Failed to run the processing module "MISP" for task #6309917: Traceback (most recent call last): File "/usr/local/lib/python2.7/dist-packages/cuckoo/core/plugins.py", line 250, in process data = current.run() File "/usr/local/lib/python2.7/dist-packages/cuckoo/processing/misp.py", line 143, in run self.search_ioc(ioc) File "/usr/local/lib/python2.7/dist-packages/cuckoo/processing/misp.py", line 60, in search_ioc event = self.find_event(event_id).get("Event") AttributeError: 'NoneType' object has no attribute 'get'
click to expand / collapse this errorSize | 590.7KB |
---|---|
Type | ASCII text, with very long lines (65312), with CRLF, LF line terminators |
MD5 | 7e525ef64a4e27fbb325d7cb4653f0a1 |
SHA1 | 8d3756c9e7a78a5a7dd8fca67e7de51a9ea59a52 |
SHA256 | 0c516038b8f216fb87ebc0d4335fff4013c9b2a80c682069071ec9ae9e2005e9 |
SHA512 |
ec9832d42f86fd086a929c0a5cb31d7d3839d6e5b5c8c15670c477b507a2b66f60ce438006fb11a20522c7ede600e098c3f385720191851b91d5945eb0e50372
|
CRC32 | 2F99B5B6 |
ssdeep | None |
Yara |
|
This file is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | April 20, 2025, 7:23 a.m. | April 20, 2025, 7:30 a.m. | 446 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-04-20 07:23:18,030 [analyzer] DEBUG: Starting analyzer from: C:\tmpl4240h 2025-04-20 07:23:18,078 [analyzer] DEBUG: Pipe server name: \??\PIPE\FMNlzZoVvpUagKJzCh 2025-04-20 07:23:18,078 [analyzer] DEBUG: Log pipe server name: \??\PIPE\NBXzNYYMVERkoeCC 2025-04-20 07:23:18,375 [analyzer] DEBUG: Started auxiliary module Curtain 2025-04-20 07:23:18,390 [analyzer] DEBUG: Started auxiliary module DbgView 2025-04-20 07:23:18,953 [analyzer] DEBUG: Started auxiliary module Disguise 2025-04-20 07:23:19,155 [analyzer] DEBUG: Loaded monitor into process with pid 508 2025-04-20 07:23:19,155 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-04-20 07:23:19,155 [analyzer] DEBUG: Started auxiliary module Human 2025-04-20 07:23:19,155 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-04-20 07:23:19,155 [analyzer] DEBUG: Started auxiliary module Reboot 2025-04-20 07:23:19,217 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-04-20 07:23:19,217 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-04-20 07:23:19,217 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-04-20 07:23:19,217 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-04-20 07:23:19,296 [lib.api.process] INFO: Successfully executed process from path 'C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe' with arguments ['-NoProfile', '-ExecutionPolicy', 'bypass', '-File', u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\0c516038b8f216fb87ebc0d4335fff4013c9b2a80c682069071ec9ae9e2005e9.ps1'] and pid 1768 2025-04-20 07:23:19,578 [analyzer] DEBUG: Loaded monitor into process with pid 1768 2025-04-20 06:27:11,411 [analyzer] INFO: Added new file to list with pid 1768 and path C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ROST44CNONGM36REUNAX.temp 2025-04-20 06:27:22,286 [lib.api.process] ERROR: Failed to dump memory of 64-bit process with pid 1768. 2025-04-20 06:27:22,691 [analyzer] INFO: Process with pid 1768 has terminated 2025-04-20 06:27:22,691 [analyzer] INFO: Process list is empty, terminating analysis. 2025-04-20 06:27:24,052 [analyzer] INFO: Terminating remaining processes before shutdown. 2025-04-20 06:27:24,052 [analyzer] INFO: Analysis completed.
2025-04-20 07:23:31,052 [cuckoo.core.scheduler] INFO: Task #6309917: acquired machine win7x649 (label=win7x649) 2025-04-20 07:23:31,052 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.209 for task #6309917 2025-04-20 07:23:31,429 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 1565306 (interface=vboxnet0, host=192.168.168.209) 2025-04-20 07:23:31,500 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x649 2025-04-20 07:23:32,146 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x649 to vmcloak 2025-04-20 07:26:35,363 [cuckoo.core.guest] INFO: Starting analysis #6309917 on guest (id=win7x649, ip=192.168.168.209) 2025-04-20 07:26:36,368 [cuckoo.core.guest] DEBUG: win7x649: not ready yet 2025-04-20 07:26:41,402 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x649, ip=192.168.168.209) 2025-04-20 07:26:41,501 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x649, ip=192.168.168.209, monitor=latest, size=6660546) 2025-04-20 07:26:43,331 [cuckoo.core.resultserver] DEBUG: Task #6309917: live log analysis.log initialized. 2025-04-20 07:26:44,425 [cuckoo.core.resultserver] DEBUG: Task #6309917 is sending a BSON stream 2025-04-20 07:26:44,757 [cuckoo.core.resultserver] DEBUG: Task #6309917 is sending a BSON stream 2025-04-20 07:26:45,693 [cuckoo.core.resultserver] DEBUG: Task #6309917: File upload for 'shots/0001.jpg' 2025-04-20 07:26:45,702 [cuckoo.core.resultserver] DEBUG: Task #6309917 uploaded file length: 111567 2025-04-20 07:26:58,086 [cuckoo.core.guest] DEBUG: win7x649: analysis #6309917 still processing 2025-04-20 07:27:09,515 [cuckoo.core.resultserver] DEBUG: Task #6309917: File upload for 'shots/0002.jpg' 2025-04-20 07:27:09,528 [cuckoo.core.resultserver] DEBUG: Task #6309917 uploaded file length: 110158 2025-04-20 07:27:13,268 [cuckoo.core.guest] DEBUG: win7x649: analysis #6309917 still processing 2025-04-20 07:27:22,155 [cuckoo.core.resultserver] DEBUG: Task #6309917: File upload for 'shots/0003.jpg' 2025-04-20 07:27:22,167 [cuckoo.core.resultserver] DEBUG: Task #6309917 uploaded file length: 116287 2025-04-20 07:27:23,261 [cuckoo.core.resultserver] DEBUG: Task #6309917: File upload for 'shots/0004.jpg' 2025-04-20 07:27:23,280 [cuckoo.core.resultserver] DEBUG: Task #6309917 uploaded file length: 133464 2025-04-20 07:27:23,812 [cuckoo.core.resultserver] DEBUG: Task #6309917: File upload for 'curtain/1745123243.8.curtain.log' 2025-04-20 07:27:23,816 [cuckoo.core.resultserver] DEBUG: Task #6309917 uploaded file length: 1408 2025-04-20 07:27:24,017 [cuckoo.core.resultserver] DEBUG: Task #6309917: File upload for 'sysmon/1745123244.01.sysmon.xml' 2025-04-20 07:27:24,050 [cuckoo.core.resultserver] DEBUG: Task #6309917 uploaded file length: 2114482 2025-04-20 07:27:24,061 [cuckoo.core.resultserver] DEBUG: Task #6309917: File upload for 'files/b07aa198604143f5_590aee7bdd69b59b.customdestinations-ms' 2025-04-20 07:27:24,063 [cuckoo.core.resultserver] DEBUG: Task #6309917 uploaded file length: 6066 2025-04-20 07:27:24,377 [cuckoo.core.resultserver] DEBUG: Task #6309917 had connection reset for <Context for LOG> 2025-04-20 07:27:25,385 [cuckoo.core.guest] INFO: win7x649: analysis completed successfully 2025-04-20 07:27:25,401 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-04-20 07:27:25,658 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-04-20 07:27:26,693 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x649 to path /srv/cuckoo/cwd/storage/analyses/6309917/memory.dmp 2025-04-20 07:27:26,695 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x649 2025-04-20 07:30:56,566 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.209 for task #6309917 2025-04-20 07:30:57,240 [cuckoo.core.scheduler] DEBUG: Released database task #6309917 2025-04-20 07:30:57,254 [cuckoo.core.scheduler] INFO: Task #6309917: analysis procedure completed
description | Possibly employs anti-virtualization techniques | rule | vmdetect | ||||||
description | (no description) | rule | powershell |
G Data Antivirus (Windows) | Virus: Generic.PWSH.Loki.A.921AC782 (Engine A) |
Avast Core Security (Linux) | Script:SNH-gen [Trj] |
C4S ClamAV (Linux) | Win.Ransomware.LockBit-10041814-0 |
eScan Antivirus (Linux) | Generic.PWSH.Loki.A.921AC782(DB) |
ESET Security (Windows) | Win32/Filecoder.Lockbit.L trojan |
DrWeb Antivirus (Linux) | Trojan.Encoder.35959 |
ClamAV (Linux) | Win.Ransomware.LockBit-10041814-0 |
Bitdefender Antivirus (Linux) | Generic.PWSH.Loki.A.921AC782 |
Emsisoft Commandline Scanner (Windows) | Generic.PWSH.Loki.A.921AC782 (B) |
Lionic | Trojan.Script.Lockbit.4!c |
ClamAV | Win.Ransomware.LockBit-10041814-0 |
CTX | powershell.trojan.lockbit |
CAT-QuickHeal | PS1.Lockbit.49229.GC |
Skyhigh | Artemis!Trojan |
ALYac | Trojan.PowerShell.Agent |
VIPRE | Generic.PWSH.Loki.A.921AC782 |
K7GW | Trojan ( 0001140e1 ) |
K7AntiVirus | Trojan ( 005bf19f1 ) |
Arcabit | Generic.PWSH.Loki.A.921AC782 |
VirIT | Trojan.PS.Agent.GBB |
Symantec | Trojan.Gen.2 |
ESET-NOD32 | Win32/Filecoder.Lockbit.L |
Avast | Script:SNH-gen [Trj] |
BitDefender | Generic.PWSH.Loki.A.921AC782 |
MicroWorld-eScan | Generic.PWSH.Loki.A.921AC782 |
Rising | Trojan.Undefined!8.1327C (TOPIS:E0:zchk3bpMryB) |
Emsisoft | Generic.PWSH.Loki.A.921AC782 (B) |
DrWeb | Trojan.Encoder.35959 |
Ikarus | Trojan-Ransom.LockBit |
FireEye | Generic.PWSH.Loki.A.921AC782 |
Detected | |
Kingsoft | Script.Troj.powershell.2041207 |
Xcitium | Malware@#1j4vsynmg6nau |
Microsoft | Trojan:PowerShell/Lockbit.PB!MTB |
GData | Generic.PWSH.Loki.A.921AC782 |
Varist | Unix/Agent.RP |
huorong | VirTool/PS.Obfuscator.o |
AVG | Script:SNH-gen [Trj] |
alibabacloud | Ransomware:Win/Lockbit.L |