Size | 22.9MB |
---|---|
Type | PE32+ executable (console) x86-64, for MS Windows |
MD5 | 5ac42c54156287baf3e7e25a520a3c24 |
SHA1 | 89dc237e8e75596e5c628f0b10bd3fe93441ae2d |
SHA256 | 0fc95e1f4836acd12d109f418d8bda9f243f9369bc84035f76ecadc8408f886d |
SHA512 |
b7d0e1d805b96699c5e277f9e54516e2d90f5e0aa0f6cb4aa6156d3a85f61016274785109fa89a436625c28eca29ed081f5d4af0c180c8fe346a9e59fdf9767e
|
CRC32 | CB515DC6 |
ssdeep | None |
Yara |
|
This file is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | July 11, 2025, 5:57 p.m. | July 11, 2025, 6:03 p.m. | 413 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-07-08 13:33:59,015 [analyzer] DEBUG: Starting analyzer from: C:\tmpf7a_02 2025-07-08 13:33:59,015 [analyzer] DEBUG: Pipe server name: \??\PIPE\ZlVgxwretpHotrWKHFpR 2025-07-08 13:33:59,015 [analyzer] DEBUG: Log pipe server name: \??\PIPE\LbQoXcChbyjecgWOlYQfvs 2025-07-08 13:33:59,390 [analyzer] DEBUG: Started auxiliary module Curtain 2025-07-08 13:33:59,390 [analyzer] DEBUG: Started auxiliary module DbgView 2025-07-08 13:33:59,967 [analyzer] DEBUG: Started auxiliary module Disguise 2025-07-08 13:34:00,171 [analyzer] DEBUG: Loaded monitor into process with pid 504 2025-07-08 13:34:00,171 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-07-08 13:34:00,171 [analyzer] DEBUG: Started auxiliary module Human 2025-07-08 13:34:00,171 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-07-08 13:34:00,171 [analyzer] DEBUG: Started auxiliary module Reboot 2025-07-08 13:34:00,375 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-07-08 13:34:00,375 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-07-08 13:34:00,375 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-07-08 13:34:00,375 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-07-08 13:34:00,765 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\0fc95e1f4836acd12d109f418d8bda9f243f9369bc84035f76ecadc8408f886d.exe' with arguments '' and pid 2932 2025-07-08 13:34:01,108 [analyzer] DEBUG: Loaded monitor into process with pid 2932 2025-07-08 13:34:06,765 [analyzer] INFO: Process with pid 2932 has terminated 2025-07-08 13:34:06,765 [analyzer] INFO: Process list is empty, terminating analysis. 2025-07-08 13:34:08,030 [analyzer] INFO: Terminating remaining processes before shutdown. 2025-07-08 13:34:08,030 [analyzer] INFO: Analysis completed.
2025-07-11 17:57:03,320 [cuckoo.core.scheduler] DEBUG: Task #6686992: no machine available yet 2025-07-11 17:57:04,352 [cuckoo.core.scheduler] DEBUG: Task #6686992: no machine available yet 2025-07-11 17:57:05,384 [cuckoo.core.scheduler] DEBUG: Task #6686992: no machine available yet 2025-07-11 17:57:06,414 [cuckoo.core.scheduler] DEBUG: Task #6686992: no machine available yet 2025-07-11 17:57:07,444 [cuckoo.core.scheduler] DEBUG: Task #6686992: no machine available yet 2025-07-11 17:57:08,475 [cuckoo.core.scheduler] DEBUG: Task #6686992: no machine available yet 2025-07-11 17:57:09,511 [cuckoo.core.scheduler] DEBUG: Task #6686992: no machine available yet 2025-07-11 17:57:10,542 [cuckoo.core.scheduler] INFO: Task #6686992: acquired machine win7x6427 (label=win7x6427) 2025-07-11 17:57:10,543 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.227 for task #6686992 2025-07-11 17:57:10,930 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 3651711 (interface=vboxnet0, host=192.168.168.227) 2025-07-11 17:57:24,157 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x6427 2025-07-11 17:57:24,962 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x6427 to vmcloak 2025-07-11 18:00:15,126 [cuckoo.core.guest] INFO: Starting analysis #6686992 on guest (id=win7x6427, ip=192.168.168.227) 2025-07-11 18:00:16,249 [cuckoo.core.guest] DEBUG: win7x6427: not ready yet 2025-07-11 18:00:21,295 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x6427, ip=192.168.168.227) 2025-07-11 18:00:21,414 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x6427, ip=192.168.168.227, monitor=latest, size=6660546) 2025-07-11 18:00:24,767 [cuckoo.core.resultserver] DEBUG: Task #6686992: live log analysis.log initialized. 2025-07-11 18:00:25,887 [cuckoo.core.resultserver] DEBUG: Task #6686992 is sending a BSON stream 2025-07-11 18:00:26,717 [cuckoo.core.resultserver] DEBUG: Task #6686992 is sending a BSON stream 2025-07-11 18:00:27,332 [cuckoo.core.resultserver] DEBUG: Task #6686992: File upload for 'shots/0001.jpg' 2025-07-11 18:00:27,354 [cuckoo.core.resultserver] DEBUG: Task #6686992 uploaded file length: 112876 2025-07-11 18:00:32,663 [cuckoo.core.resultserver] DEBUG: Task #6686992: File upload for 'shots/0002.jpg' 2025-07-11 18:00:32,689 [cuckoo.core.resultserver] DEBUG: Task #6686992 uploaded file length: 133889 2025-07-11 18:00:33,731 [cuckoo.core.resultserver] DEBUG: Task #6686992: File upload for 'curtain/1751974447.86.curtain.log' 2025-07-11 18:00:33,733 [cuckoo.core.resultserver] DEBUG: Task #6686992 uploaded file length: 36 2025-07-11 18:00:33,817 [cuckoo.core.resultserver] DEBUG: Task #6686992: File upload for 'sysmon/1751974448.03.sysmon.xml' 2025-07-11 18:00:33,836 [cuckoo.core.resultserver] DEBUG: Task #6686992 uploaded file length: 443050 2025-07-11 18:00:33,845 [cuckoo.core.resultserver] DEBUG: Task #6686992 had connection reset for <Context for LOG> 2025-07-11 18:00:36,284 [cuckoo.core.guest] INFO: win7x6427: analysis completed successfully 2025-07-11 18:00:36,301 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-07-11 18:00:36,337 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-07-11 18:00:37,471 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x6427 to path /srv/cuckoo/cwd/storage/analyses/6686992/memory.dmp 2025-07-11 18:00:37,491 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x6427 2025-07-11 18:03:47,777 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.227 for task #6686992 2025-07-11 18:03:48,332 [cuckoo.core.scheduler] DEBUG: Released database task #6686992 2025-07-11 18:03:55,009 [cuckoo.core.scheduler] INFO: Task #6686992: analysis procedure completed
description | Anti-Sandbox checks for ThreatExpert | rule | antisb_threatExpert | ||||||
description | File downloader/dropper | rule | network_dropper | ||||||
description | Affect system registries | rule | win_registry |
section | .GNC |
section | .0FP |
section | .!j[ |
section | {u'size_of_data': u'0x016e8000', u'virtual_address': u'0x01190000', u'entropy': 7.789954070484867, u'name': u'.!j[', u'virtual_size': u'0x016e7f9c'} | entropy | 7.78995407048 | description | A section with a high entropy has been found | |||||||||
entropy | 0.999786880355 | description | Overall entropy of this PE file is high |
G Data Antivirus (Windows) | Virus: QD:Trojan.GenericKDQ.1DB86945FF (Engine A) |
Avast Core Security (Linux) | Win64:MalwareX-gen [Misc] |
WithSecure (Linux) | Heuristic.HEUR/AGEN.1379237 |
eScan Antivirus (Linux) | QD:Trojan.GenericKDQ.1DB86945FF(DB) |
ESET Security (Windows) | a variant of Win32/Packed.VMProtect.ACX trojan |
Sophos Anti-Virus (Linux) | Mal/Generic-S |
Bitdefender Antivirus (Linux) | QD:Trojan.GenericKDQ.1DB86945FF |
Kaspersky Standard (Windows) | UDS:Trojan.Win64.DBadur.gen |
Emsisoft Commandline Scanner (Windows) | QD:Trojan.GenericKDQ.1DB86945FF (B) |
Bkav | W64.AIDetectMalware |
Cynet | Malicious (score: 100) |
Cylance | Unsafe |
Sangfor | Suspicious.Win32.Save.a |
CrowdStrike | win/malicious_confidence_100% (D) |
K7GW | Trojan ( 0059b3891 ) |
K7AntiVirus | Trojan ( 0059b3891 ) |
Symantec | ML.Attribute.HighConfidence |
Elastic | malicious (high confidence) |
ESET-NOD32 | a variant of Win32/Packed.VMProtect.ACX |
APEX | Malicious |
Paloalto | generic.ml |
Kaspersky | UDS:Trojan.Win64.DBadur.gen |
F-Secure | Heuristic.HEUR/AGEN.1379237 |
McAfeeD | Real Protect-LS!5AC42C541562 |
SentinelOne | Static AI - Malicious PE |
Detected | |
Avira | HEUR/AGEN.1379237 |
Antiy-AVL | RiskWare[Packed]/Win32.VMProtect.a |
Gridinsoft | Trojan.Heur!.02212023 |
Microsoft | Trojan:Win32/Sabsik.FL.A!ml |
AhnLab-V3 | Trojan/Win.Generic.R712046 |
Malwarebytes | Malware.AI.3755712024 |
Ikarus | Trojan.Win32.VMProtect |
TrellixENS | Artemis!5AC42C541562 |
MaxSecure | Trojan.Malware.300983.susgen |
Fortinet | W32/PossibleThreat |
alibabacloud | VirTool:Win/Packed.VMProtect.AWF |