Size | 4.8MB |
---|---|
Type | PE32 executable (GUI) Intel 80386, for MS Windows |
MD5 | febc82bf9fe1828dafe6ed33807f4550 |
SHA1 | 27e102d25864c0a93aba5bac6786e00d2cabb517 |
SHA256 | 9ffbbe4b2674fff30869dedb313a0d5324cae056b1df096c63f84c6709010cdd |
SHA512 |
80322d439dc29c2ab4ae2caecfdeeca55b4ba176f36e1756dd0bee55bee9f6accc28fbf42570c7f0d471a11038dc957317bb7ef1970f2db1c75872595f89d90b
|
CRC32 | 599903BA |
ssdeep | None |
PDB Path | iexplore.pdb |
Yara |
|
This file is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | June 27, 2025, 11:40 a.m. | June 27, 2025, 11:46 a.m. | 336 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-06-22 01:45:25,015 [analyzer] DEBUG: Starting analyzer from: C:\tmpsgyfoe 2025-06-22 01:45:25,030 [analyzer] DEBUG: Pipe server name: \??\PIPE\cBKHsXETYESdGEEXZN 2025-06-22 01:45:25,030 [analyzer] DEBUG: Log pipe server name: \??\PIPE\ycpfzrQpklDLHfwQTUgLETaqaC 2025-06-22 01:45:25,483 [analyzer] DEBUG: Started auxiliary module Curtain 2025-06-22 01:45:25,483 [analyzer] DEBUG: Started auxiliary module DbgView 2025-06-22 01:45:25,983 [analyzer] DEBUG: Started auxiliary module Disguise 2025-06-22 01:45:26,187 [analyzer] DEBUG: Loaded monitor into process with pid 516 2025-06-22 01:45:26,250 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-06-22 01:45:26,250 [analyzer] DEBUG: Started auxiliary module Human 2025-06-22 01:45:26,265 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-06-22 01:45:26,265 [analyzer] DEBUG: Started auxiliary module Reboot 2025-06-22 01:45:26,342 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-06-22 01:45:26,342 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-06-22 01:45:26,342 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-06-22 01:45:26,342 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-06-22 01:45:26,530 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\9ffbbe4b2674fff30869dedb313a0d5324cae056b1df096c63f84c6709010cdd.exe' with arguments '' and pid 1344 2025-06-22 01:45:27,530 [analyzer] INFO: Process with pid 1344 has terminated 2025-06-22 01:45:27,530 [analyzer] INFO: Process list is empty, terminating analysis. 2025-06-22 01:45:28,796 [analyzer] INFO: Terminating remaining processes before shutdown. 2025-06-22 01:45:28,796 [analyzer] INFO: Analysis completed.
2025-06-27 11:41:04,206 [cuckoo.core.scheduler] INFO: Task #6600720: acquired machine win7x6413 (label=win7x6413) 2025-06-27 11:41:04,210 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.213 for task #6600720 2025-06-27 11:41:04,753 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 195729 (interface=vboxnet0, host=192.168.168.213) 2025-06-27 11:41:25,148 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x6413 2025-06-27 11:41:25,960 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x6413 to vmcloak 2025-06-27 11:44:10,045 [cuckoo.core.guest] INFO: Starting analysis #6600720 on guest (id=win7x6413, ip=192.168.168.213) 2025-06-27 11:44:11,050 [cuckoo.core.guest] DEBUG: win7x6413: not ready yet 2025-06-27 11:44:16,624 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x6413, ip=192.168.168.213) 2025-06-27 11:44:17,110 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x6413, ip=192.168.168.213, monitor=latest, size=6660546) 2025-06-27 11:44:19,662 [cuckoo.core.resultserver] DEBUG: Task #6600720: live log analysis.log initialized. 2025-06-27 11:44:21,050 [cuckoo.core.resultserver] DEBUG: Task #6600720 is sending a BSON stream 2025-06-27 11:44:21,517 [cuckoo.core.resultserver] DEBUG: Task #6600720 is sending a BSON stream 2025-06-27 11:44:22,167 [cuckoo.core.resultserver] DEBUG: Task #6600720: File upload for 'shots/0001.jpg' 2025-06-27 11:44:22,215 [cuckoo.core.resultserver] DEBUG: Task #6600720 uploaded file length: 133561 2025-06-27 11:44:23,431 [cuckoo.core.resultserver] DEBUG: Task #6600720: File upload for 'curtain/1750549528.66.curtain.log' 2025-06-27 11:44:23,449 [cuckoo.core.resultserver] DEBUG: Task #6600720 uploaded file length: 36 2025-06-27 11:44:23,452 [cuckoo.core.resultserver] DEBUG: Task #6600720: File upload for 'sysmon/1750549528.78.sysmon.xml' 2025-06-27 11:44:23,469 [cuckoo.core.resultserver] DEBUG: Task #6600720 uploaded file length: 233334 2025-06-27 11:44:23,485 [cuckoo.core.resultserver] DEBUG: Task #6600720 had connection reset for <Context for LOG> 2025-06-27 11:44:25,927 [cuckoo.core.guest] INFO: win7x6413: analysis completed successfully 2025-06-27 11:44:25,966 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-06-27 11:44:26,214 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-06-27 11:44:27,756 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x6413 to path /srv/cuckoo/cwd/storage/analyses/6600720/memory.dmp 2025-06-27 11:44:27,758 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x6413 2025-06-27 11:46:32,727 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.213 for task #6600720 2025-06-27 11:46:33,128 [cuckoo.core.scheduler] DEBUG: Released database task #6600720 2025-06-27 11:46:33,146 [cuckoo.core.scheduler] INFO: Task #6600720: analysis procedure completed
description | Rule to detect the presence of SQLite data in raw image | rule | with_sqlite | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Anti-Sandbox checks for ThreatExpert | rule | antisb_threatExpert | ||||||
description | Disable AntiVirus | rule | disable_antivirus | ||||||
description | Bypass DEP | rule | disable_dep | ||||||
description | Code injection with CreateRemoteThread in a remote process | rule | inject_thread | ||||||
description | Listen for incoming communication | rule | network_tcp_listen | ||||||
description | Communications over HTTP | rule | network_http |
pdb_path | iexplore.pdb |
Avast Core Security (Linux) | Win32:Malware-gen |
C4S ClamAV (Linux) | Win.Trojan.Agent-1367175 |
ClamAV (Linux) | Win.Trojan.Agent-1367175 |
Lionic | Trojan.Win32.Ipamor.4!c |
tehtris | Generic.Malware |
CAT-QuickHeal | Trojan.Riskware |
Skyhigh | BehavesLike.Win32.PWSAxespec.rh |
Cylance | Unsafe |
Sangfor | Suspicious.Win32.Save.ins |
CrowdStrike | win/malicious_confidence_90% (W) |
K7GW | Riskware ( 0040eff71 ) |
K7AntiVirus | Riskware ( 0040eff71 ) |
Symantec | ML.Attribute.HighConfidence |
Elastic | malicious (high confidence) |
APEX | Malicious |
Avast | Win32:Malware-gen |
Cynet | Malicious (score: 100) |
McAfeeD | Real Protect-LS!FEBC82BF9FE1 |
CTX | exe.trojan.ipamor |
Sophos | ML/PE-A |
SentinelOne | Static AI - Malicious PE |
Detected | |
Antiy-AVL | GrayWare/Win32.Tampering.x |
Gridinsoft | Malware.Win32.AI.sa |
Microsoft | Trojan:Win32/Wacatac.B!ml |
GData | Win32.Trojan.Agent.6BV8BN |
Varist | W32/Ipamor.DW.gen!Eldorado |
DeepInstinct | MALICIOUS |
Malwarebytes | Malware.AI.2148232451 |
Ikarus | Trojan.VB.Agent |
TrellixENS | Artemis!FEBC82BF9FE1 |
MaxSecure | Trojan.Malware.121218.susgen |
Fortinet | W32/Ipamor.F5DA!tr |
AVG | Win32:Malware-gen |
Paloalto | generic.ml |