Size | 1018.5KB |
---|---|
Type | PE32 executable (GUI) Intel 80386, for MS Windows |
MD5 | 8b540da28237ae7b5be8d90bd59da33c |
SHA1 | fb2885c5507b3e84bdbd8e3e9d9a6091b27706fa |
SHA256 | 2e395aacc10140e7071504f1159ab31b6d944d1f2ad2b47532613f0adec0f9ee |
SHA512 |
9faaec370c7f3e942e0eb5dd157fd2732d2bb304eae4507e80740085b12d487b980c2e7a0042ba4e1af5f1444fd56a12cb96ef418ed5d68a4da367813db12b66
|
CRC32 | BCDD46B6 |
ssdeep | None |
Yara |
|
This file is very suspicious, with a score of 6.1 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | May 26, 2025, 2:20 a.m. | May 26, 2025, 2:21 a.m. | 60 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-05-26 02:20:03,000 [analyzer] DEBUG: Starting analyzer from: C:\tmp4hzt0l 2025-05-26 02:20:03,000 [analyzer] DEBUG: Pipe server name: \??\PIPE\uJTPLzGfNFyBKzbEJvWANJ 2025-05-26 02:20:03,015 [analyzer] DEBUG: Log pipe server name: \??\PIPE\vGnEgkTVLxrgxkJIf 2025-05-26 02:20:03,217 [analyzer] DEBUG: Started auxiliary module Curtain 2025-05-26 02:20:03,217 [analyzer] DEBUG: Started auxiliary module DbgView 2025-05-26 02:20:03,640 [analyzer] DEBUG: Started auxiliary module Disguise 2025-05-26 02:20:03,842 [analyzer] DEBUG: Loaded monitor into process with pid 504 2025-05-26 02:20:03,842 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-05-26 02:20:03,842 [analyzer] DEBUG: Started auxiliary module Human 2025-05-26 02:20:03,842 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-05-26 02:20:03,842 [analyzer] DEBUG: Started auxiliary module Reboot 2025-05-26 02:20:03,937 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-05-26 02:20:03,937 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-05-26 02:20:03,937 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-05-26 02:20:03,937 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-05-26 02:20:04,062 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\plugmanff2.exe' with arguments '' and pid 2424 2025-05-26 02:20:04,280 [analyzer] DEBUG: Loaded monitor into process with pid 2424 2025-05-26 02:20:04,437 [analyzer] INFO: Added new file to list with pid 2424 and path C:\Users\Administrator\AppData\Local\Temp\autBF13.tmp 2025-05-26 02:20:04,437 [analyzer] INFO: Added new file to list with pid 2424 and path C:\Users\Administrator\AppData\Local\Temp\contrapose 2025-05-26 02:20:04,640 [analyzer] INFO: Added new file to list with pid 2424 and path C:\Users\Administrator\AppData\Local\Temp\autBFEE.tmp 2025-05-26 02:20:04,655 [analyzer] INFO: Added new file to list with pid 2424 and path C:\Users\Administrator\AppData\Local\Temp\piceworth 2025-05-26 02:20:05,296 [analyzer] INFO: Injected into process with pid 964 and name u'RegSvcs.exe' 2025-05-26 02:20:05,608 [analyzer] DEBUG: Loaded monitor into process with pid 964 2025-05-26 02:20:06,078 [analyzer] INFO: Process with pid 2424 has terminated 2025-05-26 01:20:55,234 [analyzer] INFO: Added new file to list with pid 964 and path C:\Users\Administrator\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\14232B434CF29D4C4FB335A86D7FFFE3 2025-05-26 01:20:55,234 [analyzer] INFO: Added new file to list with pid 964 and path C:\Users\Administrator\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\14232B434CF29D4C4FB335A86D7FFFE3 2025-05-26 01:20:55,266 [analyzer] INFO: Added new file to list with pid 964 and path C:\Users\Administrator\AppData\Local\Temp\CabFF39.tmp 2025-05-26 01:20:55,298 [analyzer] INFO: Added new file to list with pid 964 and path C:\Users\Administrator\AppData\Local\Temp\TarFF3A.tmp 2025-05-26 01:21:00,609 [analyzer] INFO: Added new file to list with pid 964 and path C:\Users\Administrator\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015 2025-05-26 01:21:00,609 [analyzer] INFO: Added new file to list with pid 964 and path C:\Users\Administrator\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015 2025-05-26 01:21:00,625 [analyzer] INFO: Added new file to list with pid 964 and path C:\Users\Administrator\AppData\Local\Temp\Cab142A.tmp 2025-05-26 01:21:00,657 [analyzer] INFO: Added new file to list with pid 964 and path C:\Users\Administrator\AppData\Local\Temp\Tar142B.tmp 2025-05-26 01:21:07,500 [analyzer] INFO: Analysis timeout hit, terminating analysis. 2025-05-26 01:21:07,859 [analyzer] INFO: Terminating remaining processes before shutdown. 2025-05-26 01:21:07,859 [lib.api.process] INFO: Successfully terminated process with pid 964. 2025-05-26 01:21:07,891 [analyzer] INFO: Analysis completed.
2025-05-26 02:20:18,938 [cuckoo.core.scheduler] INFO: Task #6513174: acquired machine win7x6420 (label=win7x6420) 2025-05-26 02:20:18,940 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.220 for task #6513174 2025-05-26 02:20:19,273 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 4016125 (interface=vboxnet0, host=192.168.168.220) 2025-05-26 02:20:20,398 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x6420 2025-05-26 02:20:21,000 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x6420 to vmcloak 2025-05-26 02:20:29,913 [cuckoo.core.guest] INFO: Starting analysis #6513174 on guest (id=win7x6420, ip=192.168.168.220) 2025-05-26 02:20:30,919 [cuckoo.core.guest] DEBUG: win7x6420: not ready yet 2025-05-26 02:20:35,942 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x6420, ip=192.168.168.220) 2025-05-26 02:20:36,018 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x6420, ip=192.168.168.220, monitor=latest, size=6660546) 2025-05-26 02:20:37,403 [cuckoo.core.resultserver] DEBUG: Task #6513174: live log analysis.log initialized. 2025-05-26 02:20:38,208 [cuckoo.core.resultserver] DEBUG: Task #6513174 is sending a BSON stream 2025-05-26 02:20:38,619 [cuckoo.core.resultserver] DEBUG: Task #6513174 is sending a BSON stream 2025-05-26 02:20:38,882 [cuckoo.core.resultserver] DEBUG: Task #6513174: File upload for 'files/997553d1a2b64113_autBF13.tmp' 2025-05-26 02:20:38,886 [cuckoo.core.resultserver] DEBUG: Task #6513174 uploaded file length: 12768 2025-05-26 02:20:39,115 [cuckoo.core.resultserver] DEBUG: Task #6513174: File upload for 'files/ae8e0de8b6a8079f_autBFEE.tmp' 2025-05-26 02:20:39,119 [cuckoo.core.resultserver] DEBUG: Task #6513174 uploaded file length: 111748 2025-05-26 02:20:39,519 [cuckoo.core.resultserver] DEBUG: Task #6513174: File upload for 'shots/0001.jpg' 2025-05-26 02:20:39,538 [cuckoo.core.resultserver] DEBUG: Task #6513174 uploaded file length: 133650 2025-05-26 02:20:39,972 [cuckoo.core.resultserver] DEBUG: Task #6513174 is sending a BSON stream 2025-05-26 02:20:52,021 [cuckoo.core.guest] DEBUG: win7x6420: analysis #6513174 still processing 2025-05-26 02:20:55,330 [cuckoo.core.resultserver] DEBUG: Task #6513174: File upload for 'files/d12dd18018f984aa_CabFF39.tmp' 2025-05-26 02:20:55,333 [cuckoo.core.resultserver] DEBUG: Task #6513174 uploaded file length: 58383 2025-05-26 02:20:55,339 [cuckoo.core.resultserver] DEBUG: Task #6513174: File upload for 'files/78eeb661b72a34ca_TarFF3A.tmp' 2025-05-26 02:20:55,342 [cuckoo.core.resultserver] DEBUG: Task #6513174 uploaded file length: 146584 2025-05-26 02:21:00,868 [cuckoo.core.resultserver] DEBUG: Task #6513174: File upload for 'files/d72761e1a334a754_Cab142A.tmp' 2025-05-26 02:21:00,873 [cuckoo.core.resultserver] DEBUG: Task #6513174 uploaded file length: 73305 2025-05-26 02:21:00,875 [cuckoo.core.resultserver] DEBUG: Task #6513174: File upload for 'files/ea6b7f51e85835c0_Tar142B.tmp' 2025-05-26 02:21:00,878 [cuckoo.core.resultserver] DEBUG: Task #6513174 uploaded file length: 188394 2025-05-26 02:21:07,120 [cuckoo.core.guest] DEBUG: win7x6420: analysis #6513174 still processing 2025-05-26 02:21:07,828 [cuckoo.core.resultserver] DEBUG: Task #6513174: File upload for 'curtain/1748215267.73.curtain.log' 2025-05-26 02:21:07,832 [cuckoo.core.resultserver] DEBUG: Task #6513174 uploaded file length: 36 2025-05-26 02:21:07,865 [cuckoo.core.resultserver] DEBUG: Task #6513174: File upload for 'sysmon/1748215267.86.sysmon.xml' 2025-05-26 02:21:07,870 [cuckoo.core.resultserver] DEBUG: Task #6513174 uploaded file length: 309792 2025-05-26 02:21:07,880 [cuckoo.core.resultserver] DEBUG: Task #6513174: File upload for 'files/ebd41040e4bb3ec7_14232b434cf29d4c4fb335a86d7fffe3' 2025-05-26 02:21:07,882 [cuckoo.core.resultserver] DEBUG: Task #6513174 uploaded file length: 889 2025-05-26 02:21:07,885 [cuckoo.core.resultserver] DEBUG: Task #6513174: File upload for 'files/637ca2cf00531f2d_contrapose' 2025-05-26 02:21:07,888 [cuckoo.core.resultserver] DEBUG: Task #6513174 uploaded file length: 95695 2025-05-26 02:21:07,890 [cuckoo.core.resultserver] DEBUG: Task #6513174: File upload for 'files/b030d9f9b1d288da_94308059b57b3142e455b38a6eb92015' 2025-05-26 02:21:07,892 [cuckoo.core.resultserver] DEBUG: Task #6513174 uploaded file length: 344 2025-05-26 02:21:07,897 [cuckoo.core.resultserver] DEBUG: Task #6513174: File upload for 'files/ba30867702b2eccc_piceworth' 2025-05-26 02:21:07,901 [cuckoo.core.resultserver] DEBUG: Task #6513174 uploaded file length: 272896 2025-05-26 02:21:07,902 [cuckoo.core.resultserver] DEBUG: Task #6513174: File upload for 'files/4fef214e6ae6b071_14232b434cf29d4c4fb335a86d7fffe3' 2025-05-26 02:21:07,904 [cuckoo.core.resultserver] DEBUG: Task #6513174 uploaded file length: 170 2025-05-26 02:21:08,398 [cuckoo.core.resultserver] DEBUG: Task #6513174 had connection reset for <Context for LOG> 2025-05-26 02:21:10,136 [cuckoo.core.guest] INFO: win7x6420: analysis completed successfully 2025-05-26 02:21:10,147 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-05-26 02:21:10,164 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-05-26 02:21:11,099 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x6420 to path /srv/cuckoo/cwd/storage/analyses/6513174/memory.dmp 2025-05-26 02:21:11,101 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x6420 2025-05-26 02:21:18,669 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.220 for task #6513174 2025-05-26 02:21:18,942 [cuckoo.core.scheduler] DEBUG: Released database task #6513174 2025-05-26 02:21:18,961 [cuckoo.core.scheduler] INFO: Task #6513174: analysis procedure completed
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Code injection with CreateRemoteThread in a remote process | rule | inject_thread | ||||||
description | Communications over HTTP | rule | network_http | ||||||
description | Escalade priviledges | rule | escalate_priv | ||||||
description | Take screenshot | rule | screenshot | ||||||
description | Run a keylogger | rule | keylogger | ||||||
description | Affect system registries | rule | win_registry | ||||||
description | Affect system token | rule | win_token | ||||||
description | Affect private profile | rule | win_files_operation |
section | {u'size_of_data': u'0x00035a00', u'virtual_address': u'0x000c4000', u'entropy': 7.936689802398045, u'name': u'.rsrc', u'virtual_size': u'0x00035850'} | entropy | 7.9366898024 | description | A section with a high entropy has been found | |||||||||
entropy | 0.210810810811 | description | Overall entropy of this PE file is high |
snort | ET INFO External IP Lookup Domain in DNS Query (checkip .dyndns .org) |
snort | ET INFO 404/Snake/Matiex Keylogger Style External IP Check |
snort | ET POLICY External IP Lookup - checkip.dyndns.org |
snort | ET INFO External IP Address Lookup Domain in DNS Lookup (reallyfreegeoip .org) |
snort | ET INFO External IP Lookup Service Domain (reallyfreegeoip .org) in TLS SNI |
suricata | ET DYN_DNS External IP Lookup Domain in DNS Query (checkip .dyndns .org) |
suricata | ET INFO External IP Lookup - checkip.dyndns.org |
suricata | ET INFO 404/Snake/Matiex Keylogger Style External IP Check |
suricata | ET INFO External IP Address Lookup Domain in DNS Lookup (reallyfreegeoip .org) |
suricata | ET INFO External IP Lookup Service Domain (reallyfreegeoip .org) in TLS SNI |
suricata | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) |
Process injection | Process 2424 called NtSetContextThread to modify thread in remote process 964 |
DrWeb Antivirus (Linux) | Trojan.AutoIt.1666 |