Size | 61.5KB |
---|---|
Type | PE32 executable (GUI) Intel 80386, for MS Windows |
MD5 | ce3b52d32b4729d8532da93503065b74 |
SHA1 | 2a8918aef2981fdd5b69608b89cd367139c7a6b3 |
SHA256 | a46d6f9493e699bb445276642b8139e0439aa829a5d3d1b8c44cab3a164291ed |
SHA512 |
d321de54cfe28131bc127387a2708e4c881635fc641c5172cb0dad3d98e3783bb93f9d5b20debfd130e3198be106f44f8c20c9a7e2ab27dae276f28372bd1e9a
|
CRC32 | 7BDE1CB7 |
ssdeep | None |
Yara |
|
This file is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | July 14, 2025, 12:58 p.m. | July 14, 2025, 12:59 p.m. | 72 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-07-09 07:33:50,015 [analyzer] DEBUG: Starting analyzer from: C:\tmpblqbwr 2025-07-09 07:33:50,046 [analyzer] DEBUG: Pipe server name: \??\PIPE\dwKRsctedTfZPKvplMiYMtkWcuLcukXH 2025-07-09 07:33:50,046 [analyzer] DEBUG: Log pipe server name: \??\PIPE\auCTwJoUENdIrMLuvWhj 2025-07-09 07:33:50,280 [analyzer] DEBUG: Started auxiliary module Curtain 2025-07-09 07:33:50,280 [analyzer] DEBUG: Started auxiliary module DbgView 2025-07-09 07:33:50,671 [analyzer] DEBUG: Started auxiliary module Disguise 2025-07-09 07:33:50,858 [analyzer] DEBUG: Loaded monitor into process with pid 504 2025-07-09 07:33:50,858 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-07-09 07:33:50,858 [analyzer] DEBUG: Started auxiliary module Human 2025-07-09 07:33:50,858 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-07-09 07:33:50,858 [analyzer] DEBUG: Started auxiliary module Reboot 2025-07-09 07:33:50,937 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-07-09 07:33:50,937 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-07-09 07:33:50,937 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-07-09 07:33:50,937 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-07-09 07:33:51,062 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\a46d6f9493e699bb445276642b8139e0439aa829a5d3d1b8c44cab3a164291ed.exe' with arguments '' and pid 2772 2025-07-09 07:33:51,250 [analyzer] DEBUG: Loaded monitor into process with pid 2772 2025-07-09 07:33:51,265 [analyzer] INFO: Added new file to list with pid 2772 and path C:\Users\Administrator\AppData\Roaming\v9g0134h.exe 2025-07-09 07:33:51,375 [analyzer] INFO: Injected into process with pid 2380 and name u'v9g0134h.exe' 2025-07-09 07:33:51,546 [analyzer] DEBUG: Loaded monitor into process with pid 2380 2025-07-09 07:33:51,546 [analyzer] INFO: Added new file to list with pid 2380 and path C:\Users\Administrator\AppData\Roaming\umcuwp8de.exe 2025-07-09 07:33:51,655 [analyzer] INFO: Injected into process with pid 176 and name u'umcuwp8de.exe' 2025-07-09 07:33:51,842 [analyzer] DEBUG: Loaded monitor into process with pid 176 2025-07-09 07:34:20,062 [analyzer] INFO: Analysis timeout hit, terminating analysis. 2025-07-09 07:34:20,483 [analyzer] INFO: Terminating remaining processes before shutdown. 2025-07-09 07:34:20,483 [lib.api.process] INFO: Successfully terminated process with pid 2772. 2025-07-09 07:34:20,483 [lib.api.process] INFO: Successfully terminated process with pid 2380. 2025-07-09 07:34:20,483 [lib.api.process] INFO: Successfully terminated process with pid 176. 2025-07-09 07:34:20,515 [analyzer] INFO: Analysis completed.
2025-07-14 12:58:12,339 [cuckoo.core.scheduler] INFO: Task #6705059: acquired machine win7x6418 (label=win7x6418) 2025-07-14 12:58:12,341 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.218 for task #6705059 2025-07-14 12:58:12,685 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 1711777 (interface=vboxnet0, host=192.168.168.218) 2025-07-14 12:58:12,758 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x6418 2025-07-14 12:58:13,591 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x6418 to vmcloak 2025-07-14 12:58:23,665 [cuckoo.core.guest] INFO: Starting analysis #6705059 on guest (id=win7x6418, ip=192.168.168.218) 2025-07-14 12:58:24,673 [cuckoo.core.guest] DEBUG: win7x6418: not ready yet 2025-07-14 12:58:29,708 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x6418, ip=192.168.168.218) 2025-07-14 12:58:29,842 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x6418, ip=192.168.168.218, monitor=latest, size=6660546) 2025-07-14 12:58:31,080 [cuckoo.core.resultserver] DEBUG: Task #6705059: live log analysis.log initialized. 2025-07-14 12:58:31,883 [cuckoo.core.resultserver] DEBUG: Task #6705059 is sending a BSON stream 2025-07-14 12:58:32,259 [cuckoo.core.resultserver] DEBUG: Task #6705059 is sending a BSON stream 2025-07-14 12:58:32,553 [cuckoo.core.resultserver] DEBUG: Task #6705059 is sending a BSON stream 2025-07-14 12:58:32,835 [cuckoo.core.resultserver] DEBUG: Task #6705059 is sending a BSON stream 2025-07-14 12:58:33,151 [cuckoo.core.resultserver] DEBUG: Task #6705059: File upload for 'shots/0001.jpg' 2025-07-14 12:58:33,166 [cuckoo.core.resultserver] DEBUG: Task #6705059 uploaded file length: 133441 2025-07-14 12:58:45,768 [cuckoo.core.guest] DEBUG: win7x6418: analysis #6705059 still processing 2025-07-14 12:59:01,015 [cuckoo.core.guest] DEBUG: win7x6418: analysis #6705059 still processing 2025-07-14 12:59:01,417 [cuckoo.core.resultserver] DEBUG: Task #6705059: File upload for 'curtain/1752039260.33.curtain.log' 2025-07-14 12:59:01,421 [cuckoo.core.resultserver] DEBUG: Task #6705059 uploaded file length: 36 2025-07-14 12:59:01,570 [cuckoo.core.resultserver] DEBUG: Task #6705059: File upload for 'sysmon/1752039260.48.sysmon.xml' 2025-07-14 12:59:01,583 [cuckoo.core.resultserver] DEBUG: Task #6705059 uploaded file length: 451502 2025-07-14 12:59:01,589 [cuckoo.core.resultserver] DEBUG: Task #6705059: File upload for 'files/02be62eb6e6ff64b_v9g0134h.exe' 2025-07-14 12:59:01,592 [cuckoo.core.resultserver] DEBUG: Task #6705059 uploaded file length: 62976 2025-07-14 12:59:01,595 [cuckoo.core.resultserver] DEBUG: Task #6705059: File upload for 'files/afa29518deb31dfa_umcuwp8de.exe' 2025-07-14 12:59:01,597 [cuckoo.core.resultserver] DEBUG: Task #6705059 uploaded file length: 62976 2025-07-14 12:59:02,249 [cuckoo.core.resultserver] DEBUG: Task #6705059 had connection reset for <Context for LOG> 2025-07-14 12:59:04,030 [cuckoo.core.guest] INFO: win7x6418: analysis completed successfully 2025-07-14 12:59:04,047 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-07-14 12:59:04,079 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-07-14 12:59:05,188 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x6418 to path /srv/cuckoo/cwd/storage/analyses/6705059/memory.dmp 2025-07-14 12:59:05,190 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x6418 2025-07-14 12:59:23,692 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.218 for task #6705059 2025-07-14 12:59:24,318 [cuckoo.core.scheduler] DEBUG: Released database task #6705059 2025-07-14 12:59:24,348 [cuckoo.core.scheduler] INFO: Task #6705059: analysis procedure completed
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Communications over HTTP | rule | network_http | ||||||
description | Create or check mutex | rule | win_mutex | ||||||
description | Affect system registries | rule | win_registry | ||||||
description | Affect private profile | rule | win_files_operation |
suspicious_features | GET method with no useragent header | suspicious_request | GET http://mkkuei4kdsz.com/486/515.html |
request | GET http://mkkuei4kdsz.com/486/515.html |
file | C:\Users\Administrator\AppData\Roaming\v9g0134h.exe |
file | C:\Users\Administrator\AppData\Roaming\umcuwp8de.exe |
file | C:\Users\Administrator\AppData\Roaming\v9g0134h.exe |
file | C:\Users\Administrator\AppData\Roaming\umcuwp8de.exe |
suricata | ThreatFox botnet C2 traffic (domain - confidence level: 100%) |
suricata | ET MALWARE Ransom.Win32.Birele.gsg Checkin |
suricata | ThreatFox botnet C2 traffic (url - confidence level: 75%) |
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\yauayui | reg_value | C:\Users\Administrator\AppData\Roaming\v9g0134h.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\17no75 | reg_value | C:\Users\Administrator\AppData\Roaming\umcuwp8de.exe |
G Data Antivirus (Windows) | Virus: Generic.Dacic.1A7FA519.A.A43354F0 (Engine A), Win32.Trojan.PSE.14IDQ4O (Engine B) |
Avast Core Security (Linux) | Win32:Buterat-WQ [Trj] |
C4S ClamAV (Linux) | Win.Malware.Ulise-7170100-0 |
Trellix (Linux) | GenericRXHT-PZ |
WithSecure (Linux) | Heuristic.HEUR/AGEN.1366724 |
eScan Antivirus (Linux) | Generic.Dacic.1A7FA519.A.A43354F0(DB) |
ESET Security (Windows) | a variant of Win32/SpyVoltar.B trojan |
Sophos Anti-Virus (Linux) | Troj/Buterat-E |
DrWeb Antivirus (Linux) | BackDoor.Butirat.245 |
ClamAV (Linux) | Win.Malware.Ulise-7170100-0 |
Bitdefender Antivirus (Linux) | Generic.Dacic.1A7FA519.A.A43354F0 |
Kaspersky Standard (Windows) | HEUR:Trojan.Win32.Generic |
Emsisoft Commandline Scanner (Windows) | Generic.Dacic.1A7FA519.A.A43354F0 (B) |
Bkav | W32.AIDetectMalware |
Cynet | Malicious (score: 100) |
CAT-QuickHeal | Backdoor.ButeratPMF.S28341189 |
Skyhigh | BehavesLike.Win32.Dropper.kh |
ALYac | Generic.Dacic.1A7FA519.A.A43354F0 |
Cylance | Unsafe |
VIPRE | Generic.Dacic.1A7FA519.A.A43354F0 |
Sangfor | Suspicious.Win32.Save.a |
CrowdStrike | win/malicious_confidence_100% (D) |
BitDefender | Generic.Dacic.1A7FA519.A.A43354F0 |
K7GW | Trojan ( 005b5adb1 ) |
K7AntiVirus | Trojan ( 005b5adb1 ) |
Arcabit | Generic.Dacic.1A7FA519.A.A43354F0 |
Symantec | Infostealer.Scapzilla |
Elastic | malicious (high confidence) |
ESET-NOD32 | a variant of Win32/SpyVoltar.B |
APEX | Malicious |
Avast | Win32:Buterat-WQ [Trj] |
ClamAV | Win.Malware.Ulise-7170100-0 |
Kaspersky | VHO:Trojan-Downloader.Win32.Agent.gen |
NANO-Antivirus | Trojan.Win32.Butirat.kylcit |
SUPERAntiSpyware | Trojan.Agent/Gen-Downloader |
MicroWorld-eScan | Generic.Dacic.1A7FA519.A.A43354F0 |
Rising | Trojan.Clicker!1.BC6E (CLASSIC) |
Emsisoft | Generic.Dacic.1A7FA519.A.A43354F0 (B) |
F-Secure | Heuristic.HEUR/AGEN.1366724 |
DrWeb | BackDoor.Butirat.245 |
Zillya | Trojan.SpyVoltar.Win32.450 |
McAfeeD | Real Protect-LS!CE3B52D32B47 |
Trapmine | suspicious.low.ml.score |
CTX | exe.unknown.dacic |
Sophos | Troj/Buterat-E |
SentinelOne | Static AI - Malicious PE |
Jiangmin | Trojan.Generic.hkwfh |
Webroot | W32.Trojan.Gen |
Detected | |
Avira | HEUR/AGEN.1366724 |
Antiy-AVL | Trojan/Win32.SpyVoltar |
Kingsoft | malware.kb.a.992 |
Gridinsoft | Trojan.Win32.Downloader.oa!s1 |
Xcitium | TrojWare.Win32.Neconyd.A@8a2d6k |
Microsoft | Trojan:Win32/ButeRat!pz |
ZoneAlarm | Troj/Buterat-E |
GData | Win32.Trojan.PSE.14IDQ4O |
Varist | W32/S-b6e4fd03!Eldorado |
AhnLab-V3 | Trojan/Win32.Vundo.C223194 |
Acronis | suspicious |
VBA32 | BScope.Backdoor.Butirat |
TACHYON | Trojan/W32.Vundo.62976.I |
DeepInstinct | MALICIOUS |