Size | 942.0KB |
---|---|
Type | PE32 executable (GUI) Intel 80386, for MS Windows |
MD5 | 12659483a55e879d6a60de5148659103 |
SHA1 | 07f99ad4064c49f6d88bede3e61edfddc27d1b5c |
SHA256 | 9ecaa861b18e91986c6f39d8e7010fa1a2a40e35a1fc9c896810fce5887aab20 |
SHA512 |
636a74b62ab0f4f3e0bfaba8e28efa9bf21f0df2f0516fd16af20b3bc7ccb3e956e59afb3428a4052470d5ec8dc4eefe0457b1699d33d552d7b6f442d2b3f59a
|
CRC32 | 86CCCB4B |
ssdeep | None |
Yara |
|
This file is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | May 17, 2025, 2:01 a.m. | May 17, 2025, 2:05 a.m. | 227 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-05-14 00:16:22,015 [analyzer] DEBUG: Starting analyzer from: C:\tmp4hzt0l 2025-05-14 00:16:22,015 [analyzer] DEBUG: Pipe server name: \??\PIPE\LPOCgSLdhHbqInxmZn 2025-05-14 00:16:22,015 [analyzer] DEBUG: Log pipe server name: \??\PIPE\IdrevWSBWafPjDdsRdPAVVDOB 2025-05-14 00:16:22,280 [analyzer] DEBUG: Started auxiliary module Curtain 2025-05-14 00:16:22,280 [analyzer] DEBUG: Started auxiliary module DbgView 2025-05-14 00:16:22,858 [analyzer] DEBUG: Started auxiliary module Disguise 2025-05-14 00:16:23,062 [analyzer] DEBUG: Loaded monitor into process with pid 504 2025-05-14 00:16:23,062 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-05-14 00:16:23,062 [analyzer] DEBUG: Started auxiliary module Human 2025-05-14 00:16:23,062 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-05-14 00:16:23,062 [analyzer] DEBUG: Started auxiliary module Reboot 2025-05-14 00:16:23,155 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-05-14 00:16:23,155 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-05-14 00:16:23,155 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-05-14 00:16:23,155 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-05-14 00:16:23,312 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\random.exe' with arguments '' and pid 3028 2025-05-14 00:16:23,546 [analyzer] DEBUG: Loaded monitor into process with pid 3028 2025-05-14 00:16:24,655 [analyzer] INFO: Injected into process with pid 2668 and name u'taskkill.exe' 2025-05-14 00:16:24,890 [analyzer] DEBUG: Loaded monitor into process with pid 2668 2025-05-14 00:16:25,312 [analyzer] INFO: Process with pid 2668 has terminated 2025-05-14 00:16:52,312 [analyzer] INFO: Analysis timeout hit, terminating analysis. 2025-05-14 00:16:52,905 [analyzer] INFO: Terminating remaining processes before shutdown. 2025-05-14 00:16:52,921 [lib.api.process] INFO: Successfully terminated process with pid 3028. 2025-05-14 00:16:52,921 [analyzer] INFO: Analysis completed.
2025-05-17 02:01:17,418 [cuckoo.core.scheduler] INFO: Task #6479023: acquired machine win7x6420 (label=win7x6420) 2025-05-17 02:01:17,420 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.220 for task #6479023 2025-05-17 02:01:17,732 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 3849597 (interface=vboxnet0, host=192.168.168.220) 2025-05-17 02:01:19,413 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x6420 2025-05-17 02:01:19,975 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x6420 to vmcloak 2025-05-17 02:02:46,158 [cuckoo.core.guest] INFO: Starting analysis #6479023 on guest (id=win7x6420, ip=192.168.168.220) 2025-05-17 02:02:47,166 [cuckoo.core.guest] DEBUG: win7x6420: not ready yet 2025-05-17 02:02:52,201 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x6420, ip=192.168.168.220) 2025-05-17 02:02:52,501 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x6420, ip=192.168.168.220, monitor=latest, size=6660546) 2025-05-17 02:02:54,138 [cuckoo.core.resultserver] DEBUG: Task #6479023: live log analysis.log initialized. 2025-05-17 02:02:55,148 [cuckoo.core.resultserver] DEBUG: Task #6479023 is sending a BSON stream 2025-05-17 02:02:55,601 [cuckoo.core.resultserver] DEBUG: Task #6479023 is sending a BSON stream 2025-05-17 02:02:56,414 [cuckoo.core.resultserver] DEBUG: Task #6479023: File upload for 'shots/0001.jpg' 2025-05-17 02:02:56,433 [cuckoo.core.resultserver] DEBUG: Task #6479023 uploaded file length: 133671 2025-05-17 02:02:56,960 [cuckoo.core.resultserver] DEBUG: Task #6479023 is sending a BSON stream 2025-05-17 02:03:09,095 [cuckoo.core.guest] DEBUG: win7x6420: analysis #6479023 still processing 2025-05-17 02:03:24,194 [cuckoo.core.guest] DEBUG: win7x6420: analysis #6479023 still processing 2025-05-17 02:03:24,664 [cuckoo.core.resultserver] DEBUG: Task #6479023: File upload for 'curtain/1747174612.5.curtain.log' 2025-05-17 02:03:24,667 [cuckoo.core.resultserver] DEBUG: Task #6479023 uploaded file length: 36 2025-05-17 02:03:25,013 [cuckoo.core.resultserver] DEBUG: Task #6479023: File upload for 'sysmon/1747174612.75.sysmon.xml' 2025-05-17 02:03:25,066 [cuckoo.core.resultserver] DEBUG: Task #6479023 uploaded file length: 1529212 2025-05-17 02:03:25,392 [cuckoo.core.resultserver] DEBUG: Task #6479023 had connection reset for <Context for LOG> 2025-05-17 02:03:27,209 [cuckoo.core.guest] INFO: win7x6420: analysis completed successfully 2025-05-17 02:03:27,224 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-05-17 02:03:27,256 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-05-17 02:03:28,101 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x6420 to path /srv/cuckoo/cwd/storage/analyses/6479023/memory.dmp 2025-05-17 02:03:28,102 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x6420 2025-05-17 02:05:03,903 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.220 for task #6479023 2025-05-17 02:05:04,867 [cuckoo.core.scheduler] DEBUG: Released database task #6479023 2025-05-17 02:05:04,898 [cuckoo.core.scheduler] INFO: Task #6479023: analysis procedure completed
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Code injection with CreateRemoteThread in a remote process | rule | inject_thread | ||||||
description | Communications over HTTP | rule | network_http | ||||||
description | Escalade priviledges | rule | escalate_priv | ||||||
description | Take screenshot | rule | screenshot | ||||||
description | Run a keylogger | rule | keylogger | ||||||
description | Affect system registries | rule | win_registry | ||||||
description | Affect system token | rule | win_token | ||||||
description | Affect private profile | rule | win_files_operation |
file | C:\Program Files\Mozilla Firefox\firefox.exe |
wmi | SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process |
section | {u'size_of_data': u'0x00014e00', u'virtual_address': u'0x000d4000', u'entropy': 7.093764347316661, u'name': u'.rsrc', u'virtual_size': u'0x00014d08'} | entropy | 7.09376434732 | description | A section with a high entropy has been found |
cmdline | taskkill /F /IM firefox.exe /T |
cmdline | taskkill /F /IM chrome.exe /T |
G Data Antivirus (Windows) | Virus: Trojan.GenericKD.76419679 (Engine A) |
Avast Core Security (Linux) | Win32:Malware-gen |
C4S ClamAV (Linux) | Sanesecurity.Malware.27686.AidExe.UNOFFICIAL |
WithSecure (Linux) | Trojan.TR/ATRAPS.Gen |
eScan Antivirus (Linux) | Trojan.GenericKD.76419679(DB) |
Sophos Anti-Virus (Linux) | Mal/Generic-S |
DrWeb Antivirus (Linux) | Trojan.Siggen30.15809 |
ClamAV (Linux) | Sanesecurity.Malware.27686.AidExe.UNOFFICIAL |
Bitdefender Antivirus (Linux) | Trojan.GenericKD.76419679 |
Kaspersky Standard (Windows) | HEUR:Trojan.Script.Agent.gen |
Emsisoft Commandline Scanner (Windows) | Trojan.GenericKD.76419679 (B) |
Lionic | Trojan.Win64.Injects.ts93 |
Cynet | Malicious (score: 99) |
CAT-QuickHeal | Trojan.Ghanarava.1747255209659103 |
Skyhigh | BehavesLike.Win32.Formbook.dh |
Cylance | Unsafe |
Sangfor | Virus.Win32.Save.a |
CrowdStrike | win/malicious_confidence_70% (W) |
K7GW | Unwanted-Program ( 005766c31 ) |
K7AntiVirus | Unwanted-Program ( 005766c31 ) |
VirIT | Trojan.Win32.AutoIt_Heur.L |
Elastic | malicious (high confidence) |
ESET-NOD32 | a variant of Win32/HackTool.Silentall.N potentially unsafe |
Avast | Win32:Malware-gen |
Kaspersky | HEUR:Trojan.Script.Agent.gen |
Rising | HackTool.Silentall/Autoit!1.106C3 (CLASSIC) |
F-Secure | Trojan.TR/ATRAPS.Gen |
DrWeb | Trojan.Siggen30.15809 |
CTX | exe.trojan.silentall |
Sophos | Mal/Generic-S |
Detected | |
Avira | TR/ATRAPS.Gen |
Gridinsoft | Trojan.Win32.Agent.sa |
Microsoft | Trojan:Win32/Kepavll!rfn |
GData | Win32.Trojan.Agent.YH9C37 |
Varist | W32/ABTrojan.JCDY-5496 |
McAfee | Artemis!12659483A55E |
DeepInstinct | MALICIOUS |
Malwarebytes | Malware.AI.2145213785 |
Ikarus | PUA.HackTool.Silentall |
Tencent | Unk.Win32.Script.404958 |
huorong | TrojanDownloader/AutoIT.Agent.d |
Fortinet | Riskware/Silentall |
AVG | Win32:Malware-gen |
Paloalto | generic.ml |
alibabacloud | Trojan:Win/Silentall.N |