Size | 26.9KB |
---|---|
Type | HTML document, Unicode text, UTF-8 text, with very long lines (3286) |
MD5 | 1d18fe525d55fe42b2d4aefe58a1f9f2 |
SHA1 | d584eead6feff3116b1f462f62cd1c27a1ef68a9 |
SHA256 | 4cb3327eead343b7aa8021b667b4afba0af1d341ef4597d866bfce5c287f8ca7 |
SHA512 |
b6048750e53b98dcec0ef3a73172d73144b13c24e9bc604865c3e7080a7c15b8b008a8e25e588457803238889e9c248f2d1ba6c573dbe9a78ed864e528a2f8b9
|
CRC32 | EFA88D31 |
ssdeep | None |
Yara | None matched |
This file is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | July 11, 2025, 5:55 p.m. | July 11, 2025, 6:01 p.m. | 393 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-07-08 13:33:52,015 [analyzer] DEBUG: Starting analyzer from: C:\tmpj6atou 2025-07-08 13:33:52,030 [analyzer] DEBUG: Pipe server name: \??\PIPE\rgctTLPLvNKcEvloOj 2025-07-08 13:33:52,030 [analyzer] DEBUG: Log pipe server name: \??\PIPE\HOzmPUlyRsKKVlWVpXlG 2025-07-08 13:33:52,030 [analyzer] DEBUG: No analysis package specified, trying to detect it automagically. 2025-07-08 13:33:52,030 [analyzer] INFO: Automatically selected analysis package "ie" 2025-07-08 13:33:52,280 [analyzer] DEBUG: Started auxiliary module Curtain 2025-07-08 13:33:52,280 [analyzer] DEBUG: Started auxiliary module DbgView 2025-07-08 13:33:52,905 [analyzer] DEBUG: Started auxiliary module Disguise 2025-07-08 13:33:53,125 [analyzer] DEBUG: Loaded monitor into process with pid 504 2025-07-08 13:33:53,125 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-07-08 13:33:53,125 [analyzer] DEBUG: Started auxiliary module Human 2025-07-08 13:33:53,125 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-07-08 13:33:53,125 [analyzer] DEBUG: Started auxiliary module Reboot 2025-07-08 13:33:53,203 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-07-08 13:33:53,203 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-07-08 13:33:53,203 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-07-08 13:33:53,203 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-07-08 13:33:53,203 [modules.packages.ie] INFO: Submitted file is missing extension, adding .html 2025-07-08 13:33:53,328 [lib.api.process] INFO: Successfully executed process from path 'C:\\Program Files\\Internet Explorer\\iexplore.exe' with arguments [u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\4cb3327eead343b7aa8021b667b4afba0af1d341ef4597d866bfce5c287f8ca7.html'] and pid 1456 2025-07-08 13:33:53,467 [analyzer] DEBUG: Loaded monitor into process with pid 1456 2025-07-08 13:33:55,078 [analyzer] DEBUG: Following legitimate IE11 process: "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1456 CREDAT:275457 /prefetch:2! 2025-07-08 13:33:55,140 [analyzer] INFO: Injected into process with pid 2152 and name u'iexplore.exe' 2025-07-08 13:33:55,203 [lib.api.process] ERROR: Failed to dump memory of 32-bit process with pid 2152. 2025-07-08 13:33:55,312 [analyzer] INFO: Added new file to list with pid 1456 and path C:\Users\Administrator\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{6C994703-5BEF-11F0-B0F9-4ECB35129F8C}.dat 2025-07-08 13:33:55,375 [analyzer] INFO: Added new file to list with pid 1456 and path C:\Users\Administrator\AppData\Local\Temp\~DF21AAB92E2D2387AD.TMP 2025-07-08 13:33:55,390 [analyzer] DEBUG: Loaded monitor into process with pid 2152 2025-07-08 13:33:55,608 [analyzer] DEBUG: Error resolving function mshtml!CDocument_write through our custom callback. 2025-07-08 13:33:55,608 [analyzer] DEBUG: Error resolving function mshtml!CElement_put_innerHTML through our custom callback. 2025-07-08 13:33:55,625 [analyzer] DEBUG: Error resolving function mshtml!CHyperlink_SetUrlComponent through our custom callback. 2025-07-08 13:33:55,625 [analyzer] DEBUG: Error resolving function mshtml!CIFrameElement_CreateElement through our custom callback. 2025-07-08 13:33:55,625 [analyzer] DEBUG: Error resolving function mshtml!CImgElement_put_src through our custom callback. 2025-07-08 13:33:55,625 [analyzer] DEBUG: Error resolving function mshtml!CScriptElement_put_src through our custom callback. 2025-07-08 13:33:55,625 [analyzer] DEBUG: Error resolving function mshtml!CWindow_AddTimeoutCode through our custom callback. 2025-07-08 13:33:55,625 [analyzer] DEBUG: Error resolving function mshtml!CDocument_write through our custom callback. 2025-07-08 13:33:55,640 [analyzer] DEBUG: Error resolving function mshtml!CElement_put_innerHTML through our custom callback. 2025-07-08 13:33:55,640 [analyzer] DEBUG: Error resolving function mshtml!CHyperlink_SetUrlComponent through our custom callback. 2025-07-08 13:33:55,640 [analyzer] DEBUG: Error resolving function mshtml!CIFrameElement_CreateElement through our custom callback. 2025-07-08 13:33:55,640 [analyzer] DEBUG: Error resolving function mshtml!CImgElement_put_src through our custom callback. 2025-07-08 13:33:55,640 [analyzer] DEBUG: Error resolving function mshtml!CScriptElement_put_src through our custom callback. 2025-07-08 13:33:55,640 [analyzer] DEBUG: Error resolving function mshtml!CWindow_AddTimeoutCode through our custom callback. 2025-07-08 13:33:56,000 [analyzer] INFO: Added new file to list with pid 1456 and path C:\Users\Administrator\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{6C994705-5BEF-11F0-B0F9-4ECB35129F8C}.dat 2025-07-08 13:33:56,030 [analyzer] INFO: Added new file to list with pid 1456 and path C:\Users\Administrator\AppData\Local\Temp\~DFB86FBF0F78015ED2.TMP 2025-07-08 13:33:56,092 [analyzer] DEBUG: Error resolving function mshtml!CDocument_write through our custom callback. 2025-07-08 13:33:56,092 [analyzer] DEBUG: Error resolving function mshtml!CElement_put_innerHTML through our custom callback. 2025-07-08 13:33:56,092 [analyzer] DEBUG: Error resolving function mshtml!CHyperlink_SetUrlComponent through our custom callback. 2025-07-08 13:33:56,092 [analyzer] DEBUG: Error resolving function mshtml!CIFrameElement_CreateElement through our custom callback. 2025-07-08 13:33:56,092 [analyzer] DEBUG: Error resolving function mshtml!CImgElement_put_src through our custom callback. 2025-07-08 13:33:56,092 [analyzer] DEBUG: Error resolving function mshtml!CScriptElement_put_src through our custom callback. 2025-07-08 13:33:56,092 [analyzer] DEBUG: Error resolving function mshtml!CWindow_AddTimeoutCode through our custom callback. 2025-07-08 13:34:22,328 [analyzer] INFO: Analysis timeout hit, terminating analysis. 2025-07-08 13:34:22,750 [analyzer] INFO: Terminating remaining processes before shutdown. 2025-07-08 13:34:22,750 [lib.api.process] INFO: Successfully terminated process with pid 1456. 2025-07-08 13:34:22,750 [lib.api.process] INFO: Successfully terminated process with pid 2152. 2025-07-08 13:34:22,765 [analyzer] INFO: Error dumping file from path "c:\users\administrator\appdata\local\temp\~df21aab92e2d2387ad.tmp": [Errno 13] Permission denied: u'c:\\users\\administrator\\appdata\\local\\temp\\~df21aab92e2d2387ad.tmp' 2025-07-08 13:34:22,780 [analyzer] INFO: Error dumping file from path "c:\users\administrator\appdata\local\temp\~dfb86fbf0f78015ed2.tmp": [Errno 13] Permission denied: u'c:\\users\\administrator\\appdata\\local\\temp\\~dfb86fbf0f78015ed2.tmp' 2025-07-08 13:34:22,812 [analyzer] INFO: Analysis completed.
2025-07-11 17:55:07,853 [cuckoo.core.scheduler] INFO: Task #6686981: acquired machine win7x6416 (label=win7x6416) 2025-07-11 17:55:07,854 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.216 for task #6686981 2025-07-11 17:55:08,239 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 3646592 (interface=vboxnet0, host=192.168.168.216) 2025-07-11 17:55:08,287 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x6416 2025-07-11 17:55:09,131 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x6416 to vmcloak 2025-07-11 17:58:31,125 [cuckoo.core.guest] INFO: Starting analysis #6686981 on guest (id=win7x6416, ip=192.168.168.216) 2025-07-11 17:58:32,131 [cuckoo.core.guest] DEBUG: win7x6416: not ready yet 2025-07-11 17:58:37,159 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x6416, ip=192.168.168.216) 2025-07-11 17:58:37,230 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x6416, ip=192.168.168.216, monitor=latest, size=6660546) 2025-07-11 17:58:38,420 [cuckoo.core.resultserver] DEBUG: Task #6686981: live log analysis.log initialized. 2025-07-11 17:58:39,503 [cuckoo.core.resultserver] DEBUG: Task #6686981 is sending a BSON stream 2025-07-11 17:58:39,827 [cuckoo.core.resultserver] DEBUG: Task #6686981 is sending a BSON stream 2025-07-11 17:58:40,754 [cuckoo.core.resultserver] DEBUG: Task #6686981: File upload for 'shots/0001.jpg' 2025-07-11 17:58:40,770 [cuckoo.core.resultserver] DEBUG: Task #6686981 uploaded file length: 133542 2025-07-11 17:58:41,751 [cuckoo.core.resultserver] DEBUG: Task #6686981 is sending a BSON stream 2025-07-11 17:58:42,887 [cuckoo.core.resultserver] DEBUG: Task #6686981: File upload for 'shots/0002.jpg' 2025-07-11 17:58:42,890 [cuckoo.core.resultserver] DEBUG: Task #6686981 uploaded file length: 24506 2025-07-11 17:58:43,974 [cuckoo.core.resultserver] DEBUG: Task #6686981: File upload for 'shots/0003.jpg' 2025-07-11 17:58:43,979 [cuckoo.core.resultserver] DEBUG: Task #6686981 uploaded file length: 68180 2025-07-11 17:58:53,083 [cuckoo.core.guest] DEBUG: win7x6416: analysis #6686981 still processing 2025-07-11 17:59:08,214 [cuckoo.core.guest] DEBUG: win7x6416: analysis #6686981 still processing 2025-07-11 17:59:08,951 [cuckoo.core.resultserver] DEBUG: Task #6686981: File upload for 'curtain/1751974462.52.curtain.log' 2025-07-11 17:59:08,959 [cuckoo.core.resultserver] DEBUG: Task #6686981 uploaded file length: 36 2025-07-11 17:59:09,156 [cuckoo.core.resultserver] DEBUG: Task #6686981: File upload for 'sysmon/1751974462.72.sysmon.xml' 2025-07-11 17:59:09,180 [cuckoo.core.resultserver] DEBUG: Task #6686981 uploaded file length: 1895514 2025-07-11 17:59:09,192 [cuckoo.core.resultserver] DEBUG: Task #6686981: File upload for 'files/82f41def8f3616ab_{6c994705-5bef-11f0-b0f9-4ecb35129f8c}.dat' 2025-07-11 17:59:09,197 [cuckoo.core.resultserver] DEBUG: Task #6686981 uploaded file length: 7680 2025-07-11 17:59:09,217 [cuckoo.core.resultserver] DEBUG: Task #6686981: File upload for 'files/2042dcaf8d3a9197_recoverystore.{6c994703-5bef-11f0-b0f9-4ecb35129f8c}.dat' 2025-07-11 17:59:09,231 [cuckoo.core.resultserver] DEBUG: Task #6686981 uploaded file length: 5632 2025-07-11 17:59:09,599 [cuckoo.core.resultserver] DEBUG: Task #6686981: File upload for 'shots/0004.jpg' 2025-07-11 17:59:09,610 [cuckoo.core.resultserver] DEBUG: Task #6686981 uploaded file length: 133545 2025-07-11 17:59:09,626 [cuckoo.core.resultserver] DEBUG: Task #6686981 had connection reset for <Context for LOG> 2025-07-11 17:59:11,228 [cuckoo.core.guest] INFO: win7x6416: analysis completed successfully 2025-07-11 17:59:11,248 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-07-11 17:59:11,326 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-07-11 17:59:12,478 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x6416 to path /srv/cuckoo/cwd/storage/analyses/6686981/memory.dmp 2025-07-11 17:59:12,479 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x6416 2025-07-11 18:01:34,150 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.216 for task #6686981 2025-07-11 18:01:34,503 [cuckoo.core.scheduler] DEBUG: Released database task #6686981 2025-07-11 18:01:34,531 [cuckoo.core.scheduler] INFO: Task #6686981: analysis procedure completed
cmdline | "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1456 CREDAT:275457 /prefetch:2 |
G Data Antivirus (Windows) | Virus: Trojan.Script.478909 (Engine A) |
Avast Core Security (Linux) | JS:Decode-IH [Trj] |
C4S ClamAV (Linux) | C4S.MALWARE.MAIN.70.UNOFFICIAL |
Trend Micro SProtect (Linux) | JS_IFRAMERE.SMJF |
Trellix (Linux) | JS/Exploit-Blacole.gc trojan |
WithSecure (Linux) | Malware.JS/BlacoleRef.EB.30 |
eScan Antivirus (Linux) | Trojan.Script.478909(DB) |
Sophos Anti-Virus (Linux) | Mal/Iframe-W |
DrWeb Antivirus (Linux) | JS.Siggen5.32862 |
Bitdefender Antivirus (Linux) | Trojan.Script.478909 |
Kaspersky Standard (Windows) | HEUR:Trojan-Downloader.Script.Generic |
Emsisoft Commandline Scanner (Windows) | Trojan.Script.478909 (B) |
MicroWorld-eScan | Trojan.Script.478909 |
nProtect | Trojan.Script.478909 |
CAT-QuickHeal | JS/IframeRef.DCC |
McAfee | JS/Exploit-Blacole.gc |
K7AntiVirus | Trojan ( 0001140e1 ) |
K7GW | Trojan ( 0001140e1 ) |
F-Prot | JS/IFrame.HC |
Norman | Crypt.BJLT |
TrendMicro-HouseCall | JS_IFRAMERE.SMJF |
Avast | JS:Decode-IH [Trj] |
BitDefender | Trojan.Script.478909 |
NANO-Antivirus | Trojan.Script.Iframe.bcsmhk |
Ad-Aware | Trojan.Script.478909 |
Emsisoft | Trojan.Script.478909 (B) |
Comodo | Exploit.JS.Blacole.BB |
F-Secure | Trojan.Script.478909 |
VIPRE | Trojan.JS.Obfuscator.aa (v) |
AntiVir | JS/BlacoleRef.EB.30 |
TrendMicro | JS_IFRAMERE.SMJF |
McAfee-GW-Edition | Heuristic.BehavesLike.JS.Infected.A |
Sophos | Mal/Iframe-W |
Antiy-AVL | Trojan/Script.Iframer |
Microsoft | Trojan:JS/BlacoleRef.W |
GData | Trojan.Script.478909 |
Commtouch | JS/IFrame.HC |
Ikarus | Trojan.Script |
Fortinet | JS/Crypt.BBDV!tr |
AVG | HTML/Framer |
Qihoo-360 | virus.html.url |