| Size | 3.4MB |
|---|---|
| Type | PE32+ executable (GUI) x86-64, for MS Windows |
| MD5 | 55541d46fb1b3424e45720cb6db4ee0e |
| SHA1 | e35699e4f26cbe1ad0a976fa6cfcd3e5aacd4cf6 |
| SHA256 | a111b00f9d0faed6248c3cb573be1702a2b0bf47ed06ff77b07dc6daab4333f5 |
| SHA512 |
b1cd9d21b8daeaa467c76d6374292c129d441063b10f4406b3d389c517cd360f034d59c1d01b5bdd4ca18c81f8360d9f6f85ccd0119a39eb95508b86f2c92de2
|
| CRC32 | A88E6EB8 |
| ssdeep | None |
| Yara | None matched |
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
| Category | Started | Completed | Duration | Routing | Logs |
|---|---|---|---|---|---|
| FILE | Oct. 30, 2025, 7:43 p.m. | Oct. 30, 2025, 7:44 p.m. | 42 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-10-30 18:43:38,000 [analyzer] DEBUG: Starting analyzer from: C:\tmp564etj 2025-10-30 18:43:38,000 [analyzer] DEBUG: Pipe server name: \??\PIPE\MJIFisJRrQFFLmEkMhlIJZCshAsQAubS 2025-10-30 18:43:38,000 [analyzer] DEBUG: Log pipe server name: \??\PIPE\BqZYfiWnXTxtlRRKOTflsFBUPFmUboYb 2025-10-30 18:43:38,296 [analyzer] DEBUG: Started auxiliary module Curtain 2025-10-30 18:43:38,296 [analyzer] DEBUG: Started auxiliary module DbgView 2025-10-30 18:43:38,812 [analyzer] DEBUG: Started auxiliary module Disguise 2025-10-30 18:43:39,046 [analyzer] DEBUG: Loaded monitor into process with pid 508 2025-10-30 18:43:39,046 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-10-30 18:43:39,046 [analyzer] DEBUG: Started auxiliary module Human 2025-10-30 18:43:39,046 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-10-30 18:43:39,046 [analyzer] DEBUG: Started auxiliary module Reboot 2025-10-30 18:43:39,108 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-10-30 18:43:39,108 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-10-30 18:43:39,108 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-10-30 18:43:39,108 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-10-30 18:43:39,296 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\8GVk01wwWXHHto7BJ1pwBajM8YOnUuQf.exe' with arguments '' and pid 1564 2025-10-30 18:43:39,530 [analyzer] DEBUG: Loaded monitor into process with pid 1564 2025-10-30 18:43:40,312 [analyzer] INFO: Process with pid 1564 has terminated 2025-10-30 18:43:40,312 [analyzer] INFO: Process list is empty, terminating analysis. 2025-10-30 18:43:41,625 [analyzer] INFO: Terminating remaining processes before shutdown. 2025-10-30 18:43:41,625 [analyzer] INFO: Analysis completed.
2025-10-30 19:43:40,055 [cuckoo.core.scheduler] INFO: Task #7055425: acquired machine win7x6419 (label=win7x6419) 2025-10-30 19:43:40,058 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.219 for task #7055425 2025-10-30 19:43:40,391 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 2612134 (interface=vboxnet0, host=192.168.168.219) 2025-10-30 19:43:42,800 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x6419 2025-10-30 19:43:43,434 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x6419 to vmcloak 2025-10-30 19:43:59,836 [cuckoo.core.guest] INFO: Starting analysis #7055425 on guest (id=win7x6419, ip=192.168.168.219) 2025-10-30 19:44:00,842 [cuckoo.core.guest] DEBUG: win7x6419: not ready yet 2025-10-30 19:44:05,884 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x6419, ip=192.168.168.219) 2025-10-30 19:44:05,991 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x6419, ip=192.168.168.219, monitor=latest, size=6660546) 2025-10-30 19:44:07,350 [cuckoo.core.resultserver] DEBUG: Task #7055425: live log analysis.log initialized. 2025-10-30 19:44:08,345 [cuckoo.core.resultserver] DEBUG: Task #7055425 is sending a BSON stream 2025-10-30 19:44:08,747 [cuckoo.core.resultserver] DEBUG: Task #7055425 is sending a BSON stream 2025-10-30 19:44:09,606 [cuckoo.core.resultserver] DEBUG: Task #7055425: File upload for 'shots/0001.jpg' 2025-10-30 19:44:09,623 [cuckoo.core.resultserver] DEBUG: Task #7055425 uploaded file length: 133613 2025-10-30 19:44:10,861 [cuckoo.core.resultserver] DEBUG: Task #7055425: File upload for 'curtain/1761846221.5.curtain.log' 2025-10-30 19:44:10,865 [cuckoo.core.resultserver] DEBUG: Task #7055425 uploaded file length: 36 2025-10-30 19:44:10,990 [cuckoo.core.resultserver] DEBUG: Task #7055425: File upload for 'sysmon/1761846221.62.sysmon.xml' 2025-10-30 19:44:10,995 [cuckoo.core.resultserver] DEBUG: Task #7055425 uploaded file length: 96958 2025-10-30 19:44:11,709 [cuckoo.core.resultserver] DEBUG: Task #7055425 had connection reset for <Context for LOG> 2025-10-30 19:44:12,898 [cuckoo.core.guest] INFO: win7x6419: analysis completed successfully 2025-10-30 19:44:12,912 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-10-30 19:44:12,931 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-10-30 19:44:13,912 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x6419 to path /srv/cuckoo/cwd/storage/analyses/7055425/memory.dmp 2025-10-30 19:44:13,914 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x6419 2025-10-30 19:44:21,507 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.219 for task #7055425 2025-10-30 19:44:21,816 [cuckoo.core.scheduler] DEBUG: Released database task #7055425 2025-10-30 19:44:21,833 [cuckoo.core.scheduler] INFO: Task #7055425: analysis procedure completed
| section | .TKe |
| section | .symtab |
| section | .SeF |
| section | .*va |
| section | .K.= |
| section | {u'size_of_data': u'0x00361400', u'virtual_address': u'0x00728000', u'entropy': 7.942285488731751, u'name': u'.K.=', u'virtual_size': u'0x00361334'} | entropy | 7.94228548873 | description | A section with a high entropy has been found | |||||||||
| entropy | 0.999566787004 | description | Overall entropy of this PE file is high | |||||||||||
| ESET Security (Windows) | a variant of Win32/Packed.VMProtect.ACI trojan |