Size | 947.0KB |
---|---|
Type | PE32 executable (GUI) Intel 80386, for MS Windows |
MD5 | 10cc055f5645743f6693a94c2e4babf6 |
SHA1 | b7d92c1e4253d8a542cfab9a6e5b179e7d6607a9 |
SHA256 | 4fdfeffeb7b2a4e841db1d380cd0ef1d6d2062b3407f851cec76daaefd417b7d |
SHA512 |
aabea341986bb23ea2a5da0660968daf73d22eedb576e283544973600cd22252ff449c97b29cd9787eeb409e89d9bf84ed69487e766abe8a1c303d60bcabb99a
|
CRC32 | 1B42045E |
ssdeep | None |
Yara |
|
This file is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | Dec. 14, 2024, 5:07 p.m. | Dec. 14, 2024, 5:12 p.m. | 314 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2024-12-11 11:41:55,015 [analyzer] DEBUG: Starting analyzer from: C:\tmptpreht 2024-12-11 11:41:55,015 [analyzer] DEBUG: Pipe server name: \??\PIPE\pAQFReKtvxOBDpMhDbebJyK 2024-12-11 11:41:55,015 [analyzer] DEBUG: Log pipe server name: \??\PIPE\PoGSwxIAIKSERuHZustLWBMkLewrOoc 2024-12-11 11:41:55,280 [analyzer] DEBUG: Started auxiliary module Curtain 2024-12-11 11:41:55,296 [analyzer] DEBUG: Started auxiliary module DbgView 2024-12-11 11:41:55,967 [analyzer] DEBUG: Started auxiliary module Disguise 2024-12-11 11:41:56,171 [analyzer] DEBUG: Loaded monitor into process with pid 500 2024-12-11 11:41:56,171 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2024-12-11 11:41:56,171 [analyzer] DEBUG: Started auxiliary module Human 2024-12-11 11:41:56,171 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2024-12-11 11:41:56,171 [analyzer] DEBUG: Started auxiliary module Reboot 2024-12-11 11:41:56,280 [analyzer] DEBUG: Started auxiliary module RecentFiles 2024-12-11 11:41:56,280 [analyzer] DEBUG: Started auxiliary module Screenshots 2024-12-11 11:41:56,280 [analyzer] DEBUG: Started auxiliary module Sysmon 2024-12-11 11:41:56,296 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2024-12-11 11:41:56,453 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\random.exe' with arguments '' and pid 216 2024-12-11 11:41:56,703 [analyzer] DEBUG: Loaded monitor into process with pid 216 2024-12-11 11:41:57,858 [analyzer] INFO: Injected into process with pid 716 and name u'taskkill.exe' 2024-12-11 11:41:58,092 [analyzer] DEBUG: Loaded monitor into process with pid 716 2024-12-11 11:41:58,453 [analyzer] INFO: Process with pid 716 has terminated 2024-12-11 11:42:25,453 [analyzer] INFO: Analysis timeout hit, terminating analysis. 2024-12-11 11:42:25,875 [analyzer] INFO: Terminating remaining processes before shutdown. 2024-12-11 11:42:25,875 [lib.api.process] INFO: Successfully terminated process with pid 216. 2024-12-11 11:42:25,875 [analyzer] INFO: Analysis completed.
2024-12-14 17:07:42,389 [cuckoo.core.scheduler] INFO: Task #5654449: acquired machine win7x641 (label=win7x641) 2024-12-14 17:07:42,413 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.201 for task #5654449 2024-12-14 17:07:42,796 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 242715 (interface=vboxnet0, host=192.168.168.201) 2024-12-14 17:07:54,866 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x641 2024-12-14 17:07:55,499 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x641 to vmcloak 2024-12-14 17:10:09,930 [cuckoo.core.guest] INFO: Starting analysis #5654449 on guest (id=win7x641, ip=192.168.168.201) 2024-12-14 17:10:10,936 [cuckoo.core.guest] DEBUG: win7x641: not ready yet 2024-12-14 17:10:15,962 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x641, ip=192.168.168.201) 2024-12-14 17:10:16,036 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x641, ip=192.168.168.201, monitor=latest, size=6660546) 2024-12-14 17:10:17,260 [cuckoo.core.resultserver] DEBUG: Task #5654449: live log analysis.log initialized. 2024-12-14 17:10:18,454 [cuckoo.core.resultserver] DEBUG: Task #5654449 is sending a BSON stream 2024-12-14 17:10:18,883 [cuckoo.core.resultserver] DEBUG: Task #5654449 is sending a BSON stream 2024-12-14 17:10:19,671 [cuckoo.core.resultserver] DEBUG: Task #5654449: File upload for 'shots/0001.jpg' 2024-12-14 17:10:19,689 [cuckoo.core.resultserver] DEBUG: Task #5654449 uploaded file length: 133692 2024-12-14 17:10:20,268 [cuckoo.core.resultserver] DEBUG: Task #5654449 is sending a BSON stream 2024-12-14 17:10:32,022 [cuckoo.core.guest] DEBUG: win7x641: analysis #5654449 still processing 2024-12-14 17:10:47,198 [cuckoo.core.guest] DEBUG: win7x641: analysis #5654449 still processing 2024-12-14 17:10:47,917 [cuckoo.core.resultserver] DEBUG: Task #5654449: File upload for 'curtain/1733913745.64.curtain.log' 2024-12-14 17:10:47,920 [cuckoo.core.resultserver] DEBUG: Task #5654449 uploaded file length: 36 2024-12-14 17:10:48,124 [cuckoo.core.resultserver] DEBUG: Task #5654449: File upload for 'sysmon/1733913745.84.sysmon.xml' 2024-12-14 17:10:48,153 [cuckoo.core.resultserver] DEBUG: Task #5654449 uploaded file length: 1927840 2024-12-14 17:10:48,307 [cuckoo.core.resultserver] DEBUG: Task #5654449 had connection reset for <Context for LOG> 2024-12-14 17:10:50,211 [cuckoo.core.guest] INFO: win7x641: analysis completed successfully 2024-12-14 17:10:50,225 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2024-12-14 17:10:50,245 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2024-12-14 17:10:51,219 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x641 to path /srv/cuckoo/cwd/storage/analyses/5654449/memory.dmp 2024-12-14 17:10:51,221 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x641 2024-12-14 17:12:55,019 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.201 for task #5654449 2024-12-14 17:12:55,546 [cuckoo.core.scheduler] DEBUG: Released database task #5654449 2024-12-14 17:12:55,583 [cuckoo.core.scheduler] INFO: Task #5654449: analysis procedure completed
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Code injection with CreateRemoteThread in a remote process | rule | inject_thread | ||||||
description | Communications over HTTP | rule | network_http | ||||||
description | Escalade priviledges | rule | escalate_priv | ||||||
description | Take screenshot | rule | screenshot | ||||||
description | Run a keylogger | rule | keylogger | ||||||
description | Affect system registries | rule | win_registry | ||||||
description | Affect system token | rule | win_token | ||||||
description | Affect private profile | rule | win_files_operation |
file | C:\Program Files\Mozilla Firefox\firefox.exe |
wmi | SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process |
section | {u'size_of_data': u'0x00016200', u'virtual_address': u'0x000d4000', u'entropy': 7.1619807725972295, u'name': u'.rsrc', u'virtual_size': u'0x00016038'} | entropy | 7.1619807726 | description | A section with a high entropy has been found |
cmdline | taskkill /F /IM firefox.exe /T |
cmdline | taskkill /F /IM chrome.exe /T |
G Data Antivirus (Windows) | Virus: Application.Generic.3865003 (Engine A) |
Avast Core Security (Linux) | Win32:Malware-gen |
C4S ClamAV (Linux) | Sanesecurity.Malware.27686.AidExe.UNOFFICIAL |
F-Secure Antivirus (Linux) | Trojan.TR/ATRAPS.Gen [Aquarius] |
Windows Defender (Windows) | Trojan:Win32/Wacatac.H!ml |
eScan Antivirus (Linux) | Application.Generic.3865003(DB) |
DrWeb Antivirus (Linux) | Trojan.Siggen30.17808 |
ClamAV (Linux) | Sanesecurity.Malware.27686.AidExe.UNOFFICIAL |
Bitdefender Antivirus (Linux) | Application.Generic.3865003 |
Kaspersky Standard (Windows) | HEUR:Trojan.Script.Agent.gen |
Bkav | W32.AIDetectMalware |
Cynet | Malicious (score: 99) |
Skyhigh | BehavesLike.Win32.Formbook.dh |
Cylance | Unsafe |
Sangfor | Trojan.Win32.Agent.V8c5 |
Symantec | Trojan.Gen.MBT |
Elastic | malicious (moderate confidence) |
ESET-NOD32 | a variant of Win32/HackTool.Silentall.N potentially unsafe |
Avast | FileRepMalware [Misc] |
Kaspersky | HEUR:Trojan.Script.Agent.gen |
Rising | HackTool.Silentall/Autoit!1.106C3 (CLASSIC) |
F-Secure | Trojan.TR/ATRAPS.Gen |
DrWeb | Trojan.Siggen30.17808 |
McAfeeD | Real Protect-LS!10CC055F5645 |
Sophos | Generic Reputation PUA (PUA) |
FireEye | Generic.mg.10cc055f5645743f |
Detected | |
Avira | TR/ATRAPS.Gen |
Kingsoft | Script.Trojan.Agent.gen |
Microsoft | Trojan:Win32/AgentTesla!ml |
DeepInstinct | MALICIOUS |
Malwarebytes | Generic.Malware/Suspicious |
Ikarus | PUA.HackTool.Silentall |
Tencent | Script.Trojan.Agent.Oqil |
huorong | TrojanDownloader/AutoIT.Agent.d |
AVG | FileRepMalware [Misc] |
alibabacloud | Trojan:Win/Silentall.N |