Size | 446.7KB |
---|---|
Type | PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed |
MD5 | f1b368f9ad53713829d5c86d81207fc8 |
SHA1 | 866c7e50a0f8d4b1f9f03590e3a8442d27ff5fc8 |
SHA256 | 8452036ca45611a556252468a0dfc5b75f164dd21ea3f069c6e95748ea56f4e3 |
SHA512 |
976e982241205543954f01855dfb8b14bccad14b6b3a286f8415ef06600f53b3044bc3a66ed17d2ef9c7f4de3ed5b652fe8d7e32b79b10134919cfa6ab360045
|
CRC32 | 470CB88C |
ssdeep | None |
Yara |
|
This file is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | July 7, 2025, 3:02 p.m. | July 7, 2025, 3:08 p.m. | 373 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-07-07 10:05:35,015 [analyzer] DEBUG: Starting analyzer from: C:\tmptpreht 2025-07-07 10:05:35,015 [analyzer] DEBUG: Pipe server name: \??\PIPE\mioQGxehnhAGAHzUENqibXvX 2025-07-07 10:05:35,015 [analyzer] DEBUG: Log pipe server name: \??\PIPE\MLybyMlzMqcHJjetaOwDQ 2025-07-07 10:05:35,437 [analyzer] DEBUG: Started auxiliary module Curtain 2025-07-07 10:05:35,437 [analyzer] DEBUG: Started auxiliary module DbgView 2025-07-07 10:05:36,000 [analyzer] DEBUG: Started auxiliary module Disguise 2025-07-07 10:05:36,203 [analyzer] DEBUG: Loaded monitor into process with pid 500 2025-07-07 10:05:36,203 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-07-07 10:05:36,203 [analyzer] DEBUG: Started auxiliary module Human 2025-07-07 10:05:36,203 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-07-07 10:05:36,203 [analyzer] DEBUG: Started auxiliary module Reboot 2025-07-07 10:05:36,280 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-07-07 10:05:36,280 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-07-07 10:05:36,280 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-07-07 10:05:36,280 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-07-07 10:05:36,467 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\8452036ca45611a556252468a0dfc5b75f164dd21ea3f069c6e95748ea56f4e3.exe' with arguments '' and pid 2428 2025-07-07 10:05:36,655 [analyzer] DEBUG: Loaded monitor into process with pid 2428 2025-07-07 10:05:36,717 [analyzer] INFO: Added new file to list with pid 2428 and path C:\Users\Administrator\AppData\Local\Temp\backup.exe 2025-07-07 10:05:36,733 [analyzer] INFO: Added new file to list with pid 2428 and path C:\Users\Administrator\AppData\Local\Temp\0C7910BA-F902-421E-9E69-CF9AEE0DD4D7\backup.exe 2025-07-07 10:05:36,812 [analyzer] INFO: Injected into process with pid 2652 and name '' 2025-07-07 10:05:36,967 [analyzer] DEBUG: Loaded monitor into process with pid 2652 2025-07-07 10:05:37,046 [analyzer] INFO: Added new file to list with pid 2428 and path C:\Users\Administrator\AppData\Local\Temp\9C7EA51D-B2B9-4ABB-A82F-1B32707A146E\backup.exe 2025-07-07 10:05:37,155 [analyzer] INFO: Added new file to list with pid 2428 and path C:\Users\Administrator\AppData\Local\Temp\hsperfdata_Administrator\backup.exe 2025-07-07 10:05:38,015 [analyzer] INFO: Added new file to list with pid 2652 and path C:\backup.exe 2025-07-07 14:05:35,559 [analyzer] INFO: Analysis timeout hit, terminating analysis. 2025-07-07 14:05:36,075 [analyzer] INFO: Terminating remaining processes before shutdown. 2025-07-07 14:05:36,075 [lib.api.process] INFO: Successfully terminated process with pid 2428. 2025-07-07 14:05:36,075 [lib.api.process] INFO: Successfully terminated process with pid 2652. 2025-07-07 14:05:36,121 [analyzer] INFO: Analysis completed.
2025-07-07 15:02:07,841 [cuckoo.core.scheduler] INFO: Task #6660541: acquired machine win7x641 (label=win7x641) 2025-07-07 15:02:07,842 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.201 for task #6660541 2025-07-07 15:02:08,359 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 2202717 (interface=vboxnet0, host=192.168.168.201) 2025-07-07 15:02:08,606 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x641 2025-07-07 15:02:09,444 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x641 to vmcloak 2025-07-07 15:04:57,573 [cuckoo.core.guest] INFO: Starting analysis #6660541 on guest (id=win7x641, ip=192.168.168.201) 2025-07-07 15:04:58,589 [cuckoo.core.guest] DEBUG: win7x641: not ready yet 2025-07-07 15:05:03,614 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x641, ip=192.168.168.201) 2025-07-07 15:05:03,737 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x641, ip=192.168.168.201, monitor=latest, size=6660546) 2025-07-07 15:05:05,069 [cuckoo.core.resultserver] DEBUG: Task #6660541: live log analysis.log initialized. 2025-07-07 15:05:06,226 [cuckoo.core.resultserver] DEBUG: Task #6660541 is sending a BSON stream 2025-07-07 15:05:06,663 [cuckoo.core.resultserver] DEBUG: Task #6660541 is sending a BSON stream 2025-07-07 15:05:06,976 [cuckoo.core.resultserver] DEBUG: Task #6660541 is sending a BSON stream 2025-07-07 15:05:07,486 [cuckoo.core.resultserver] DEBUG: Task #6660541: File upload for 'shots/0001.jpg' 2025-07-07 15:05:07,506 [cuckoo.core.resultserver] DEBUG: Task #6660541 uploaded file length: 133464 2025-07-07 15:05:20,046 [cuckoo.core.guest] DEBUG: win7x641: analysis #6660541 still processing 2025-07-07 15:05:35,160 [cuckoo.core.guest] DEBUG: win7x641: analysis #6660541 still processing 2025-07-07 15:05:35,787 [cuckoo.core.resultserver] DEBUG: Task #6660541: File upload for 'curtain/1751889935.78.curtain.log' 2025-07-07 15:05:35,790 [cuckoo.core.resultserver] DEBUG: Task #6660541 uploaded file length: 36 2025-07-07 15:05:36,030 [cuckoo.core.resultserver] DEBUG: Task #6660541: File upload for 'sysmon/1751889936.03.sysmon.xml' 2025-07-07 15:05:36,069 [cuckoo.core.resultserver] DEBUG: Task #6660541 uploaded file length: 2354302 2025-07-07 15:05:36,082 [cuckoo.core.resultserver] DEBUG: Task #6660541: File upload for 'files/c1095ce02c0b7ddd_backup.exe' 2025-07-07 15:05:36,087 [cuckoo.core.resultserver] DEBUG: Task #6660541 uploaded file length: 457473 2025-07-07 15:05:36,095 [cuckoo.core.resultserver] DEBUG: Task #6660541: File upload for 'files/07fcf32f96aba31f_backup.exe' 2025-07-07 15:05:36,099 [cuckoo.core.resultserver] DEBUG: Task #6660541 uploaded file length: 457475 2025-07-07 15:05:36,105 [cuckoo.core.resultserver] DEBUG: Task #6660541: File upload for 'files/ef908a340a8dde68_backup.exe' 2025-07-07 15:05:36,110 [cuckoo.core.resultserver] DEBUG: Task #6660541 uploaded file length: 457473 2025-07-07 15:05:36,170 [cuckoo.core.resultserver] DEBUG: Task #6660541 had connection reset for <Context for LOG> 2025-07-07 15:05:38,175 [cuckoo.core.guest] INFO: win7x641: analysis completed successfully 2025-07-07 15:05:38,186 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-07-07 15:05:38,212 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-07-07 15:05:39,733 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x641 to path /srv/cuckoo/cwd/storage/analyses/6660541/memory.dmp 2025-07-07 15:05:39,740 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x641 2025-07-07 15:08:20,169 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.201 for task #6660541 2025-07-07 15:08:20,836 [cuckoo.core.scheduler] DEBUG: Released database task #6660541 2025-07-07 15:08:20,868 [cuckoo.core.scheduler] INFO: Task #6660541: analysis procedure completed
description | (no description) | rule | UPX | ||||||
description | The packer/protector section names/keywords | rule | suspicious_packer_section | ||||||
description | (no description) | rule | SEH__vba | ||||||
description | Escalade priviledges | rule | escalate_priv | ||||||
description | Create or check mutex | rule | win_mutex | ||||||
description | Affect system registries | rule | win_registry | ||||||
description | Affect system token | rule | win_token |
section | .imports |
file | C:\Users\Administrator\AppData\Local\Temp\0C7910BA-F902-421E-9E69-CF9AEE0DD4D7\backup.exe |
file | C:\backup.exe |
file | C:\Users\Administrator\AppData\Local\Temp\backup.exe |
file | C:\Users\Administrator\AppData\Local\Temp\9C7EA51D-B2B9-4ABB-A82F-1B32707A146E\backup.exe |
file | C:\Users\Administrator\AppData\Local\Temp\hsperfdata_Administrator\backup.exe |
file | C:\Users\Administrator\AppData\Local\Temp\0C7910BA-F902-421E-9E69-CF9AEE0DD4D7\backup.exe |
section | UPX0 | description | Section name indicates UPX | ||||||
section | UPX1 | description | Section name indicates UPX |
G Data Antivirus (Windows) | Virus: Trojan.Generic.4385790 (Engine A), Win32.Trojan.Vilsel.A (Engine B) |
Avast Core Security (Linux) | Win32:Vilsel-CT [Trj] |
C4S ClamAV (Linux) | Win.Malware.Genpack-6989317-0 |
Trellix (Linux) | Generic VB.z trojan |
WithSecure (Linux) | Trojan.TR/ATRAPS.Gen2 |
eScan Antivirus (Linux) | Trojan.Generic.4385790(DB) |
ESET Security (Windows) | Win32/VB.OZA trojan |
Sophos Anti-Virus (Linux) | Troj/VB-LET |
DrWeb Antivirus (Linux) | Trojan.Copyself.102 |
ClamAV (Linux) | Win.Malware.Genpack-6989317-0 |
Bitdefender Antivirus (Linux) | Trojan.Generic.4385790 |
Kaspersky Standard (Windows) | Trojan.Win32.Vilsel.loy |
Emsisoft Commandline Scanner (Windows) | Trojan.Generic.4385790 (B) |