Size | 82.2KB |
---|---|
Type | PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed |
MD5 | 8e40a3100c8cd3aa06b08e964ea25768 |
SHA1 | 7afd70271de061ee2cdaccadf09775902b6d4777 |
SHA256 | a7af2569fed576a3acab402888694f819003701dced2be334c555620ddbd35cc |
SHA512 |
37bef6e3d0732875e49f2ab1bc751b6a09e5d8a4b72f904e8cbd2ecf9299f4fb9ee706def7bb3fd06886c820c16dc4eb3e03d5e5fd0f08b73c1b901dd39f1e3b
|
CRC32 | 4ACE5832 |
ssdeep | None |
Yara |
|
This file is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | July 20, 2025, 12:37 p.m. | July 20, 2025, 12:43 p.m. | 309 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-07-18 11:07:14,000 [analyzer] DEBUG: Starting analyzer from: C:\tmpmdfut4 2025-07-18 11:07:14,015 [analyzer] DEBUG: Pipe server name: \??\PIPE\KxkJPdTQTGMzOyRIeDB 2025-07-18 11:07:14,015 [analyzer] DEBUG: Log pipe server name: \??\PIPE\vzbSyoAxHadiShUuxoS 2025-07-18 11:07:14,342 [analyzer] DEBUG: Started auxiliary module Curtain 2025-07-18 11:07:14,342 [analyzer] DEBUG: Started auxiliary module DbgView 2025-07-18 11:07:14,796 [analyzer] DEBUG: Started auxiliary module Disguise 2025-07-18 11:07:15,015 [analyzer] DEBUG: Loaded monitor into process with pid 504 2025-07-18 11:07:15,015 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-07-18 11:07:15,015 [analyzer] DEBUG: Started auxiliary module Human 2025-07-18 11:07:15,015 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-07-18 11:07:15,015 [analyzer] DEBUG: Started auxiliary module Reboot 2025-07-18 11:07:15,108 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-07-18 11:07:15,108 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-07-18 11:07:15,125 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-07-18 11:07:15,125 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-07-18 11:07:15,250 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\a7af2569fed576a3acab402888694f819003701dced2be334c555620ddbd35cc.exe' with arguments '' and pid 572 2025-07-18 11:07:15,467 [analyzer] DEBUG: Loaded monitor into process with pid 572 2025-07-18 11:07:15,546 [analyzer] INFO: Added new file to list with pid 572 and path C:\Users\Administrator\AppData\Local\Temp\backup.exe 2025-07-18 11:07:15,562 [analyzer] INFO: Added new file to list with pid 572 and path C:\Users\Administrator\AppData\Local\Temp\0C7910BA-F902-421E-9E69-CF9AEE0DD4D7\backup.exe 2025-07-18 11:07:15,655 [analyzer] INFO: Injected into process with pid 2892 and name '' 2025-07-18 11:07:15,828 [analyzer] DEBUG: Loaded monitor into process with pid 2892 2025-07-18 11:07:15,905 [analyzer] INFO: Added new file to list with pid 572 and path C:\Users\Administrator\AppData\Local\Temp\9C7EA51D-B2B9-4ABB-A82F-1B32707A146E\backup.exe 2025-07-18 11:07:16,000 [analyzer] INFO: Added new file to list with pid 572 and path C:\Users\Administrator\AppData\Local\Temp\hsperfdata_Administrator\backup.exe 2025-07-18 11:07:16,875 [analyzer] INFO: Added new file to list with pid 2892 and path C:\backup.exe 2025-07-18 11:07:44,265 [analyzer] INFO: Analysis timeout hit, terminating analysis. 2025-07-18 11:07:44,765 [analyzer] INFO: Terminating remaining processes before shutdown. 2025-07-18 11:07:44,765 [lib.api.process] INFO: Successfully terminated process with pid 572. 2025-07-18 11:07:44,765 [lib.api.process] INFO: Successfully terminated process with pid 2892. 2025-07-18 11:07:44,780 [analyzer] INFO: Analysis completed.
2025-07-20 12:37:55,763 [cuckoo.core.scheduler] INFO: Task #6746929: acquired machine win7x644 (label=win7x644) 2025-07-20 12:37:55,764 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.204 for task #6746929 2025-07-20 12:37:56,307 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 2961506 (interface=vboxnet0, host=192.168.168.204) 2025-07-20 12:37:56,396 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x644 2025-07-20 12:37:57,634 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x644 to vmcloak 2025-07-20 12:40:09,504 [cuckoo.core.guest] INFO: Starting analysis #6746929 on guest (id=win7x644, ip=192.168.168.204) 2025-07-20 12:40:10,517 [cuckoo.core.guest] DEBUG: win7x644: not ready yet 2025-07-20 12:40:15,750 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x644, ip=192.168.168.204) 2025-07-20 12:40:15,861 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x644, ip=192.168.168.204, monitor=latest, size=6660546) 2025-07-20 12:40:17,315 [cuckoo.core.resultserver] DEBUG: Task #6746929: live log analysis.log initialized. 2025-07-20 12:40:18,397 [cuckoo.core.resultserver] DEBUG: Task #6746929 is sending a BSON stream 2025-07-20 12:40:18,746 [cuckoo.core.resultserver] DEBUG: Task #6746929 is sending a BSON stream 2025-07-20 12:40:19,086 [cuckoo.core.resultserver] DEBUG: Task #6746929 is sending a BSON stream 2025-07-20 12:40:19,566 [cuckoo.core.resultserver] DEBUG: Task #6746929: File upload for 'shots/0001.jpg' 2025-07-20 12:40:19,583 [cuckoo.core.resultserver] DEBUG: Task #6746929 uploaded file length: 133529 2025-07-20 12:40:31,995 [cuckoo.core.guest] DEBUG: win7x644: analysis #6746929 still processing 2025-07-20 12:40:47,094 [cuckoo.core.guest] DEBUG: win7x644: analysis #6746929 still processing 2025-07-20 12:40:47,888 [cuckoo.core.resultserver] DEBUG: Task #6746929: File upload for 'curtain/1752829664.53.curtain.log' 2025-07-20 12:40:47,893 [cuckoo.core.resultserver] DEBUG: Task #6746929 uploaded file length: 36 2025-07-20 12:40:48,079 [cuckoo.core.resultserver] DEBUG: Task #6746929: File upload for 'sysmon/1752829664.73.sysmon.xml' 2025-07-20 12:40:48,099 [cuckoo.core.resultserver] DEBUG: Task #6746929 uploaded file length: 1262440 2025-07-20 12:40:48,107 [cuckoo.core.resultserver] DEBUG: Task #6746929: File upload for 'files/541e4b1225d48f5a_backup.exe' 2025-07-20 12:40:48,110 [cuckoo.core.resultserver] DEBUG: Task #6746929 uploaded file length: 84158 2025-07-20 12:40:48,113 [cuckoo.core.resultserver] DEBUG: Task #6746929: File upload for 'files/a8bb8d43053b171d_backup.exe' 2025-07-20 12:40:48,116 [cuckoo.core.resultserver] DEBUG: Task #6746929 uploaded file length: 84160 2025-07-20 12:40:48,124 [cuckoo.core.resultserver] DEBUG: Task #6746929: File upload for 'files/97e9a89d47a075e0_backup.exe' 2025-07-20 12:40:48,129 [cuckoo.core.resultserver] DEBUG: Task #6746929 uploaded file length: 84158 2025-07-20 12:40:48,462 [cuckoo.core.resultserver] DEBUG: Task #6746929 had connection reset for <Context for LOG> 2025-07-20 12:40:50,111 [cuckoo.core.guest] INFO: win7x644: analysis completed successfully 2025-07-20 12:40:50,127 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-07-20 12:40:50,155 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-07-20 12:40:51,543 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x644 to path /srv/cuckoo/cwd/storage/analyses/6746929/memory.dmp 2025-07-20 12:40:51,545 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x644 2025-07-20 12:43:04,755 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.204 for task #6746929 2025-07-20 12:43:05,159 [cuckoo.core.scheduler] DEBUG: Released database task #6746929 2025-07-20 12:43:05,176 [cuckoo.core.scheduler] INFO: Task #6746929: analysis procedure completed
description | The packer/protector section names/keywords | rule | suspicious_packer_section | ||||||
description | (no description) | rule | SEH__vba | ||||||
description | Escalade priviledges | rule | escalate_priv | ||||||
description | Create or check mutex | rule | win_mutex | ||||||
description | Affect system registries | rule | win_registry | ||||||
description | Affect system token | rule | win_token |
section | .imports |
file | C:\Users\Administrator\AppData\Local\Temp\0C7910BA-F902-421E-9E69-CF9AEE0DD4D7\backup.exe |
file | C:\backup.exe |
file | C:\Users\Administrator\AppData\Local\Temp\backup.exe |
file | C:\Users\Administrator\AppData\Local\Temp\9C7EA51D-B2B9-4ABB-A82F-1B32707A146E\backup.exe |
file | C:\Users\Administrator\AppData\Local\Temp\hsperfdata_Administrator\backup.exe |
file | C:\Users\Administrator\AppData\Local\Temp\0C7910BA-F902-421E-9E69-CF9AEE0DD4D7\backup.exe |
section | UPX0 | description | Section name indicates UPX | ||||||
section | UPX1 | description | Section name indicates UPX |
G Data Antivirus (Windows) | Virus: Trojan.GenericKD.44959075 (Engine A), Win32.Trojan.Vilsel.A (Engine B) |
Avast Core Security (Linux) | Win32:Vilsel-CT [Trj] |
C4S ClamAV (Linux) | Win.Malware.Genpack-6989317-0 |
Trend Micro SProtect (Linux) | WORM_VILSEL.SMB |
Trellix (Linux) | Generic VB.z trojan |
WithSecure (Linux) | Trojan.TR/Dropper.Gen |
eScan Antivirus (Linux) | Trojan.GenericKD.44959075(DB) |
ESET Security (Windows) | Win32/VB.OZA trojan |
Sophos Anti-Virus (Linux) | Troj/VB-LET |
DrWeb Antivirus (Linux) | Trojan.Copyself.102 |
ClamAV (Linux) | Win.Malware.Genpack-6989317-0 |
Bitdefender Antivirus (Linux) | Trojan.GenericKD.44959075 |
Kaspersky Standard (Windows) | Trojan.Win32.Vilsel.loy |
Emsisoft Commandline Scanner (Windows) | Trojan.GenericKD.44959075 (B) |