Size | 88.2KB |
---|---|
Type | PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed |
MD5 | 5b4f826e98d33c7dcac3f1dce011a29f |
SHA1 | 608a945c956157f57138149cece7c01ae3cc4871 |
SHA256 | c4d8a432e8d267fd95be61a5c9006c5ebb243f5f651c7057f3048c8b07d2e57f |
SHA512 |
3fac5682bbd92542de60da96281fb7d0870cd24134ceae74911c253b8487385ca062e677aeb9a3191d3ae5ac37a4125b6b15cc93aff006375bc9b05c699462a1
|
CRC32 | 41E91506 |
ssdeep | None |
Yara |
|
This file is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | July 14, 2025, 1:11 p.m. | July 14, 2025, 1:12 p.m. | 76 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-07-09 07:34:07,015 [analyzer] DEBUG: Starting analyzer from: C:\tmpblqbwr 2025-07-09 07:34:07,030 [analyzer] DEBUG: Pipe server name: \??\PIPE\VyPzxrXBXZUCKQHpGMzBKNmVvV 2025-07-09 07:34:07,030 [analyzer] DEBUG: Log pipe server name: \??\PIPE\JUrzireBivvIBFWM 2025-07-09 07:34:07,312 [analyzer] DEBUG: Started auxiliary module Curtain 2025-07-09 07:34:07,312 [analyzer] DEBUG: Started auxiliary module DbgView 2025-07-09 07:34:07,717 [analyzer] DEBUG: Started auxiliary module Disguise 2025-07-09 07:34:07,921 [analyzer] DEBUG: Loaded monitor into process with pid 504 2025-07-09 07:34:07,921 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-07-09 07:34:07,921 [analyzer] DEBUG: Started auxiliary module Human 2025-07-09 07:34:07,921 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-07-09 07:34:07,937 [analyzer] DEBUG: Started auxiliary module Reboot 2025-07-09 07:34:08,092 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-07-09 07:34:08,092 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-07-09 07:34:08,092 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-07-09 07:34:08,092 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-07-09 07:34:08,233 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\c4d8a432e8d267fd95be61a5c9006c5ebb243f5f651c7057f3048c8b07d2e57f.exe' with arguments '' and pid 1648 2025-07-09 07:34:08,437 [analyzer] DEBUG: Loaded monitor into process with pid 1648 2025-07-09 07:34:08,530 [analyzer] INFO: Added new file to list with pid 1648 and path C:\Users\Administrator\AppData\Local\Temp\backup.exe 2025-07-09 07:34:08,546 [analyzer] INFO: Added new file to list with pid 1648 and path C:\Users\Administrator\AppData\Local\Temp\0C7910BA-F902-421E-9E69-CF9AEE0DD4D7\backup.exe 2025-07-09 07:34:08,640 [analyzer] INFO: Injected into process with pid 3032 and name '' 2025-07-09 07:34:08,842 [analyzer] DEBUG: Loaded monitor into process with pid 3032 2025-07-09 07:34:08,921 [analyzer] INFO: Added new file to list with pid 1648 and path C:\Users\Administrator\AppData\Local\Temp\9C7EA51D-B2B9-4ABB-A82F-1B32707A146E\System Restore.exe 2025-07-09 07:34:09,030 [analyzer] INFO: Added new file to list with pid 1648 and path C:\Users\Administrator\AppData\Local\Temp\hsperfdata_Administrator\data.exe 2025-07-09 07:34:09,921 [analyzer] INFO: Added new file to list with pid 3032 and path C:\backup.exe 2025-07-09 07:34:37,233 [analyzer] INFO: Analysis timeout hit, terminating analysis. 2025-07-09 07:34:37,687 [analyzer] INFO: Terminating remaining processes before shutdown. 2025-07-09 07:34:37,687 [lib.api.process] INFO: Successfully terminated process with pid 1648. 2025-07-09 07:34:37,687 [lib.api.process] INFO: Successfully terminated process with pid 3032. 2025-07-09 07:34:37,717 [analyzer] INFO: Analysis completed.
2025-07-14 13:11:38,540 [cuckoo.core.scheduler] INFO: Task #6705116: acquired machine win7x6418 (label=win7x6418) 2025-07-14 13:11:38,540 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.218 for task #6705116 2025-07-14 13:11:38,938 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 1730337 (interface=vboxnet0, host=192.168.168.218) 2025-07-14 13:11:39,012 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x6418 2025-07-14 13:11:40,148 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x6418 to vmcloak 2025-07-14 13:11:52,730 [cuckoo.core.guest] INFO: Starting analysis #6705116 on guest (id=win7x6418, ip=192.168.168.218) 2025-07-14 13:11:53,738 [cuckoo.core.guest] DEBUG: win7x6418: not ready yet 2025-07-14 13:11:58,885 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x6418, ip=192.168.168.218) 2025-07-14 13:11:58,982 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x6418, ip=192.168.168.218, monitor=latest, size=6660546) 2025-07-14 13:12:00,192 [cuckoo.core.resultserver] DEBUG: Task #6705116: live log analysis.log initialized. 2025-07-14 13:12:01,069 [cuckoo.core.resultserver] DEBUG: Task #6705116 is sending a BSON stream 2025-07-14 13:12:01,569 [cuckoo.core.resultserver] DEBUG: Task #6705116 is sending a BSON stream 2025-07-14 13:12:01,959 [cuckoo.core.resultserver] DEBUG: Task #6705116 is sending a BSON stream 2025-07-14 13:12:02,597 [cuckoo.core.resultserver] DEBUG: Task #6705116: File upload for 'shots/0001.jpg' 2025-07-14 13:12:02,608 [cuckoo.core.resultserver] DEBUG: Task #6705116 uploaded file length: 133433 2025-07-14 13:12:14,830 [cuckoo.core.guest] DEBUG: win7x6418: analysis #6705116 still processing 2025-07-14 13:12:29,931 [cuckoo.core.guest] DEBUG: win7x6418: analysis #6705116 still processing 2025-07-14 13:12:30,713 [cuckoo.core.resultserver] DEBUG: Task #6705116: File upload for 'curtain/1752039277.5.curtain.log' 2025-07-14 13:12:30,717 [cuckoo.core.resultserver] DEBUG: Task #6705116 uploaded file length: 36 2025-07-14 13:12:30,897 [cuckoo.core.resultserver] DEBUG: Task #6705116: File upload for 'sysmon/1752039277.67.sysmon.xml' 2025-07-14 13:12:30,905 [cuckoo.core.resultserver] DEBUG: Task #6705116 uploaded file length: 508298 2025-07-14 13:12:30,914 [cuckoo.core.resultserver] DEBUG: Task #6705116: File upload for 'files/7aedcf8e586fa034_backup.exe' 2025-07-14 13:12:30,918 [cuckoo.core.resultserver] DEBUG: Task #6705116 uploaded file length: 90326 2025-07-14 13:12:30,922 [cuckoo.core.resultserver] DEBUG: Task #6705116: File upload for 'files/8db88b8ba2d529b8_data.exe' 2025-07-14 13:12:30,928 [cuckoo.core.resultserver] DEBUG: Task #6705116 uploaded file length: 90326 2025-07-14 13:12:30,937 [cuckoo.core.resultserver] DEBUG: Task #6705116: File upload for 'files/1be1de044d223bbd_backup.exe' 2025-07-14 13:12:30,945 [cuckoo.core.resultserver] DEBUG: Task #6705116 uploaded file length: 90328 2025-07-14 13:12:31,611 [cuckoo.core.resultserver] DEBUG: Task #6705116 had connection reset for <Context for LOG> 2025-07-14 13:12:32,950 [cuckoo.core.guest] INFO: win7x6418: analysis completed successfully 2025-07-14 13:12:32,965 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-07-14 13:12:32,997 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-07-14 13:12:34,475 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x6418 to path /srv/cuckoo/cwd/storage/analyses/6705116/memory.dmp 2025-07-14 13:12:34,477 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x6418 2025-07-14 13:12:54,011 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.218 for task #6705116 2025-07-14 13:12:54,387 [cuckoo.core.scheduler] DEBUG: Released database task #6705116 2025-07-14 13:12:54,405 [cuckoo.core.scheduler] INFO: Task #6705116: analysis procedure completed
description | (no description) | rule | UPX | ||||||
description | The packer/protector section names/keywords | rule | suspicious_packer_section |
file | C:\Users\Administrator\AppData\Local\Temp\0C7910BA-F902-421E-9E69-CF9AEE0DD4D7\backup.exe |
file | C:\Users\Administrator\AppData\Local\Temp\hsperfdata_Administrator\data.exe |
file | C:\backup.exe |
file | C:\Users\Administrator\AppData\Local\Temp\9C7EA51D-B2B9-4ABB-A82F-1B32707A146E\System Restore.exe |
file | C:\Users\Administrator\AppData\Local\Temp\backup.exe |
file | C:\Users\Administrator\AppData\Local\Temp\0C7910BA-F902-421E-9E69-CF9AEE0DD4D7\backup.exe |
file | C:\Users\Administrator\AppData\Local\Temp\hsperfdata_Administrator\data.exe |
section | {u'size_of_data': u'0x00003e00', u'virtual_address': u'0x00011000', u'entropy': 7.804677160000422, u'name': u'UPX1', u'virtual_size': u'0x00004000'} | entropy | 7.80467716 | description | A section with a high entropy has been found | |||||||||
entropy | 0.392405063291 | description | Overall entropy of this PE file is high |
section | UPX0 | description | Section name indicates UPX | ||||||
section | UPX1 | description | Section name indicates UPX |
G Data Antivirus (Windows) | Virus: Trojan.Generic.4385790 (Engine A), Win32.Trojan.Vilsel.B (Engine B) |
Avast Core Security (Linux) | Win32:Evo-gen [Trj] |
C4S ClamAV (Linux) | Win.Malware.Genpack-6989317-0 |
Trend Micro SProtect (Linux) | WORM_VILSEL.SMB |
Trellix (Linux) | Generic VB.z trojan |
WithSecure (Linux) | Trojan.TR/Crypt.ULPM.Gen |
eScan Antivirus (Linux) | Trojan.Generic.4385790(DB) |
ESET Security (Windows) | Win32/VB.OZA trojan |
Sophos Anti-Virus (Linux) | Troj/VB-LET |
DrWeb Antivirus (Linux) | Trojan.Copyself.102 |
ClamAV (Linux) | Win.Malware.Genpack-6989317-0 |
Bitdefender Antivirus (Linux) | Trojan.Generic.4385790 |
Kaspersky Standard (Windows) | Trojan.Win32.Vilsel.loy |
Emsisoft Commandline Scanner (Windows) | Trojan.Generic.4385790 (B) |