Size | 172.5KB |
---|---|
Type | PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed |
MD5 | 37c720f11b2aa21a25a533b0e017f0db |
SHA1 | 377e75734088e491a4d53c42b54eac4ccce4b7fe |
SHA256 | 3c0400247d6bf95850aba0dfad6e2b8bca65afafa0c33547466913007e8d4c36 |
SHA512 |
1c15616f2af2f7c4c64727e28ebccab66f69cca4ab52f3cb46d9bd2f203c8d5e5f454eca6720bcf8d820d182eafe463a9b66fa4d5d8d50172019b3df4d27b304
|
CRC32 | 30CCF396 |
ssdeep | None |
Yara |
|
This file is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | July 14, 2025, 4:57 a.m. | July 14, 2025, 5:03 a.m. | 379 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-07-09 05:53:27,015 [analyzer] DEBUG: Starting analyzer from: C:\tmpl4240h 2025-07-09 05:53:27,030 [analyzer] DEBUG: Pipe server name: \??\PIPE\TRNTqKmxdNzKoeuIYfUHGAVJm 2025-07-09 05:53:27,030 [analyzer] DEBUG: Log pipe server name: \??\PIPE\DvtjOQNuwcaBZcsoHeCNSVAoYGPo 2025-07-09 05:53:27,342 [analyzer] DEBUG: Started auxiliary module Curtain 2025-07-09 05:53:27,342 [analyzer] DEBUG: Started auxiliary module DbgView 2025-07-09 05:53:27,796 [analyzer] DEBUG: Started auxiliary module Disguise 2025-07-09 05:53:28,000 [analyzer] DEBUG: Loaded monitor into process with pid 508 2025-07-09 05:53:28,000 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-07-09 05:53:28,000 [analyzer] DEBUG: Started auxiliary module Human 2025-07-09 05:53:28,000 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-07-09 05:53:28,000 [analyzer] DEBUG: Started auxiliary module Reboot 2025-07-09 05:53:28,046 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-07-09 05:53:28,062 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-07-09 05:53:28,062 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-07-09 05:53:28,062 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-07-09 05:53:28,203 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\3c0400247d6bf95850aba0dfad6e2b8bca65afafa0c33547466913007e8d4c36.exe' with arguments '' and pid 1352 2025-07-09 05:53:28,390 [analyzer] DEBUG: Loaded monitor into process with pid 1352 2025-07-09 05:53:28,437 [analyzer] INFO: Added new file to list with pid 1352 and path C:\Users\Administrator\AppData\Local\Temp\backup.exe 2025-07-09 05:53:28,453 [analyzer] INFO: Added new file to list with pid 1352 and path C:\Users\Administrator\AppData\Local\Temp\0C7910BA-F902-421E-9E69-CF9AEE0DD4D7\backup.exe 2025-07-09 05:53:28,515 [analyzer] INFO: Injected into process with pid 544 and name '' 2025-07-09 05:53:28,687 [analyzer] DEBUG: Loaded monitor into process with pid 544 2025-07-09 05:53:28,765 [analyzer] INFO: Added new file to list with pid 1352 and path C:\Users\Administrator\AppData\Local\Temp\9C7EA51D-B2B9-4ABB-A82F-1B32707A146E\backup.exe 2025-07-09 05:53:28,842 [analyzer] INFO: Added new file to list with pid 1352 and path C:\Users\Administrator\AppData\Local\Temp\hsperfdata_Administrator\backup.exe 2025-07-09 05:53:29,733 [analyzer] INFO: Added new file to list with pid 544 and path C:\backup.exe 2025-07-09 05:53:57,203 [analyzer] INFO: Analysis timeout hit, terminating analysis. 2025-07-09 05:53:57,655 [analyzer] INFO: Terminating remaining processes before shutdown. 2025-07-09 05:53:57,655 [lib.api.process] INFO: Successfully terminated process with pid 1352. 2025-07-09 05:53:57,655 [lib.api.process] INFO: Successfully terminated process with pid 544. 2025-07-09 05:53:57,687 [analyzer] INFO: Analysis completed.
2025-07-14 04:57:19,238 [cuckoo.core.scheduler] INFO: Task #6702919: acquired machine win7x649 (label=win7x649) 2025-07-14 04:57:19,243 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.209 for task #6702919 2025-07-14 04:57:19,619 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 972951 (interface=vboxnet0, host=192.168.168.209) 2025-07-14 04:57:19,746 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x649 2025-07-14 04:57:20,709 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x649 to vmcloak 2025-07-14 05:00:32,987 [cuckoo.core.guest] INFO: Starting analysis #6702919 on guest (id=win7x649, ip=192.168.168.209) 2025-07-14 05:00:33,994 [cuckoo.core.guest] DEBUG: win7x649: not ready yet 2025-07-14 05:00:39,162 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x649, ip=192.168.168.209) 2025-07-14 05:00:39,247 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x649, ip=192.168.168.209, monitor=latest, size=6660546) 2025-07-14 05:00:40,563 [cuckoo.core.resultserver] DEBUG: Task #6702919: live log analysis.log initialized. 2025-07-14 05:00:41,555 [cuckoo.core.resultserver] DEBUG: Task #6702919 is sending a BSON stream 2025-07-14 05:00:41,929 [cuckoo.core.resultserver] DEBUG: Task #6702919 is sending a BSON stream 2025-07-14 05:00:42,225 [cuckoo.core.resultserver] DEBUG: Task #6702919 is sending a BSON stream 2025-07-14 05:00:42,776 [cuckoo.core.resultserver] DEBUG: Task #6702919: File upload for 'shots/0001.jpg' 2025-07-14 05:00:42,789 [cuckoo.core.resultserver] DEBUG: Task #6702919 uploaded file length: 133438 2025-07-14 05:00:55,214 [cuckoo.core.guest] DEBUG: win7x649: analysis #6702919 still processing 2025-07-14 05:01:10,309 [cuckoo.core.guest] DEBUG: win7x649: analysis #6702919 still processing 2025-07-14 05:01:11,005 [cuckoo.core.resultserver] DEBUG: Task #6702919: File upload for 'curtain/1752033237.38.curtain.log' 2025-07-14 05:01:11,008 [cuckoo.core.resultserver] DEBUG: Task #6702919 uploaded file length: 36 2025-07-14 05:01:11,235 [cuckoo.core.resultserver] DEBUG: Task #6702919: File upload for 'sysmon/1752033237.61.sysmon.xml' 2025-07-14 05:01:11,271 [cuckoo.core.resultserver] DEBUG: Task #6702919 uploaded file length: 2359544 2025-07-14 05:01:11,296 [cuckoo.core.resultserver] DEBUG: Task #6702919: File upload for 'files/ac33ea9ad9388571_backup.exe' 2025-07-14 05:01:11,300 [cuckoo.core.resultserver] DEBUG: Task #6702919 uploaded file length: 176639 2025-07-14 05:01:11,302 [cuckoo.core.resultserver] DEBUG: Task #6702919: File upload for 'files/645028c193bd4908_backup.exe' 2025-07-14 05:01:11,305 [cuckoo.core.resultserver] DEBUG: Task #6702919 uploaded file length: 176641 2025-07-14 05:01:11,330 [cuckoo.core.resultserver] DEBUG: Task #6702919 had connection reset for <Context for LOG> 2025-07-14 05:01:13,318 [cuckoo.core.guest] INFO: win7x649: analysis completed successfully 2025-07-14 05:01:13,327 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-07-14 05:01:13,345 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-07-14 05:01:14,733 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x649 to path /srv/cuckoo/cwd/storage/analyses/6702919/memory.dmp 2025-07-14 05:01:14,751 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x649 2025-07-14 05:03:36,848 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.209 for task #6702919 2025-07-14 05:03:37,534 [cuckoo.core.scheduler] DEBUG: Released database task #6702919 2025-07-14 05:03:37,557 [cuckoo.core.scheduler] INFO: Task #6702919: analysis procedure completed
description | The packer/protector section names/keywords | rule | suspicious_packer_section | ||||||
description | (no description) | rule | SEH__vba | ||||||
description | Escalade priviledges | rule | escalate_priv | ||||||
description | Create or check mutex | rule | win_mutex | ||||||
description | Affect system registries | rule | win_registry | ||||||
description | Affect system token | rule | win_token |
section | .imports |
file | C:\Users\Administrator\AppData\Local\Temp\0C7910BA-F902-421E-9E69-CF9AEE0DD4D7\backup.exe |
file | C:\backup.exe |
file | C:\Users\Administrator\AppData\Local\Temp\backup.exe |
file | C:\Users\Administrator\AppData\Local\Temp\9C7EA51D-B2B9-4ABB-A82F-1B32707A146E\backup.exe |
file | C:\Users\Administrator\AppData\Local\Temp\hsperfdata_Administrator\backup.exe |
file | C:\Users\Administrator\AppData\Local\Temp\0C7910BA-F902-421E-9E69-CF9AEE0DD4D7\backup.exe |
section | UPX0 | description | Section name indicates UPX | ||||||
section | UPX1 | description | Section name indicates UPX |
G Data Antivirus (Windows) | Virus: Trojan.Generic.4385790 (Engine A), Win32.Trojan.Vilsel.A (Engine B) |
Avast Core Security (Linux) | Win32:Vilsel-CT [Trj] |
C4S ClamAV (Linux) | Win.Malware.Genpack-6989317-0 |
Trellix (Linux) | Generic VB.z trojan |
WithSecure (Linux) | Trojan.TR/Crypt.ULPM.Gen |
eScan Antivirus (Linux) | Trojan.Generic.4385790(DB) |
ESET Security (Windows) | Win32/VB.OZA trojan |
Sophos Anti-Virus (Linux) | Troj/VB-LET |
DrWeb Antivirus (Linux) | Trojan.Copyself.102 |
ClamAV (Linux) | Win.Malware.Genpack-6989317-0 |
Bitdefender Antivirus (Linux) | Trojan.Generic.4385790 |
Kaspersky Standard (Windows) | Trojan.Win32.Vilsel.loy |
Emsisoft Commandline Scanner (Windows) | Trojan.Generic.4385790 (B) |