| Size | 43.8MB |
|---|---|
| Type | PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, Nullsoft Installer self-extracting archive |
| MD5 | f711b3aee7c805d52ab28fe53440e35f |
| SHA1 | ee04a6c1317bba9c60369a586379ff245abb286c |
| SHA256 | 20ad191348684b470ddc4e05204316f3d8e39655f412b3e392a0eef97639daaf |
| SHA512 |
fe7aa76985fe90e13a47ddd255bcaafa2bfbc6ece4b998a8031a8e0b6042e3d904b9db03f669cd9580914f050b558bc6541fcaaf1be176993eb847cf739c6f45
|
| CRC32 | 259EFF2F |
| ssdeep | None |
| Yara |
|
This file shows some signs of potential malicious behavior.
The score of this file is 1.4 out of 10.
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
| Category | Started | Completed | Duration | Routing | Logs |
|---|---|---|---|---|---|
| FILE | Jan. 30, 2026, 12:31 p.m. | Jan. 30, 2026, 12:32 p.m. | 90 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2026-01-30 11:31:18,015 [analyzer] DEBUG: Starting analyzer from: C:\tmpt1gcja 2026-01-30 11:31:18,030 [analyzer] DEBUG: Pipe server name: \??\PIPE\WQPUkBBUhFggKfMLieKGeFvocc 2026-01-30 11:31:18,030 [analyzer] DEBUG: Log pipe server name: \??\PIPE\rXMXEVcHIWxxsYhZEXZbCKeaFSKy 2026-01-30 11:31:18,280 [analyzer] DEBUG: Started auxiliary module Curtain 2026-01-30 11:31:18,280 [analyzer] DEBUG: Started auxiliary module DbgView 2026-01-30 11:31:18,733 [analyzer] DEBUG: Started auxiliary module Disguise 2026-01-30 11:31:18,905 [analyzer] DEBUG: Loaded monitor into process with pid 508 2026-01-30 11:31:18,905 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2026-01-30 11:31:18,905 [analyzer] DEBUG: Started auxiliary module Human 2026-01-30 11:31:18,905 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2026-01-30 11:31:18,905 [analyzer] DEBUG: Started auxiliary module Reboot 2026-01-30 11:31:19,030 [analyzer] DEBUG: Started auxiliary module RecentFiles 2026-01-30 11:31:19,030 [analyzer] DEBUG: Started auxiliary module Screenshots 2026-01-30 11:31:19,030 [analyzer] DEBUG: Started auxiliary module Sysmon 2026-01-30 11:31:19,030 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2026-01-30 11:31:19,608 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\vlc-3.0.23-win64.exe' with arguments '' and pid 1140 2026-01-30 11:31:19,780 [analyzer] DEBUG: Loaded monitor into process with pid 1140 2026-01-30 11:31:20,921 [analyzer] INFO: Added new file to list with pid 1140 and path C:\Users\Administrator\AppData\Local\Temp\nsdB58C.tmp 2026-01-30 11:31:21,030 [analyzer] INFO: Added new file to list with pid 1140 and path C:\Users\Administrator\AppData\Local\Temp\nstB5EB.tmp\System.dll 2026-01-30 11:31:21,046 [analyzer] INFO: Added new file to list with pid 1140 and path C:\Users\Administrator\AppData\Local\Temp\nstB5EB.tmp\LangDLL.dll 2026-01-30 11:32:35,857 [analyzer] INFO: Analysis timeout hit, terminating analysis. 2026-01-30 11:32:36,091 [lib.api.process] ERROR: Failed to dump memory of 32-bit process with pid 1140. 2026-01-30 11:32:36,404 [analyzer] INFO: Terminating remaining processes before shutdown. 2026-01-30 11:32:36,404 [lib.api.process] INFO: Successfully terminated process with pid 1140. 2026-01-30 11:32:36,404 [analyzer] INFO: Error dumping file from path "c:\users\administrator\appdata\local\temp\nsdb58c.tmp": [Errno 13] Permission denied: u'c:\\users\\administrator\\appdata\\local\\temp\\nsdb58c.tmp' 2026-01-30 11:32:36,418 [analyzer] INFO: Analysis completed.
2026-01-30 12:31:19,797 [cuckoo.core.scheduler] INFO: Task #7348999: acquired machine win7x642 (label=win7x642) 2026-01-30 12:31:19,798 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.202 for task #7348999 2026-01-30 12:31:20,390 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 4054878 (interface=vboxnet0, host=192.168.168.202) 2026-01-30 12:31:36,390 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x642 2026-01-30 12:31:37,748 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x642 to vmcloak 2026-01-30 12:31:55,675 [cuckoo.core.guest] INFO: Starting analysis #7348999 on guest (id=win7x642, ip=192.168.168.202) 2026-01-30 12:31:56,680 [cuckoo.core.guest] DEBUG: win7x642: not ready yet 2026-01-30 12:32:01,705 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x642, ip=192.168.168.202) 2026-01-30 12:32:01,781 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x642, ip=192.168.168.202, monitor=latest, size=6660546) 2026-01-30 12:32:05,218 [cuckoo.core.resultserver] DEBUG: Task #7348999: live log analysis.log initialized. 2026-01-30 12:32:06,088 [cuckoo.core.resultserver] DEBUG: Task #7348999 is sending a BSON stream 2026-01-30 12:32:06,948 [cuckoo.core.resultserver] DEBUG: Task #7348999 is sending a BSON stream 2026-01-30 12:32:07,391 [cuckoo.core.resultserver] DEBUG: Task #7348999: File upload for 'shots/0001.jpg' 2026-01-30 12:32:07,442 [cuckoo.core.resultserver] DEBUG: Task #7348999 uploaded file length: 133610 2026-01-30 12:32:07,803 [cuckoo.core.resultserver] DEBUG: Task #7348999: File upload for 'files/e3b0c44298fc1c14_nssB414.tmp' 2026-01-30 12:32:07,806 [cuckoo.core.resultserver] DEBUG: Task #7348999 uploaded file length: 0 2026-01-30 12:32:08,520 [cuckoo.core.resultserver] DEBUG: Task #7348999: File upload for 'shots/0002.jpg' 2026-01-30 12:32:08,533 [cuckoo.core.resultserver] DEBUG: Task #7348999 uploaded file length: 136324 2026-01-30 12:32:19,891 [cuckoo.core.guest] DEBUG: win7x642: analysis #7348999 still processing 2026-01-30 12:32:34,978 [cuckoo.core.guest] DEBUG: win7x642: analysis #7348999 still processing 2026-01-30 12:32:36,296 [cuckoo.core.resultserver] DEBUG: Task #7348999: File upload for 'curtain/1769769156.29.curtain.log' 2026-01-30 12:32:36,300 [cuckoo.core.resultserver] DEBUG: Task #7348999 uploaded file length: 36 2026-01-30 12:32:36,403 [cuckoo.core.resultserver] DEBUG: Task #7348999: File upload for 'sysmon/1769769156.4.sysmon.xml' 2026-01-30 12:32:36,407 [cuckoo.core.resultserver] DEBUG: Task #7348999 uploaded file length: 99076 2026-01-30 12:32:36,417 [cuckoo.core.resultserver] DEBUG: Task #7348999: File upload for 'files/2e08e077a0800ec3_langdll.dll' 2026-01-30 12:32:36,419 [cuckoo.core.resultserver] DEBUG: Task #7348999 uploaded file length: 8704 2026-01-30 12:32:36,423 [cuckoo.core.resultserver] DEBUG: Task #7348999: File upload for 'files/b89448b9fd7be5ef_system.dll' 2026-01-30 12:32:36,425 [cuckoo.core.resultserver] DEBUG: Task #7348999 uploaded file length: 29184 2026-01-30 12:32:36,448 [cuckoo.core.resultserver] DEBUG: Task #7348999 had connection reset for <Context for LOG> 2026-01-30 12:32:37,999 [cuckoo.core.guest] INFO: win7x642: analysis completed successfully 2026-01-30 12:32:38,022 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2026-01-30 12:32:38,054 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2026-01-30 12:32:39,620 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x642 to path /srv/cuckoo/cwd/storage/analyses/7348999/memory.dmp 2026-01-30 12:32:39,621 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x642 2026-01-30 12:32:48,306 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.202 for task #7348999 2026-01-30 12:32:49,037 [cuckoo.core.scheduler] DEBUG: Released database task #7348999 2026-01-30 12:32:49,055 [cuckoo.core.scheduler] INFO: Task #7348999: analysis procedure completed
| description | Escalade priviledges | rule | escalate_priv | ||||||
| description | Take screenshot | rule | screenshot | ||||||
| description | Affect system registries | rule | win_registry | ||||||
| description | Affect system token | rule | win_token | ||||||
| description | Affect private profile | rule | win_files_operation | ||||||
| section | .ndata |
| file | C:\Users\Administrator\AppData\Local\Temp\nstB5EB.tmp\LangDLL.dll |
| file | C:\Users\Administrator\AppData\Local\Temp\nstB5EB.tmp\System.dll |
| section | {u'size_of_data': u'0x0000c800', u'virtual_address': u'0x0000c000', u'entropy': 7.290208754778322, u'name': u'.rdata', u'virtual_size': u'0x0000c708'} | entropy | 7.29020875478 | description | A section with a high entropy has been found | |||||||||
| entropy | 0.271002710027 | description | Overall entropy of this PE file is high | |||||||||||