| Size | 116.0KB |
|---|---|
| Type | PE32 executable (console) Intel 80386, for MS Windows |
| MD5 | 235f16084a81b228fae2e917bb3288af |
| SHA1 | a750fd9ea6b3949e23931949614b1f5f357377fb |
| SHA256 | 59b0a83d7b4f07c0e6e1482f49fa1b1a7d9a33935af88348ea28ef81c8cec73b |
| SHA512 |
17f8ac3aac02ceff175b8d4699566ee69c22ba4df78e26a904fc8b8aa48f7f818de1fe30a86e56b36393fbd3bae6e4d8c2eabad88a996c9fa1c5d2e7856e0ca6
|
| CRC32 | E26D1FFF |
| ssdeep | None |
| Yara |
|
This file is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
| Category | Started | Completed | Duration | Routing | Logs |
|---|---|---|---|---|---|
| FILE | Feb. 16, 2026, 12:54 a.m. | Feb. 16, 2026, 12:56 a.m. | 150 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2026-02-15 23:54:18,015 [analyzer] DEBUG: Starting analyzer from: C:\tmpblqbwr 2026-02-15 23:54:18,030 [analyzer] DEBUG: Pipe server name: \??\PIPE\VMsnxerDecGPdMdZiFJgJZxOVoX 2026-02-15 23:54:18,030 [analyzer] DEBUG: Log pipe server name: \??\PIPE\zSfcyGuTYBgLAqWEWyIeHcdJVU 2026-02-15 23:54:18,265 [analyzer] DEBUG: Started auxiliary module Curtain 2026-02-15 23:54:18,265 [analyzer] DEBUG: Started auxiliary module DbgView 2026-02-15 23:54:18,717 [analyzer] DEBUG: Started auxiliary module Disguise 2026-02-15 23:54:18,921 [analyzer] DEBUG: Loaded monitor into process with pid 504 2026-02-15 23:54:18,921 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2026-02-15 23:54:18,921 [analyzer] DEBUG: Started auxiliary module Human 2026-02-15 23:54:18,921 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2026-02-15 23:54:18,921 [analyzer] DEBUG: Started auxiliary module Reboot 2026-02-15 23:54:19,030 [analyzer] DEBUG: Started auxiliary module RecentFiles 2026-02-15 23:54:19,030 [analyzer] DEBUG: Started auxiliary module Screenshots 2026-02-15 23:54:19,030 [analyzer] DEBUG: Started auxiliary module Sysmon 2026-02-15 23:54:19,030 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2026-02-15 23:54:19,171 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\59b0a83d7b4f07c0e6e1482f49fa1b1a7d9a33935af88348ea28ef81c8cec73b.exe' with arguments '' and pid 1124 2026-02-15 23:54:19,405 [analyzer] DEBUG: Loaded monitor into process with pid 1124 2026-02-15 23:54:19,530 [analyzer] INFO: Injected into process with pid 2684 and name u'reg.exe' 2026-02-15 23:54:19,703 [analyzer] DEBUG: Loaded monitor into process with pid 2684 2026-02-15 23:54:19,812 [lib.api.process] ERROR: Failed to dump memory of 32-bit process with pid 2684. 2026-02-15 23:56:37,770 [analyzer] INFO: Analysis timeout hit, terminating analysis. 2026-02-15 23:56:37,973 [lib.api.process] ERROR: Failed to dump memory of 32-bit process with pid 1124. 2026-02-15 23:56:37,973 [lib.api.process] WARNING: The process with pid 2684 is not alive, memory dump aborted 2026-02-15 23:56:38,286 [analyzer] INFO: Terminating remaining processes before shutdown. 2026-02-15 23:56:38,286 [lib.api.process] INFO: Successfully terminated process with pid 1124. 2026-02-15 23:56:38,286 [analyzer] INFO: Analysis completed.
2026-02-16 00:54:19,151 [cuckoo.core.scheduler] INFO: Task #7456221: acquired machine win7x6418 (label=win7x6418) 2026-02-16 00:54:19,151 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.218 for task #7456221 2026-02-16 00:54:19,591 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 3053572 (interface=vboxnet0, host=192.168.168.218) 2026-02-16 00:54:19,768 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x6418 2026-02-16 00:54:20,506 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x6418 to vmcloak 2026-02-16 00:54:30,286 [cuckoo.core.guest] INFO: Starting analysis #7456221 on guest (id=win7x6418, ip=192.168.168.218) 2026-02-16 00:54:31,294 [cuckoo.core.guest] DEBUG: win7x6418: not ready yet 2026-02-16 00:54:36,321 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x6418, ip=192.168.168.218) 2026-02-16 00:54:36,404 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x6418, ip=192.168.168.218, monitor=latest, size=6660546) 2026-02-16 00:54:37,585 [cuckoo.core.resultserver] DEBUG: Task #7456221: live log analysis.log initialized. 2026-02-16 00:54:38,456 [cuckoo.core.resultserver] DEBUG: Task #7456221 is sending a BSON stream 2026-02-16 00:54:38,923 [cuckoo.core.resultserver] DEBUG: Task #7456221 is sending a BSON stream 2026-02-16 00:54:39,221 [cuckoo.core.resultserver] DEBUG: Task #7456221 is sending a BSON stream 2026-02-16 00:54:39,748 [cuckoo.core.resultserver] DEBUG: Task #7456221: File upload for 'shots/0001.jpg' 2026-02-16 00:54:39,768 [cuckoo.core.resultserver] DEBUG: Task #7456221 uploaded file length: 119270 2026-02-16 00:54:52,282 [cuckoo.core.guest] DEBUG: win7x6418: analysis #7456221 still processing 2026-02-16 00:55:07,379 [cuckoo.core.guest] DEBUG: win7x6418: analysis #7456221 still processing 2026-02-16 00:55:22,471 [cuckoo.core.guest] DEBUG: win7x6418: analysis #7456221 still processing 2026-02-16 00:55:37,561 [cuckoo.core.guest] DEBUG: win7x6418: analysis #7456221 still processing 2026-02-16 00:55:52,652 [cuckoo.core.guest] DEBUG: win7x6418: analysis #7456221 still processing 2026-02-16 00:56:07,755 [cuckoo.core.guest] DEBUG: win7x6418: analysis #7456221 still processing 2026-02-16 00:56:22,852 [cuckoo.core.guest] DEBUG: win7x6418: analysis #7456221 still processing 2026-02-16 00:56:37,974 [cuckoo.core.guest] DEBUG: win7x6418: analysis #7456221 still processing 2026-02-16 00:56:38,153 [cuckoo.core.resultserver] DEBUG: Task #7456221: File upload for 'curtain/1771196198.15.curtain.log' 2026-02-16 00:56:38,157 [cuckoo.core.resultserver] DEBUG: Task #7456221 uploaded file length: 36 2026-02-16 00:56:38,290 [cuckoo.core.resultserver] DEBUG: Task #7456221: File upload for 'sysmon/1771196198.29.sysmon.xml' 2026-02-16 00:56:38,300 [cuckoo.core.resultserver] DEBUG: Task #7456221 uploaded file length: 980304 2026-02-16 00:56:38,406 [cuckoo.core.resultserver] DEBUG: Task #7456221 had connection reset for <Context for LOG> 2026-02-16 00:56:40,988 [cuckoo.core.guest] INFO: win7x6418: analysis completed successfully 2026-02-16 00:56:41,000 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2026-02-16 00:56:41,026 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2026-02-16 00:56:42,051 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x6418 to path /srv/cuckoo/cwd/storage/analyses/7456221/memory.dmp 2026-02-16 00:56:42,053 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x6418 2026-02-16 00:56:49,611 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.218 for task #7456221 2026-02-16 00:56:49,955 [cuckoo.core.scheduler] DEBUG: Released database task #7456221 2026-02-16 00:56:49,971 [cuckoo.core.scheduler] INFO: Task #7456221: analysis procedure completed
| description | Take screenshot | rule | screenshot | ||||||
| description | Run a keylogger | rule | keylogger | ||||||
| description | Affect private profile | rule | win_files_operation | ||||||
| description | Affect hook table | rule | win_hook | ||||||
| packer | Armadillo v1.71 |
| name | RT_VERSION | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00020058 | size | 0x00000240 | ||||||||||||||||||
| cmdline | C:\Windows\System32\reg.exe import C:\Users\Public\administratorsss$2.reg |
| cmdline | C:\Windows\System32\reg.exe import C:\Users\Public\administratorsss$.reg |
| ESET Security (Windows) | Win32/AddUser.CD trojan |
| Sophos Anti-Virus (Linux) | Mal/Generic-S |
| Kaspersky Standard (Windows) | Trojan.Win32.Agent.ilbl |
| Lionic | Trojan.Win32.Agent.Y!c |
| Cynet | Malicious (score: 99) |
| CAT-QuickHeal | Trojan.Ghanarava.16261643043288af |
| Skyhigh | BehavesLike.Win32.Generic.cm |
| McAfee | Artemis!235F16084A81 |
| Cylance | Unsafe |
| Sangfor | Trojan.Win32.Agent.ilbl |
| CrowdStrike | win/malicious_confidence_100% (W) |
| K7GW | Riskware ( 0040eff71 ) |
| K7AntiVirus | Riskware ( 0040eff71 ) |
| Symantec | Trojan.Gen.MBT |
| Elastic | malicious (high confidence) |
| ESET-NOD32 | Win32/AddUser.CD |
| Avast | Win32:Malware-gen |
| Kaspersky | Trojan.Win32.Agent.ilbl |
| Alibaba | Trojan:Win32/Generic.73d06a9c |
| NANO-Antivirus | Trojan.Win32.Graftor.ixpgnn |
| Rising | Trojan.Agent!8.B1E (CLOUD) |
| Emsisoft | Application.Generic (A) |
| F-Secure | Heuristic.HEUR/AGEN.1344124 |
| Zillya | Trojan.Agent.Win32.2327172 |
| McAfeeD | ti!59B0A83D7B4F |
| Trapmine | suspicious.low.ml.score |
| Sophos | Generic Reputation PUA (PUA) |
| Detected | |
| Avira | HEUR/AGEN.1344124 |
| Antiy-AVL | Trojan/Win32.Agent |
| Gridinsoft | Trojan.Win32.Agent.oa!s1 |
| Xcitium | Malware@#1dugr01jpw61d |
| Microsoft | Program:Win32/Wacapew.C!ml |
| AhnLab-V3 | Malware/Win.Generic.C4546359 |
| VBA32 | Trojan.Agent |
| DeepInstinct | MALICIOUS |
| Malwarebytes | PUP.Optional.ChinAd |
| Ikarus | Backdoor.Win32.Hupigon |
| Panda | Trj/GdSda.A |
| Tencent | Malware.Win32.Gencirc.13e9a410 |
| huorong | Trojan/Generic!9C57EE0C6C17CE8D |
| Fortinet | Riskware/Application |
| AVG | Win32:Malware-gen |
| Paloalto | generic.ml |