File 7909ced70e1df1e57d9395c993525cd7c51177bd4c4375ea4af42a64b18e174c

Size 64.0KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 39d244873d52a06b51697ec7d073c2a7
SHA1 e5bcfa521ed41536f42477d286ecafef5ea23a53
SHA256 7909ced70e1df1e57d9395c993525cd7c51177bd4c4375ea4af42a64b18e174c
SHA512
ae4b2fd0e48c482237f3957441e3361b6f6140c57a79520155a66a0d71d1b877d9a577a0dc98829050a84135d11f226d97948b70117a97ab9ab54b98bf76d46c
CRC32 D3952FF7
ssdeep None
Yara
  • SEH__vba - (no description)
  • win_registry - Affect system registries

Score

This file is very suspicious, with a score of 10 out of 10!

Please notice: The scoring system is currently still in development and should be considered an alpha feature.


Feedback

Expecting different results? Send us this analysis and we will inspect it. Click here

Information on Execution

Analysis
Category Started Completed Duration Routing Logs
FILE Jan. 30, 2025, 8:43 p.m. Jan. 30, 2025, 8:50 p.m. 386 seconds internet Show Analyzer Log
Show Cuckoo Log

Analyzer Log

2025-01-30 08:46:17,015 [analyzer] DEBUG: Starting analyzer from: C:\tmp2zg5xi
2025-01-30 08:46:17,015 [analyzer] DEBUG: Pipe server name: \??\PIPE\AFwXRaNUvNNxdxkpkYKwWD
2025-01-30 08:46:17,015 [analyzer] DEBUG: Log pipe server name: \??\PIPE\fcXvLIoHmJLXSGuLqMpxSETTBAHpXf
2025-01-30 08:46:17,328 [analyzer] DEBUG: Started auxiliary module Curtain
2025-01-30 08:46:17,328 [analyzer] DEBUG: Started auxiliary module DbgView
2025-01-30 08:46:17,905 [analyzer] DEBUG: Started auxiliary module Disguise
2025-01-30 08:46:18,108 [analyzer] DEBUG: Loaded monitor into process with pid 512
2025-01-30 08:46:18,108 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets
2025-01-30 08:46:18,108 [analyzer] DEBUG: Started auxiliary module Human
2025-01-30 08:46:18,108 [analyzer] DEBUG: Started auxiliary module InstallCertificate
2025-01-30 08:46:18,108 [analyzer] DEBUG: Started auxiliary module Reboot
2025-01-30 08:46:18,187 [analyzer] DEBUG: Started auxiliary module RecentFiles
2025-01-30 08:46:18,203 [analyzer] DEBUG: Started auxiliary module Screenshots
2025-01-30 08:46:18,203 [analyzer] DEBUG: Started auxiliary module Sysmon
2025-01-30 08:46:18,203 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n
2025-01-30 08:46:18,265 [lib.api.process] ERROR: Failed to execute process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\7909ced70e1df1e57d9395c993525cd7c51177bd4c4375ea4af42a64b18e174c.exe' with arguments ['bin\\inject-x86.exe', '--app', u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\7909ced70e1df1e57d9395c993525cd7c51177bd4c4375ea4af42a64b18e174c.exe', '--only-start', '--curdir', 'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp'] (Error: Command '['bin\\inject-x86.exe', '--app', u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\7909ced70e1df1e57d9395c993525cd7c51177bd4c4375ea4af42a64b18e174c.exe', '--only-start', '--curdir', 'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp']' returned non-zero exit status 1)

Cuckoo Log

2025-01-30 20:43:38,536 [cuckoo.core.scheduler] INFO: Task #5856937: acquired machine win7x6410 (label=win7x6410)
2025-01-30 20:43:38,536 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.210 for task #5856937
2025-01-30 20:43:38,997 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 67599 (interface=vboxnet0, host=192.168.168.210)
2025-01-30 20:43:39,093 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x6410
2025-01-30 20:43:40,129 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x6410 to vmcloak
2025-01-30 20:46:44,382 [cuckoo.core.guest] INFO: Starting analysis #5856937 on guest (id=win7x6410, ip=192.168.168.210)
2025-01-30 20:46:45,387 [cuckoo.core.guest] DEBUG: win7x6410: not ready yet
2025-01-30 20:46:50,411 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x6410, ip=192.168.168.210)
2025-01-30 20:46:50,486 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x6410, ip=192.168.168.210, monitor=latest, size=6660546)
2025-01-30 20:46:51,743 [cuckoo.core.resultserver] DEBUG: Task #5856937: live log analysis.log initialized.
2025-01-30 20:46:52,911 [cuckoo.core.resultserver] DEBUG: Task #5856937 is sending a BSON stream
2025-01-30 20:46:54,061 [cuckoo.core.resultserver] DEBUG: Task #5856937: File upload for 'shots/0001.jpg'
2025-01-30 20:46:54,079 [cuckoo.core.resultserver] DEBUG: Task #5856937 uploaded file length: 133469
2025-01-30 20:46:54,367 [cuckoo.core.guest] WARNING: win7x6410: analysis #5856937 caught an exception
Traceback (most recent call last):
  File "C:/tmp2zg5xi/analyzer.py", line 824, in <module>
    success = analyzer.run()
  File "C:/tmp2zg5xi/analyzer.py", line 673, in run
    pids = self.package.start(self.target)
  File "C:\tmp2zg5xi\modules\packages\exe.py", line 34, in start
    return self.execute(path, args=shlex.split(args))
  File "C:\tmp2zg5xi\lib\common\abstracts.py", line 205, in execute
    "Unable to execute the initial process, analysis aborted."
CuckooPackageError: Unable to execute the initial process, analysis aborted.

2025-01-30 20:46:54,378 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks
2025-01-30 20:46:54,401 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer
2025-01-30 20:46:55,718 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x6410 to path /srv/cuckoo/cwd/storage/analyses/5856937/memory.dmp
2025-01-30 20:46:55,719 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x6410
2025-01-30 20:50:04,599 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.210 for task #5856937
2025-01-30 20:50:04,602 [cuckoo.core.resultserver] DEBUG: Cancel <Context for LOG> for task 5856937
2025-01-30 20:50:05,241 [cuckoo.core.scheduler] DEBUG: Released database task #5856937
2025-01-30 20:50:05,271 [cuckoo.core.scheduler] INFO: Task #5856937: analysis procedure completed

Signatures

Yara rules detected for file (2 events)
description (no description) rule SEH__vba
description Affect system registries rule win_registry
File has been identified by 13 AntiVirus engine on IRMA as malicious (13 events)
G Data Antivirus (Windows) Virus: Gen:Variant.Graftor.27488 (Engine A)
Avast Core Security (Linux) Win32:VB-GNM [Wrm]
C4S ClamAV (Linux) Win.Worm.Sality-6823315-0
Sophos Anti-Virus (Linux) Mal/Generic-S
eScan Antivirus (Linux) Gen:Variant.Graftor.27488(DB)
ESET Security (Windows) a variant of Win32/VB.OPS worm
McAfee CLI scanner (Linux) W32/YahLover.worm.aa virus
DrWeb Antivirus (Linux) Worm.Siggen.6336
Trend Micro SProtect (Linux) WORM_IMAUT.SME
ClamAV (Linux) Win.Worm.Sality-6823315-0
Bitdefender Antivirus (Linux) Gen:Variant.Graftor.27488
Kaspersky Standard (Windows) HEUR:Trojan.Win32.Generic
Emsisoft Commandline Scanner (Windows) Gen:Variant.Graftor.27488 (B)
File has been identified by 56 AntiVirus engines on VirusTotal as malicious (50 out of 56 events)
Bkav W32.AIDetectMalware
Cynet Malicious (score: 100)
CAT-QuickHeal Worm.Codungi.A6
Skyhigh BehavesLike.Win32.Generic.kt
ALYac Gen:Variant.Graftor.27488
Cylance Unsafe
VIPRE Gen:Variant.Graftor.27488
Sangfor Trojan.Win32.Save.a
CrowdStrike win/malicious_confidence_100% (D)
BitDefender Gen:Variant.Graftor.27488
Arcabit Trojan.Graftor.D6B60
Baidu Win32.Trojan-Downloader.VB.b
VirIT Trojan.Win32.Citem.AKJ
Symantec Trojan.Gen.MBT
Elastic malicious (high confidence)
ESET-NOD32 a variant of Win32/VB.OPS
APEX Malicious
Avast Win32:VB-GNM [Wrm]
ClamAV Win.Worm.Sality-6823315-0
Kaspersky HEUR:Trojan.Win32.Generic
Alibaba Worm:Win32/YahLover.f0f3c42d
NANO-Antivirus Virus.Win32.Gen.ccmw
MicroWorld-eScan Gen:Variant.Graftor.27488
Rising Worm.VB!1.B58C (CLASSIC)
Emsisoft Gen:Variant.Graftor.27488 (B)
DrWeb Worm.Siggen.6336
TrendMicro WORM_IMAUT.SME
Trapmine malicious.high.ml.score
CTX exe.unknown.graftor
Sophos Mal/Generic-S
SentinelOne Static AI - Malicious PE
FireEye Generic.mg.39d244873d52a06b
Jiangmin Trojan.Generic.kkjm
Google Detected
Antiy-AVL Trojan/Win32.VB
Kingsoft Win32.Troj.Agent.cks
Gridinsoft Trojan.Win32.Wacatac.dd!n
Xcitium TrojWare.Win32.VB.IOK@54rlsj
Microsoft Trojan:Win32/Vindor!pz
ViRobot Trojan.Win32.Agent.975360
GData Gen:Variant.Graftor.27488
Varist W32/A-9d091a78!Eldorado
McAfee W32/YahLover.worm.aa
DeepInstinct MALICIOUS
Malwarebytes Generic.Malware.AI.DDS
Ikarus IM-Worm.Win32.VB
Panda Generic Malware
Zoner Probably Heur.ExeHeaderL
TrendMicro-HouseCall WORM_IMAUT.SME
Tencent Trojan.Win32.VB.tpa
Screenshots
Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action VT Location
No hosts contacted.
Cuckoo

We're processing your submission... This could take a few seconds.