tencent | Hacktool.Win64.Rozena.a |
Yandex | Trojan.GenAsa!RZuPNlUDbQk |
SentinelOne | Static AI - Malicious PE |
MaxSecure | Trojan.Malware.300983.susgen |
Fortinet | W64/Rozena.J!tr |
AVG | FileRepMalware |