Size | 88.2KB |
---|---|
Type | PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed |
MD5 | c21e260e88a8225124c97dab8cf96160 |
SHA1 | b12a76ec6a474fedc62d9b56af61ae12e41259c8 |
SHA256 | af5f9fabf7d89d8f0d8af6b93206727c598a8eadfd3b3b4780c99001de7c7613 |
SHA512 |
d4730bd7d562d9ad6c4b47cd544725aa7744f4fdb01b1985dba0cb762feb91d4a324b0ba67a7f5219e358b201c5d76d44bc3f7c4e1b0bb01fdd10155547d61d7
|
CRC32 | 50E8A1B2 |
ssdeep | None |
Yara |
|
This file is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | July 14, 2025, 1:11 p.m. | July 14, 2025, 1:12 p.m. | 67 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-07-09 07:34:07,015 [analyzer] DEBUG: Starting analyzer from: C:\tmptpreht 2025-07-09 07:34:07,015 [analyzer] DEBUG: Pipe server name: \??\PIPE\PXQFDETDiAQrBduEQH 2025-07-09 07:34:07,015 [analyzer] DEBUG: Log pipe server name: \??\PIPE\MBaibPFMqbPxGmeTvLqtRtDqtrsfu 2025-07-09 07:34:07,312 [analyzer] DEBUG: Started auxiliary module Curtain 2025-07-09 07:34:07,312 [analyzer] DEBUG: Started auxiliary module DbgView 2025-07-09 07:34:08,015 [analyzer] DEBUG: Started auxiliary module Disguise 2025-07-09 07:34:08,203 [analyzer] DEBUG: Loaded monitor into process with pid 500 2025-07-09 07:34:08,203 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-07-09 07:34:08,203 [analyzer] DEBUG: Started auxiliary module Human 2025-07-09 07:34:08,203 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-07-09 07:34:08,203 [analyzer] DEBUG: Started auxiliary module Reboot 2025-07-09 07:34:08,280 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-07-09 07:34:08,280 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-07-09 07:34:08,280 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-07-09 07:34:08,280 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-07-09 07:34:08,453 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\af5f9fabf7d89d8f0d8af6b93206727c598a8eadfd3b3b4780c99001de7c7613.exe' with arguments '' and pid 2648 2025-07-09 07:34:08,687 [analyzer] DEBUG: Loaded monitor into process with pid 2648 2025-07-09 07:34:08,780 [analyzer] INFO: Added new file to list with pid 2648 and path C:\Users\Administrator\AppData\Local\Temp\backup.exe 2025-07-09 07:34:08,796 [analyzer] INFO: Added new file to list with pid 2648 and path C:\Users\Administrator\AppData\Local\Temp\0C7910BA-F902-421E-9E69-CF9AEE0DD4D7\backup.exe 2025-07-09 07:34:08,890 [analyzer] INFO: Injected into process with pid 344 and name '' 2025-07-09 07:34:09,078 [analyzer] DEBUG: Loaded monitor into process with pid 344 2025-07-09 07:34:09,171 [analyzer] INFO: Added new file to list with pid 2648 and path C:\Users\Administrator\AppData\Local\Temp\9C7EA51D-B2B9-4ABB-A82F-1B32707A146E\backup.exe 2025-07-09 07:34:09,328 [analyzer] INFO: Added new file to list with pid 2648 and path C:\Users\Administrator\AppData\Local\Temp\hsperfdata_Administrator\backup.exe 2025-07-09 07:34:10,140 [analyzer] INFO: Added new file to list with pid 344 and path C:\backup.exe 2025-07-09 07:34:37,453 [analyzer] INFO: Analysis timeout hit, terminating analysis. 2025-07-09 07:34:37,905 [analyzer] INFO: Terminating remaining processes before shutdown. 2025-07-09 07:34:37,905 [lib.api.process] INFO: Successfully terminated process with pid 2648. 2025-07-09 07:34:37,905 [lib.api.process] INFO: Successfully terminated process with pid 344. 2025-07-09 07:34:37,937 [analyzer] INFO: Analysis completed.
2025-07-14 13:11:27,875 [cuckoo.core.scheduler] INFO: Task #6705115: acquired machine win7x641 (label=win7x641) 2025-07-14 13:11:27,876 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.201 for task #6705115 2025-07-14 13:11:28,245 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 1730138 (interface=vboxnet0, host=192.168.168.201) 2025-07-14 13:11:28,305 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x641 2025-07-14 13:11:29,141 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x641 to vmcloak 2025-07-14 13:11:40,537 [cuckoo.core.guest] INFO: Starting analysis #6705115 on guest (id=win7x641, ip=192.168.168.201) 2025-07-14 13:11:41,544 [cuckoo.core.guest] DEBUG: win7x641: not ready yet 2025-07-14 13:11:46,584 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x641, ip=192.168.168.201) 2025-07-14 13:11:46,678 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x641, ip=192.168.168.201, monitor=latest, size=6660546) 2025-07-14 13:11:48,101 [cuckoo.core.resultserver] DEBUG: Task #6705115: live log analysis.log initialized. 2025-07-14 13:11:49,250 [cuckoo.core.resultserver] DEBUG: Task #6705115 is sending a BSON stream 2025-07-14 13:11:49,702 [cuckoo.core.resultserver] DEBUG: Task #6705115 is sending a BSON stream 2025-07-14 13:11:50,094 [cuckoo.core.resultserver] DEBUG: Task #6705115 is sending a BSON stream 2025-07-14 13:11:50,551 [cuckoo.core.resultserver] DEBUG: Task #6705115: File upload for 'shots/0001.jpg' 2025-07-14 13:11:50,576 [cuckoo.core.resultserver] DEBUG: Task #6705115 uploaded file length: 133433 2025-07-14 13:12:02,898 [cuckoo.core.guest] DEBUG: win7x641: analysis #6705115 still processing 2025-07-14 13:12:18,089 [cuckoo.core.guest] DEBUG: win7x641: analysis #6705115 still processing 2025-07-14 13:12:18,861 [cuckoo.core.resultserver] DEBUG: Task #6705115: File upload for 'curtain/1752039277.73.curtain.log' 2025-07-14 13:12:18,866 [cuckoo.core.resultserver] DEBUG: Task #6705115 uploaded file length: 36 2025-07-14 13:12:19,014 [cuckoo.core.resultserver] DEBUG: Task #6705115: File upload for 'sysmon/1752039277.89.sysmon.xml' 2025-07-14 13:12:19,021 [cuckoo.core.resultserver] DEBUG: Task #6705115 uploaded file length: 526368 2025-07-14 13:12:19,030 [cuckoo.core.resultserver] DEBUG: Task #6705115: File upload for 'files/98095e12419a5484_backup.exe' 2025-07-14 13:12:19,032 [cuckoo.core.resultserver] DEBUG: Task #6705115 uploaded file length: 90300 2025-07-14 13:12:19,037 [cuckoo.core.resultserver] DEBUG: Task #6705115: File upload for 'files/a1378d16cf226114_backup.exe' 2025-07-14 13:12:19,039 [cuckoo.core.resultserver] DEBUG: Task #6705115 uploaded file length: 90302 2025-07-14 13:12:19,044 [cuckoo.core.resultserver] DEBUG: Task #6705115: File upload for 'files/dc531a3005803477_backup.exe' 2025-07-14 13:12:19,047 [cuckoo.core.resultserver] DEBUG: Task #6705115 uploaded file length: 90300 2025-07-14 13:12:19,574 [cuckoo.core.resultserver] DEBUG: Task #6705115 had connection reset for <Context for LOG> 2025-07-14 13:12:21,102 [cuckoo.core.guest] INFO: win7x641: analysis completed successfully 2025-07-14 13:12:21,115 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-07-14 13:12:21,143 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-07-14 13:12:22,224 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x641 to path /srv/cuckoo/cwd/storage/analyses/6705115/memory.dmp 2025-07-14 13:12:22,225 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x641 2025-07-14 13:12:34,385 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.201 for task #6705115 2025-07-14 13:12:34,869 [cuckoo.core.scheduler] DEBUG: Released database task #6705115 2025-07-14 13:12:34,885 [cuckoo.core.scheduler] INFO: Task #6705115: analysis procedure completed
description | (no description) | rule | UPX | ||||||
description | The packer/protector section names/keywords | rule | suspicious_packer_section |
file | C:\Users\Administrator\AppData\Local\Temp\0C7910BA-F902-421E-9E69-CF9AEE0DD4D7\backup.exe |
file | C:\backup.exe |
file | C:\Users\Administrator\AppData\Local\Temp\backup.exe |
file | C:\Users\Administrator\AppData\Local\Temp\9C7EA51D-B2B9-4ABB-A82F-1B32707A146E\backup.exe |
file | C:\Users\Administrator\AppData\Local\Temp\hsperfdata_Administrator\backup.exe |
file | C:\Users\Administrator\AppData\Local\Temp\0C7910BA-F902-421E-9E69-CF9AEE0DD4D7\backup.exe |
section | {u'size_of_data': u'0x00003e00', u'virtual_address': u'0x00011000', u'entropy': 7.804677160000422, u'name': u'UPX1', u'virtual_size': u'0x00004000'} | entropy | 7.80467716 | description | A section with a high entropy has been found | |||||||||
entropy | 0.392405063291 | description | Overall entropy of this PE file is high |
section | UPX0 | description | Section name indicates UPX | ||||||
section | UPX1 | description | Section name indicates UPX |
G Data Antivirus (Windows) | Virus: Trojan.Generic.4385790 (Engine A), Win32.Trojan.Vilsel.B (Engine B) |
Avast Core Security (Linux) | Win32:Evo-gen [Trj] |
C4S ClamAV (Linux) | Win.Malware.Genpack-6989317-0 |
Trend Micro SProtect (Linux) | WORM_VILSEL.SMB |
Trellix (Linux) | Generic VB.z trojan |
WithSecure (Linux) | Trojan.TR/Crypt.ULPM.Gen |
eScan Antivirus (Linux) | Trojan.Generic.4385790(DB) |
ESET Security (Windows) | Win32/VB.OZA trojan |
Sophos Anti-Virus (Linux) | Troj/VB-LET |
DrWeb Antivirus (Linux) | Trojan.Copyself.102 |
ClamAV (Linux) | Win.Malware.Genpack-6989317-0 |
Bitdefender Antivirus (Linux) | Trojan.Generic.4385790 |
Kaspersky Standard (Windows) | Trojan.Win32.Vilsel.loy |
Emsisoft Commandline Scanner (Windows) | Trojan.Generic.4385790 (B) |
tehtris | Generic.Malware |
Cynet | Malicious (score: 100) |
Skyhigh | BehavesLike.Win32.Generic.mh |
ALYac | Trojan.Generic.4385790 |
Cylance | Unsafe |
VIPRE | Trojan.Generic.4385790 |
Sangfor | Suspicious.Win32.Save.a |
CrowdStrike | win/malicious_confidence_100% (D) |
BitDefender | Trojan.Generic.4385790 |
K7GW | Trojan ( 005640b91 ) |
K7AntiVirus | Trojan ( 005640b91 ) |
Arcabit | Trojan.Generic.D42EBFE |
Baidu | Win32.Trojan.VB.x |
VirIT | Trojan.Win32.Copyself.DY |
Symantec | W32.Vilsel!gen1 |
Elastic | malicious (moderate confidence) |
ESET-NOD32 | Win32/VB.OZA |
APEX | Malicious |
Avast | Win32:Evo-gen [Trj] |
ClamAV | Win.Malware.Genpack-6989317-0 |
Kaspersky | Trojan.Win32.Vilsel.loy |
NANO-Antivirus | Trojan.Win32.Vilsel.junlqn |
SUPERAntiSpyware | Trojan.Agent/Gen-Dropper |
MicroWorld-eScan | Trojan.Generic.4385790 |
Rising | Stealer.Fareit!8.170 (TFE:1:KB9r79iDurJ) |
Emsisoft | Trojan.Generic.4385790 (B) |
F-Secure | Trojan.TR/Crypt.ULPM.Gen |
DrWeb | Trojan.Copyself.102 |
Zillya | Trojan.Vilsel.Win32.13108 |
TrendMicro | WORM_VILSEL.SMB |
McAfeeD | Real Protect-LS!C21E260E88A8 |
Trapmine | malicious.high.ml.score |
CTX | exe.trojan.generic |
Sophos | Troj/VB-LET |
SentinelOne | Static AI - Malicious PE |
Jiangmin | Trojan.Vilsel.cji |
Webroot | W32.Trojan.Gen |
Detected | |
Avira | TR/Crypt.ULPM.Gen |
Antiy-AVL | Trojan/Win32.Vilsel |
Kingsoft | malware.kb.b.999 |
Gridinsoft | Trojan.Win32.Agent.bot!s2 |
Xcitium | TrojWare.Win32.Trojan.Vilsel.loy0@1qq4nk |
Microsoft | Trojan:Win32/PlugX!rfn |
ZoneAlarm | Troj/VB-LET |
GData | Win32.Trojan.Vilsel.B |
Varist | W32/VB.ADL.gen!Eldorado |
AhnLab-V3 | Trojan/Win.Vilsel.R614204 |
VBA32 | SScope.Trojan.VB |
DeepInstinct | MALICIOUS |