File c4cd302acef1cc16abc10c84e86abbbab2c9133db00b20aa589d13c1af8db088

Size 84.5KB
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
MD5 f853d251ee7e1d5aa2fc29310d6eaba1
SHA1 2f89fa8b670525df63c9d1b697bb45b344932d6f
SHA256 c4cd302acef1cc16abc10c84e86abbbab2c9133db00b20aa589d13c1af8db088
SHA512
173d2e7f0a8956d9c7d063a541f21160bc9b310b7ca8e6629b59f15d7b3bfd0fdd3fb82d939611b140223ccc9967b17de6a9bdae02a8c665212226292f518da9
CRC32 6239E572
ssdeep None
Yara
  • ThreadControl__Context - (no description)
  • win_files_operation - Affect private profile

Score

This file is very suspicious, with a score of 10 out of 10!

Please notice: The scoring system is currently still in development and should be considered an alpha feature.


Autosubmit

6904226

Feedback

Expecting different results? Send us this analysis and we will inspect it. Click here

Information on Execution

Analysis
Category Started Completed Duration Routing Logs
FILE Aug. 23, 2025, 6:45 p.m. Aug. 23, 2025, 6:52 p.m. 387 seconds internet Show Analyzer Log
Show Cuckoo Log

Analyzer Log

2025-08-16 07:45:06,000 [analyzer] DEBUG: Starting analyzer from: C:\tmpsftntc
2025-08-16 07:45:06,015 [analyzer] DEBUG: Pipe server name: \??\PIPE\rqABVGeWTjIOAWQtpr
2025-08-16 07:45:06,015 [analyzer] DEBUG: Log pipe server name: \??\PIPE\bylCKWEUitweUhnSUv
2025-08-16 07:45:06,328 [analyzer] DEBUG: Started auxiliary module Curtain
2025-08-16 07:45:06,328 [analyzer] DEBUG: Started auxiliary module DbgView
2025-08-16 07:45:06,828 [analyzer] DEBUG: Started auxiliary module Disguise
2025-08-16 07:45:07,062 [analyzer] DEBUG: Loaded monitor into process with pid 508
2025-08-16 07:45:07,062 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets
2025-08-16 07:45:07,062 [analyzer] DEBUG: Started auxiliary module Human
2025-08-16 07:45:07,062 [analyzer] DEBUG: Started auxiliary module InstallCertificate
2025-08-16 07:45:07,062 [analyzer] DEBUG: Started auxiliary module Reboot
2025-08-16 07:45:07,108 [analyzer] DEBUG: Started auxiliary module RecentFiles
2025-08-16 07:45:07,108 [analyzer] DEBUG: Started auxiliary module Screenshots
2025-08-16 07:45:07,125 [analyzer] DEBUG: Started auxiliary module Sysmon
2025-08-16 07:45:07,125 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n
2025-08-16 07:45:07,280 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\c4cd302acef1cc16abc10c84e86abbbab2c9133db00b20aa589d13c1af8db088.exe' with arguments '' and pid 2668
2025-08-16 07:45:07,453 [analyzer] DEBUG: Loaded monitor into process with pid 2668
2025-08-16 07:45:07,515 [analyzer] INFO: Injected into process with pid 984 and name ''
2025-08-16 07:45:07,592 [lib.api.process] ERROR: Failed to dump memory of 32-bit process with pid 984.
2025-08-16 07:45:07,703 [analyzer] INFO: Added new file to list with pid 2668 and path C:\Users\Administrator\AppData\Local\Temp\RCXE649.tmp
2025-08-16 07:45:36,280 [analyzer] INFO: Analysis timeout hit, terminating analysis.
2025-08-16 07:45:36,733 [analyzer] INFO: Terminating remaining processes before shutdown.
2025-08-16 07:45:36,733 [analyzer] INFO: Analysis completed.

Cuckoo Log

2025-08-23 18:45:57,287 [cuckoo.core.scheduler] DEBUG: Task #6879283: no machine available yet
2025-08-23 18:45:58,321 [cuckoo.core.scheduler] DEBUG: Task #6879283: no machine available yet
2025-08-23 18:45:59,342 [cuckoo.core.scheduler] DEBUG: Task #6879283: no machine available yet
2025-08-23 18:46:00,359 [cuckoo.core.scheduler] DEBUG: Task #6879283: no machine available yet
2025-08-23 18:46:01,397 [cuckoo.core.scheduler] INFO: Task #6879283: acquired machine win7x6421 (label=win7x6421)
2025-08-23 18:46:01,398 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.221 for task #6879283
2025-08-23 18:46:01,702 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 3970730 (interface=vboxnet0, host=192.168.168.221)
2025-08-23 18:46:01,883 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x6421
2025-08-23 18:46:02,422 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x6421 to vmcloak
2025-08-23 18:48:53,204 [cuckoo.core.guest] INFO: Starting analysis #6879283 on guest (id=win7x6421, ip=192.168.168.221)
2025-08-23 18:48:54,210 [cuckoo.core.guest] DEBUG: win7x6421: not ready yet
2025-08-23 18:48:59,240 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x6421, ip=192.168.168.221)
2025-08-23 18:48:59,408 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x6421, ip=192.168.168.221, monitor=latest, size=6660546)
2025-08-23 18:49:01,223 [cuckoo.core.resultserver] DEBUG: Task #6879283: live log analysis.log initialized.
2025-08-23 18:49:02,222 [cuckoo.core.resultserver] DEBUG: Task #6879283 is sending a BSON stream
2025-08-23 18:49:02,598 [cuckoo.core.resultserver] DEBUG: Task #6879283 is sending a BSON stream
2025-08-23 18:49:03,452 [cuckoo.core.resultserver] DEBUG: Task #6879283: File upload for 'shots/0001.jpg'
2025-08-23 18:49:03,475 [cuckoo.core.resultserver] DEBUG: Task #6879283 uploaded file length: 133475
2025-08-23 18:49:15,956 [cuckoo.core.guest] DEBUG: win7x6421: analysis #6879283 still processing
2025-08-23 18:49:31,052 [cuckoo.core.guest] DEBUG: win7x6421: analysis #6879283 still processing
2025-08-23 18:49:31,737 [cuckoo.core.resultserver] DEBUG: Task #6879283: File upload for 'curtain/1755323136.52.curtain.log'
2025-08-23 18:49:31,740 [cuckoo.core.resultserver] DEBUG: Task #6879283 uploaded file length: 36
2025-08-23 18:49:31,934 [cuckoo.core.resultserver] DEBUG: Task #6879283: File upload for 'sysmon/1755323136.7.sysmon.xml'
2025-08-23 18:49:31,954 [cuckoo.core.resultserver] DEBUG: Task #6879283 uploaded file length: 1620834
2025-08-23 18:49:31,963 [cuckoo.core.resultserver] DEBUG: Task #6879283: File upload for 'files/26061aa445837715_c4cd302acef1cc16abc10c84e86abbbab2c9133db00b20aa589d13c1af8db088.exe'
2025-08-23 18:49:31,966 [cuckoo.core.resultserver] DEBUG: Task #6879283 uploaded file length: 86528
2025-08-23 18:49:32,181 [cuckoo.core.resultserver] DEBUG: Task #6879283 had connection reset for <Context for LOG>
2025-08-23 18:49:34,166 [cuckoo.core.guest] INFO: win7x6421: analysis completed successfully
2025-08-23 18:49:34,187 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks
2025-08-23 18:49:34,219 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer
2025-08-23 18:49:35,100 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x6421 to path /srv/cuckoo/cwd/storage/analyses/6879283/memory.dmp
2025-08-23 18:49:35,102 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x6421
2025-08-23 18:52:24,034 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.221 for task #6879283
2025-08-23 18:52:24,571 [cuckoo.core.scheduler] DEBUG: Released database task #6879283
2025-08-23 18:52:24,596 [cuckoo.core.scheduler] INFO: Task #6879283: analysis procedure completed

Signatures

Yara rules detected for file (2 events)
description (no description) rule ThreadControl__Context
description Affect private profile rule win_files_operation
One or more potentially interesting buffers were extracted, these generally contain injected code, configuration data, etc.
The binary likely contains encrypted or compressed data indicative of a packer (2 events)
section {u'size_of_data': u'0x00006c00', u'virtual_address': u'0x00014000', u'entropy': 7.98419053084366, u'name': u'.rsrc', u'virtual_size': u'0x00006b80'} entropy 7.98419053084 description A section with a high entropy has been found
entropy 0.323353293413 description Overall entropy of this PE file is high
Allocates execute permission to another process indicative of possible code injection (1 event)
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 984
region_size: 77824
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00400000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000008c
1 0 0
Manipulates memory of a non-child process indicative of process injection (3 events)
Process injection Process 2668 manipulating memory of non-child process 984
Time & API Arguments Status Return Repeated

NtUnmapViewOfSection

base_address: 0x00400000
region_size: 4096
process_identifier: 984
process_handle: 0x0000008c
1 0 0

NtAllocateVirtualMemory

process_identifier: 984
region_size: 77824
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00400000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000008c
1 0 0
Potential code injection by writing to the memory of another process (13 events)
Process injection Process 2668 injected into non-child 984
Time & API Arguments Status Return Repeated

WriteProcessMemory

buffer: MZÿÿ¸@€º´ Í!¸LÍ!This program cannot be run in DOS mode. $PELèL^ŽÅà  8`ÐP@0Ae ˆ °’d.text`68`P`.dataP<@0À.rdataø`>@0@/4Œ p F@0@.bss€€`À.idataˆ R@0À.CRT `@0À.tls °b@0À/148Àd@@B/29BÐ f@B/41Ið†@B/55Ȉ@B/678Š@0B/80— Œ@B
base_address: 0x00400000
process_identifier: 984
process_handle: 0x0000008c
1 1 0

WriteProcessMemory

buffer: ýÿÿÿ@F@ÿÿÿÿ
base_address: 0x00405000
process_identifier: 984
process_handle: 0x0000008c
1 1 0

WriteProcessMemory

buffer: libgcc_s_dw2-1.dll__register_frame_info__deregister_frame_infoAPPDATA\WPDNSE\\a.exea.exeSOFTWARE\Microsoft\Windows\CurrentVersion\RunWindows Atapi x86_64 Driver <CAPSLOCK> <SHIFT> <LCTRL> <RCTRL> <INSERT> <END> <PRINT> <DEL> <BK> <LEFT> <RIGHT> <UP> <DOWN> <SPACE> <TAB> <ENTER> <ESC> 0123456789´@J@€@€@€@c@€@€@@€@€@€@ì@€@€@€@€@€@€@|@€@€@€@€@1@€@€@i@€@Í@ÿ@æ@@€@‚@€@€@P@›@€@@¨@Á@Ú@ó@ @%@>@T@j@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@•@®@Ç@à@ù@@+@D@]@v@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@@7@InformationPress OK to stop logging.keys.txt£@â@â@â@â@`@â@â@0@â@0@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@0@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@à@p@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@0@â@0@â@0@P"@Mingw runtime failure: VirtualQuery failed for %d bytes at address %p Unknown pseudo relocation protocol version %d. Unknown pseudo relocation bit size %d. .glob-1.0-mingw32.GCC: (GNU) 8.2.0GCC: (GNU) 8.2.0GCC: (MinGW.org GCC-8.2.0-5) 8.2.0GCC: (GNU) 8.2.0GCC: (GNU) 8.2.0GCC: (GNU) 8.2.0GCC: (GNU) 8.2.0GCC: (GNU) 8.2.0GCC: (GNU) 8.2.0GCC: (GNU) 8.2.0GCC: (GNU) 8.2.0GCC: (GNU) 8.2.0GCC: (GNU) 8.2.0GCC: (GNU) 8.2.0GCC: (GNU) 8.2.0GCC: (GNU) 8.2.0GCC: (GNU) 8.2.0GCC: (GNU) 8.2.0GCC: (GNU) 8.2.0GCC: (GNU) 8.2.0GCC: (GNU) 8.2.0
base_address: 0x00406000
process_identifier: 984
process_handle: 0x0000008c
1 1 0

WriteProcessMemory

buffer: zR| ˆàŸÿÿ’C q L 8d¡ÿÿìA…B DƒT8¢ÿÿ?C@{l`¢ÿÿC €l¢ÿÿC ”x¢ÿÿ¨t¢ÿÿzR| ˆ(X¢ÿÿ¡A…B E†ƒ{ ÃAÆAÅ K HÜ¢ÿÿ.A…B jÅ zR| ˆÔ¢ÿÿWA…B SÅ zPLR|L@ ˆ$$ë¢ÿÿ_F@A…B GƒTÅà $L"¤ÿÿñ+F@A…B GƒæÅà ¬ë¤ÿÿAA…B ;Å Ì ©ÿÿxA…B rÅ ìd©ÿÿA…B NÅ  V©ÿÿA…B NÅ $ôH©ÿÿ™MF@A…B Dƒ‘Åà T¹©ÿÿA…B XÅ zPLR|L@ ˆ$$ ÒÿÿG=F@A…B DƒÅà zR| ˆ<Ü©ÿÿfA…B F‡†ƒR ÃAÆAÇAÅ B æ ÃAÆAÇAÅ G zR| ˆ$ô¬ÿÿ]ƒH  …AÅ _ÃzR| ˆ8„ÑÿÿÂD GuEutu|ux«Á AÃAÆAÅC zR| ˆp­ÿÿ1N\ 4˜­ÿÿFAƒC j AÃA XÄ­ÿÿzR| ˆ¸­ÿÿCC U H `D<è­ÿÿšA†A ƒC d  FÃAÆC t  FÃAÆC _ FÃAÆ„@®ÿÿzR| ˆ8$®ÿÿ`A†A ƒC LI PC jC C AÃAÆDXH®ÿÿ‚A†C ƒC L  CÃAÆI sN OE C  AÃAÆA < ®ÿÿ›AƒC P CÃI LI gC C CÃK ZC 0àð®ÿÿ±C c J iC _ E ^ B LC zR| ˆd¯ÿÿJA†A ƒC d<”¯ÿÿìA…A ‡C†CƒEPXDCPm AÃAÆ AÇAÅG d@CPB@CPC AÃAÆ AÇAÅA T¤°ÿÿÚj…A ‡A†AƒC@‹ AÃAÆ AÇAÅA ò AÃAÆ AÇAÅJ zR| ˆܱÿÿwC A A zR| ˆ<(²ÿÿ)A…C ‡A†CƒCP AÃAÆ AÇAÅF T\µÿÿA…A ‡C†AƒC@’ CÃAÆ AÇAÅA C CÃCÆ AÇAÅC 0´Ð¶ÿÿŽA†F ƒE ÃAÆC v ÃAÆC 4è,·ÿÿOA†C ƒC x  CÃAÆA C FÃAÆD D·ÿÿ\A‡A †CƒE @ Cà AÆAÇA CFà AÆAÇ(h\·ÿÿIA†C ƒE o  AÃAÆF <”€·ÿÿxA…B F‡†ƒ ÃAÆAÇAÅ A Ç ÃAÆAÇAÅ H ,ÔÀ¿ÿÿ×A…B F‡†ƒF ÃAÆAÇAÅ A @pÀÿÿWA‡A †AƒC O Aà AÆAÇH oAà AÆAÇzR| ˆ,tÀÿÿåA…B F‡†ƒ´ ÃAÆAÇAÅ A zR| ˆ@ÄÿÿÓA†A ƒHàPØCàH  CÃAÆG M  CÃAÆA L`¸Äÿÿ¢A†A ƒHàPØCàG  CÃAÆH M  CÃAÆA [ CÃAÆT°ÅÿÿñA…A ‡A†AƒFÀS CÃAÆ AÇAÅA O CÃAÆ AÇAÅG ÀÆÿÿOAƒCv CÃC (,ìÆÿÿBAƒC VC Q AÃA ,XÇÿÿXAƒC VC R AÃA eAÈ@Çÿÿ'CQ A 4¤TÇÿÿqA†A ƒC R  AÃAÆG N AÃAÆzR| ˆ`Êÿÿ
base_address: 0x00407000
process_identifier: 984
process_handle: 0x0000008c
1 1 0

WriteProcessMemory

buffer:  ä𒰐P›’‘h›t’‘𛀒œ‘ œ“°‘$œ“À‘xœ$“h“v“†“˜“¤“¸“Гè“ö“””$”2”D”^”n”„”˜”ª”¼”ؔ𔕕,•>•N•X•d•t•„•”•¢•´•¾•ȕԕà•è•ô•þ•–––&–0–8–B–L–X–b–l–x–‚–Œ––– –ª–¶––Ԗè–ö– — —<—T—˜—¨—¸—ð—X˜Œ˜Ð˜™T™™Ì™ šLšˆšÀšh“v“†“˜“¤“¸“Гè“ö“””$”2”D”^”n”„”˜”ª”¼”ؔ𔕕,•>•N•X•d•t•„•”•¢•´•¾•ȕԕà•è•ô•þ•–––&–0–8–B–L–X–b–l–x–‚–Œ––– –ª–¶––Ԗè–ö– — —<—T—˜—¨—¸—ð—X˜Œ˜Ð˜™T™™Ì™ šLšˆšÀšƒRegCloseKey¯RegOpenKeyExAËRegSetValueExAqCopyFileA|CreateDirectoryAÐDeleteCriticalSectioníEnterCriticalSectionExitProcess-FindClose1FindFirstFileABFindNextFileAaFreeLibrary…GetCommandLineAÚGetEnvironmentVariableAÿGetLastErrorGetModuleFileNameAGetModuleHandleABGetProcAddress_GetStartupInfoAßInitializeCriticalSection/LeaveCriticalSection2LoadLibraryAlSetUnhandledExceptionFilterTlsGetValueµVirtualProtect·VirtualQueryQ_strdupS_stricollY__getmainargsx__mb_cur_max„__p__environ†__p__fmodeš__set_app_type×_cexit_errno@_fpresetZ_fullpath_iob¢_isctype­_onexit¶_pctypeí_setmode7abort?atexitFcallocgfreerfwriteŸmalloc¦mbstowcs«memcpyÀreallocÇsetlocaleÉsignalÖstrcoll×strcpyÝstrlenùtolowervfprintf)wcstombsCallNextHookExàGetAsyncKeyState³MessageBoxACSetWindowsHookExA_Unwind_Resume%__deregister_frame_infok__register_frame_infoá_ZNKSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEE5c_strEvå_ZNSaIcEC1Evè_ZNSaIcED1Ev¢_ZNSt14basic_ofstreamIcSt11char_traitsIcEE5closeEv¦_ZNSt14basic_ofstreamIcSt11char_traitsIcEEC1ERKNSt7__cxx1112basic_stringIcS1_SaIcEEESt13_Ios_Openmode¯_ZNSt14basic_ofstreamIcSt11char_traitsIcEED1Evö _ZNSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEE6appendEPKc6 _ZNSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEEC1EPKcRKS3_9 _ZNSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEEC1ERKS4_@ _ZNSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEEC1EvT _ZNSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEED1EvW _ZNSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEEaSEPKc\ _ZNSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEEpLEPKcø_ZStlsISt11char_traitsIcEERSt13basic_ostreamIcT_ES5_PKcû_ZStlsISt11char_traitsIcEERSt13basic_ostreamIcT_ES5_cZ__gxx_personality_v0ADVAPI32.DLLKERNEL32.dll((msvcrt.dll<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<msvcrt.dllPPPPUSER32.dlldddlibgcc_s_dw2-1.dllxxxxxxxxxxxxxxxxlibstdc++-6.dll
base_address: 0x00409000
process_identifier: 984
process_handle: 0x0000008c
1 1 0

WriteProcessMemory

buffer: P"@"@
base_address: 0x0040a000
process_identifier: 984
process_handle: 0x0000008c
1 1 0

WriteProcessMemory

buffer: °@°@X@ @
base_address: 0x0040b000
process_identifier: 984
process_handle: 0x0000008c
1 1 0

WriteProcessMemory

buffer: ˆ(@*&
base_address: 0x0040c000
process_identifier: 984
process_handle: 0x0000008c
1 1 0

WriteProcessMemory

buffer: %% $ > &I : ; 9  : ; 9 I8  I: ; 9 II ! 4: ; 9 I?< 4: ;9 I?< !I/ 'II&> I: ; 9 (  : ; 9  : ;9 I8  : ;9 I8> I: ;9 <'4G: ;9 
base_address: 0x0040f000
process_identifier: 984
process_handle: 0x0000008c
1 1 0

WriteProcessMemory

buffer: mIû ../../../src/gcc-8.2.0/libgcc/config/i386cygwin.Sˆ(@Ž""YK0g=YY0/>""SMû /home/keith/mingw32-gcc-8.2.0/include../../../src/gcc-8.2.0/libgcc/../include../.././gcc../../../src/gcc-8.2.0/libgcc/../gcc/config/i386../../../src/gcc-8.2.0/libgccstdio.hstdlib.hgetopt.htime.hhashtab.hinsn-constants.hi386.hi386-opts.hlibgcc2.hgbl-ctors.hlibgcc2.c
base_address: 0x00410000
process_identifier: 984
process_handle: 0x0000008c
1 1 0

WriteProcessMemory

buffer: ÿÿÿÿ| ˆ ˆ(@*AA €fÀAÁ
base_address: 0x00411000
process_identifier: 984
process_handle: 0x0000008c
1 1 0

WriteProcessMemory

buffer: ../../../src/gcc-8.2.0/libgcc/config/i386/cygwin.S/home/keith/src/mingw/gcc-build/gcc-8.2.0-mingw32-cross-native-sandbox/mingw32/libgccGNU AS 2.31.1
base_address: 0x00412000
process_identifier: 984
process_handle: 0x0000008c
1 1 0
Code injection by writing an executable or DLL to the memory of another process (2 events)
Process injection Process 2668 injected into non-child 984
Time & API Arguments Status Return Repeated

WriteProcessMemory

buffer: MZÿÿ¸@€º´ Í!¸LÍ!This program cannot be run in DOS mode. $PELèL^ŽÅà  8`ÐP@0Ae ˆ °’d.text`68`P`.dataP<@0À.rdataø`>@0@/4Œ p F@0@.bss€€`À.idataˆ R@0À.CRT `@0À.tls °b@0À/148Àd@@B/29BÐ f@B/41Ið†@B/55Ȉ@B/678Š@0B/80— Œ@B
base_address: 0x00400000
process_identifier: 984
process_handle: 0x0000008c
1 1 0
Used NtSetContextThread to modify a thread in a remote process indicative of process injection (2 events)
Process injection Process 2668 called NtSetContextThread to modify thread in remote process 984
Time & API Arguments Status Return Repeated

NtSetContextThread

registers.eip: 1995637172
registers.esp: 2686960
registers.edi: 0
registers.eax: 4199120
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
thread_handle: 0x00000088
process_identifier: 984
1 0 0
Resumed a suspended thread in a remote process potentially indicative of process injection (2 events)
Process injection Process 2668 resumed a thread in remote process 984
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x00000088
suspend_count: 1
process_identifier: 984
1 0 0
Executed a process and injected code into it, probably while unpacking (22 events)
Time & API Arguments Status Return Repeated

CreateProcessInternalW

thread_identifier: 2804
thread_handle: 0x00000088
process_identifier: 984
current_directory:
filepath: C:\Users\Administrator\AppData\Local\Temp\c4cd302acef1cc16abc10c84e86abbbab2c9133db00b20aa589d13c1af8db088.exe
track: 1
command_line:
filepath_r: C:\Users\Administrator\AppData\Local\Temp\c4cd302acef1cc16abc10c84e86abbbab2c9133db00b20aa589d13c1af8db088.exe
stack_pivoted: 0
creation_flags: 4 (CREATE_SUSPENDED)
inherit_handles: 0
process_handle: 0x0000008c
1 1 0

NtGetContextThread

thread_handle: 0x00000088
1 0 0

NtUnmapViewOfSection

base_address: 0x00400000
region_size: 4096
process_identifier: 984
process_handle: 0x0000008c
1 0 0

NtAllocateVirtualMemory

process_identifier: 984
region_size: 77824
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00400000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000008c
1 0 0

WriteProcessMemory

buffer: MZÿÿ¸@€º´ Í!¸LÍ!This program cannot be run in DOS mode. $PELèL^ŽÅà  8`ÐP@0Ae ˆ °’d.text`68`P`.dataP<@0À.rdataø`>@0@/4Œ p F@0@.bss€€`À.idataˆ R@0À.CRT `@0À.tls °b@0À/148Àd@@B/29BÐ f@B/41Ið†@B/55Ȉ@B/678Š@0B/80— Œ@B
base_address: 0x00400000
process_identifier: 984
process_handle: 0x0000008c
1 1 0

WriteProcessMemory

buffer:
base_address: 0x00401000
process_identifier: 984
process_handle: 0x0000008c
1 1 0

WriteProcessMemory

buffer: ýÿÿÿ@F@ÿÿÿÿ
base_address: 0x00405000
process_identifier: 984
process_handle: 0x0000008c
1 1 0

WriteProcessMemory

buffer: libgcc_s_dw2-1.dll__register_frame_info__deregister_frame_infoAPPDATA\WPDNSE\\a.exea.exeSOFTWARE\Microsoft\Windows\CurrentVersion\RunWindows Atapi x86_64 Driver <CAPSLOCK> <SHIFT> <LCTRL> <RCTRL> <INSERT> <END> <PRINT> <DEL> <BK> <LEFT> <RIGHT> <UP> <DOWN> <SPACE> <TAB> <ENTER> <ESC> 0123456789´@J@€@€@€@c@€@€@@€@€@€@ì@€@€@€@€@€@€@|@€@€@€@€@1@€@€@i@€@Í@ÿ@æ@@€@‚@€@€@P@›@€@@¨@Á@Ú@ó@ @%@>@T@j@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@•@®@Ç@à@ù@@+@D@]@v@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@€@@7@InformationPress OK to stop logging.keys.txt£@â@â@â@â@`@â@â@0@â@0@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@0@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@à@p@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@â@0@â@0@â@0@P"@Mingw runtime failure: VirtualQuery failed for %d bytes at address %p Unknown pseudo relocation protocol version %d. Unknown pseudo relocation bit size %d. .glob-1.0-mingw32.GCC: (GNU) 8.2.0GCC: (GNU) 8.2.0GCC: (MinGW.org GCC-8.2.0-5) 8.2.0GCC: (GNU) 8.2.0GCC: (GNU) 8.2.0GCC: (GNU) 8.2.0GCC: (GNU) 8.2.0GCC: (GNU) 8.2.0GCC: (GNU) 8.2.0GCC: (GNU) 8.2.0GCC: (GNU) 8.2.0GCC: (GNU) 8.2.0GCC: (GNU) 8.2.0GCC: (GNU) 8.2.0GCC: (GNU) 8.2.0GCC: (GNU) 8.2.0GCC: (GNU) 8.2.0GCC: (GNU) 8.2.0GCC: (GNU) 8.2.0GCC: (GNU) 8.2.0GCC: (GNU) 8.2.0
base_address: 0x00406000
process_identifier: 984
process_handle: 0x0000008c
1 1 0

WriteProcessMemory

buffer: zR| ˆàŸÿÿ’C q L 8d¡ÿÿìA…B DƒT8¢ÿÿ?C@{l`¢ÿÿC €l¢ÿÿC ”x¢ÿÿ¨t¢ÿÿzR| ˆ(X¢ÿÿ¡A…B E†ƒ{ ÃAÆAÅ K HÜ¢ÿÿ.A…B jÅ zR| ˆÔ¢ÿÿWA…B SÅ zPLR|L@ ˆ$$ë¢ÿÿ_F@A…B GƒTÅà $L"¤ÿÿñ+F@A…B GƒæÅà ¬ë¤ÿÿAA…B ;Å Ì ©ÿÿxA…B rÅ ìd©ÿÿA…B NÅ  V©ÿÿA…B NÅ $ôH©ÿÿ™MF@A…B Dƒ‘Åà T¹©ÿÿA…B XÅ zPLR|L@ ˆ$$ ÒÿÿG=F@A…B DƒÅà zR| ˆ<Ü©ÿÿfA…B F‡†ƒR ÃAÆAÇAÅ B æ ÃAÆAÇAÅ G zR| ˆ$ô¬ÿÿ]ƒH  …AÅ _ÃzR| ˆ8„ÑÿÿÂD GuEutu|ux«Á AÃAÆAÅC zR| ˆp­ÿÿ1N\ 4˜­ÿÿFAƒC j AÃA XÄ­ÿÿzR| ˆ¸­ÿÿCC U H `D<è­ÿÿšA†A ƒC d  FÃAÆC t  FÃAÆC _ FÃAÆ„@®ÿÿzR| ˆ8$®ÿÿ`A†A ƒC LI PC jC C AÃAÆDXH®ÿÿ‚A†C ƒC L  CÃAÆI sN OE C  AÃAÆA < ®ÿÿ›AƒC P CÃI LI gC C CÃK ZC 0àð®ÿÿ±C c J iC _ E ^ B LC zR| ˆd¯ÿÿJA†A ƒC d<”¯ÿÿìA…A ‡C†CƒEPXDCPm AÃAÆ AÇAÅG d@CPB@CPC AÃAÆ AÇAÅA T¤°ÿÿÚj…A ‡A†AƒC@‹ AÃAÆ AÇAÅA ò AÃAÆ AÇAÅJ zR| ˆܱÿÿwC A A zR| ˆ<(²ÿÿ)A…C ‡A†CƒCP AÃAÆ AÇAÅF T\µÿÿA…A ‡C†AƒC@’ CÃAÆ AÇAÅA C CÃCÆ AÇAÅC 0´Ð¶ÿÿŽA†F ƒE ÃAÆC v ÃAÆC 4è,·ÿÿOA†C ƒC x  CÃAÆA C FÃAÆD D·ÿÿ\A‡A †CƒE @ Cà AÆAÇA CFà AÆAÇ(h\·ÿÿIA†C ƒE o  AÃAÆF <”€·ÿÿxA…B F‡†ƒ ÃAÆAÇAÅ A Ç ÃAÆAÇAÅ H ,ÔÀ¿ÿÿ×A…B F‡†ƒF ÃAÆAÇAÅ A @pÀÿÿWA‡A †AƒC O Aà AÆAÇH oAà AÆAÇzR| ˆ,tÀÿÿåA…B F‡†ƒ´ ÃAÆAÇAÅ A zR| ˆ@ÄÿÿÓA†A ƒHàPØCàH  CÃAÆG M  CÃAÆA L`¸Äÿÿ¢A†A ƒHàPØCàG  CÃAÆH M  CÃAÆA [ CÃAÆT°ÅÿÿñA…A ‡A†AƒFÀS CÃAÆ AÇAÅA O CÃAÆ AÇAÅG ÀÆÿÿOAƒCv CÃC (,ìÆÿÿBAƒC VC Q AÃA ,XÇÿÿXAƒC VC R AÃA eAÈ@Çÿÿ'CQ A 4¤TÇÿÿqA†A ƒC R  AÃAÆG N AÃAÆzR| ˆ`Êÿÿ
base_address: 0x00407000
process_identifier: 984
process_handle: 0x0000008c
1 1 0

WriteProcessMemory

buffer:
base_address: 0x00408000
process_identifier: 984
process_handle: 0x0000008c
0 0

WriteProcessMemory

buffer:  ä𒰐P›’‘h›t’‘𛀒œ‘ œ“°‘$œ“À‘xœ$“h“v“†“˜“¤“¸“Гè“ö“””$”2”D”^”n”„”˜”ª”¼”ؔ𔕕,•>•N•X•d•t•„•”•¢•´•¾•ȕԕà•è•ô•þ•–––&–0–8–B–L–X–b–l–x–‚–Œ––– –ª–¶––Ԗè–ö– — —<—T—˜—¨—¸—ð—X˜Œ˜Ð˜™T™™Ì™ šLšˆšÀšh“v“†“˜“¤“¸“Гè“ö“””$”2”D”^”n”„”˜”ª”¼”ؔ𔕕,•>•N•X•d•t•„•”•¢•´•¾•ȕԕà•è•ô•þ•–––&–0–8–B–L–X–b–l–x–‚–Œ––– –ª–¶––Ԗè–ö– — —<—T—˜—¨—¸—ð—X˜Œ˜Ð˜™T™™Ì™ šLšˆšÀšƒRegCloseKey¯RegOpenKeyExAËRegSetValueExAqCopyFileA|CreateDirectoryAÐDeleteCriticalSectioníEnterCriticalSectionExitProcess-FindClose1FindFirstFileABFindNextFileAaFreeLibrary…GetCommandLineAÚGetEnvironmentVariableAÿGetLastErrorGetModuleFileNameAGetModuleHandleABGetProcAddress_GetStartupInfoAßInitializeCriticalSection/LeaveCriticalSection2LoadLibraryAlSetUnhandledExceptionFilterTlsGetValueµVirtualProtect·VirtualQueryQ_strdupS_stricollY__getmainargsx__mb_cur_max„__p__environ†__p__fmodeš__set_app_type×_cexit_errno@_fpresetZ_fullpath_iob¢_isctype­_onexit¶_pctypeí_setmode7abort?atexitFcallocgfreerfwriteŸmalloc¦mbstowcs«memcpyÀreallocÇsetlocaleÉsignalÖstrcoll×strcpyÝstrlenùtolowervfprintf)wcstombsCallNextHookExàGetAsyncKeyState³MessageBoxACSetWindowsHookExA_Unwind_Resume%__deregister_frame_infok__register_frame_infoá_ZNKSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEE5c_strEvå_ZNSaIcEC1Evè_ZNSaIcED1Ev¢_ZNSt14basic_ofstreamIcSt11char_traitsIcEE5closeEv¦_ZNSt14basic_ofstreamIcSt11char_traitsIcEEC1ERKNSt7__cxx1112basic_stringIcS1_SaIcEEESt13_Ios_Openmode¯_ZNSt14basic_ofstreamIcSt11char_traitsIcEED1Evö _ZNSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEE6appendEPKc6 _ZNSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEEC1EPKcRKS3_9 _ZNSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEEC1ERKS4_@ _ZNSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEEC1EvT _ZNSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEED1EvW _ZNSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEEaSEPKc\ _ZNSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEEpLEPKcø_ZStlsISt11char_traitsIcEERSt13basic_ostreamIcT_ES5_PKcû_ZStlsISt11char_traitsIcEERSt13basic_ostreamIcT_ES5_cZ__gxx_personality_v0ADVAPI32.DLLKERNEL32.dll((msvcrt.dll<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<msvcrt.dllPPPPUSER32.dlldddlibgcc_s_dw2-1.dllxxxxxxxxxxxxxxxxlibstdc++-6.dll
base_address: 0x00409000
process_identifier: 984
process_handle: 0x0000008c
1 1 0

WriteProcessMemory

buffer: P"@"@
base_address: 0x0040a000
process_identifier: 984
process_handle: 0x0000008c
1 1 0

WriteProcessMemory

buffer: °@°@X@ @
base_address: 0x0040b000
process_identifier: 984
process_handle: 0x0000008c
1 1 0

WriteProcessMemory

buffer: ˆ(@*&
base_address: 0x0040c000
process_identifier: 984
process_handle: 0x0000008c
1 1 0

WriteProcessMemory

buffer:
base_address: 0x0040d000
process_identifier: 984
process_handle: 0x0000008c
1 1 0

WriteProcessMemory

buffer: %% $ > &I : ; 9  : ; 9 I8  I: ; 9 II ! 4: ; 9 I?< 4: ;9 I?< !I/ 'II&> I: ; 9 (  : ; 9  : ;9 I8  : ;9 I8> I: ;9 <'4G: ;9 
base_address: 0x0040f000
process_identifier: 984
process_handle: 0x0000008c
1 1 0

WriteProcessMemory

buffer: mIû ../../../src/gcc-8.2.0/libgcc/config/i386cygwin.Sˆ(@Ž""YK0g=YY0/>""SMû /home/keith/mingw32-gcc-8.2.0/include../../../src/gcc-8.2.0/libgcc/../include../.././gcc../../../src/gcc-8.2.0/libgcc/../gcc/config/i386../../../src/gcc-8.2.0/libgccstdio.hstdlib.hgetopt.htime.hhashtab.hinsn-constants.hi386.hi386-opts.hlibgcc2.hgbl-ctors.hlibgcc2.c
base_address: 0x00410000
process_identifier: 984
process_handle: 0x0000008c
1 1 0

WriteProcessMemory

buffer: ÿÿÿÿ| ˆ ˆ(@*AA €fÀAÁ
base_address: 0x00411000
process_identifier: 984
process_handle: 0x0000008c
1 1 0

WriteProcessMemory

buffer: ../../../src/gcc-8.2.0/libgcc/config/i386/cygwin.S/home/keith/src/mingw/gcc-build/gcc-8.2.0-mingw32-cross-native-sandbox/mingw32/libgccGNU AS 2.31.1
base_address: 0x00412000
process_identifier: 984
process_handle: 0x0000008c
1 1 0

NtSetContextThread

registers.eip: 1995637172
registers.esp: 2686960
registers.edi: 0
registers.eax: 4199120
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
thread_handle: 0x00000088
process_identifier: 984
1 0 0

NtResumeThread

thread_handle: 0x00000088
suspend_count: 1
process_identifier: 984
1 0 0

CreateProcessInternalW

thread_identifier: 1772
thread_handle: 0x0000008c
process_identifier: 3020
current_directory:
filepath:
track: 1
command_line: C:\Users\Administrator\AppData\Local\Temp\c4cd302acef1cc16abc10c84e86abbbab2c9133db00b20aa589d13c1af8db088.exe delete
filepath_r:
stack_pivoted: 0
creation_flags: 0 ()
inherit_handles: 0
process_handle: 0x000000c8
1 1 0
File has been identified by 11 AntiVirus engine on IRMA as malicious (11 events)
G Data Antivirus (Windows) Virus: Gen:Trojan.ProcessHijack.fKW@a0CCV2h (Engine A)
Avast Core Security (Linux) Win32:Evo-gen [Trj]
C4S ClamAV (Linux) Win.Trojan.Processhijack-10056424-0
WithSecure (Linux) Trojan.TR/Hijacker.Gen
eScan Antivirus (Linux) Gen:Trojan.ProcessHijack.fKW@a0CCV2h(DB)
ESET Security (Windows) a variant of Win32/Injector.EJEN trojan
Sophos Anti-Virus (Linux) Troj/Inject-KAK
DrWeb Antivirus (Linux) Trojan.Inject5.53255
Bitdefender Antivirus (Linux) Gen:Trojan.ProcessHijack.fKW@a0CCV2h
Kaspersky Standard (Windows) HEUR:Trojan.Win32.Inject.gen
Emsisoft Commandline Scanner (Windows) Gen:Trojan.ProcessHijack.fKW@a0CCV2h (B)
File has been identified by 56 AntiVirus engines on VirusTotal as malicious (50 out of 56 events)
Bkav W32.AIDetectMalware
Cynet Malicious (score: 99)
CAT-QuickHeal Trojan.ProcHijack.S36275531
Skyhigh BehavesLike.Win32.Generic.mh
ALYac Gen:Trojan.ProcessHijack.fKW@a0CCV2h
Cylance Unsafe
VIPRE Gen:Trojan.ProcessHijack.fKW@a0CCV2h
Sangfor Trojan.Win32.Save.a
CrowdStrike win/malicious_confidence_100% (D)
BitDefender Gen:Trojan.ProcessHijack.fKW@a0CCV2h
K7GW Trojan ( 005c8a4a1 )
K7AntiVirus Trojan ( 0055c6551 )
Arcabit Trojan.ProcessHijack.ED79FE
VirIT Trojan.Win32.AgentT.DHP
Symantec Trojan.Evoject!gen
Elastic malicious (high confidence)
ESET-NOD32 a variant of Win32/Injector.EJEN
APEX Malicious
Avast Win32:Evo-gen [Trj]
ClamAV Win.Trojan.Processhijack-10056424-0
Kaspersky HEUR:Trojan.Win32.Inject.gen
NANO-Antivirus Trojan.Win32.Inject3.gswtve
SUPERAntiSpyware Trojan.Agent/Gen-Injector
MicroWorld-eScan Gen:Trojan.ProcessHijack.fKW@a0CCV2h
Rising Worm.Generic!8.402 (TFE:5:ORJAjJ8xtJM)
Emsisoft Gen:Trojan.ProcessHijack.fKW@a0CCV2h (B)
F-Secure Trojan.TR/Hijacker.Gen
DrWeb Trojan.Inject5.53255
Zillya Trojan.Injector.Win32.676753
McAfeeD ti!C4CD302ACEF1
CTX exe.trojan.a0ccv2h
Sophos Troj/Inject-KAK
SentinelOne Static AI - Malicious PE
Jiangmin Worm.Generic.albs
Webroot W32.Malware.gen
Google Detected
Avira TR/Hijacker.Gen
Antiy-AVL Trojan/Win32.Wacatac
Kingsoft malware.kb.a.999
Gridinsoft Ransom.Win32.Zbot.oa!s1
Microsoft Trojan:Win32/ProcessHijack.GTM!MTB
ZoneAlarm Troj/Inject-KAK
GData Gen:Trojan.ProcessHijack.fKW@a0CCV2h
Varist W32/Trojan.ELRM-9316
AhnLab-V3 Trojan/Win32.Injector.C3865649
VBA32 Trojan.Inject
DeepInstinct MALICIOUS
Malwarebytes Malware.AI.4209882117
Ikarus Trojan.Win32.Injector
Panda Trj/Genetic.gen
Screenshots
Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action VT Location
No hosts contacted.
Cuckoo

We're processing your submission... This could take a few seconds.