Size | 64.0KB |
---|---|
Type | PE32 executable (GUI) Intel 80386, for MS Windows |
MD5 | 39d244873d52a06b51697ec7d073c2a7 |
SHA1 | e5bcfa521ed41536f42477d286ecafef5ea23a53 |
SHA256 | 7909ced70e1df1e57d9395c993525cd7c51177bd4c4375ea4af42a64b18e174c |
SHA512 |
ae4b2fd0e48c482237f3957441e3361b6f6140c57a79520155a66a0d71d1b877d9a577a0dc98829050a84135d11f226d97948b70117a97ab9ab54b98bf76d46c
|
CRC32 | D3952FF7 |
ssdeep | None |
Yara |
|
This file is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | Jan. 30, 2025, 8:43 p.m. | Jan. 30, 2025, 8:50 p.m. | 386 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-01-30 08:46:17,015 [analyzer] DEBUG: Starting analyzer from: C:\tmp2zg5xi 2025-01-30 08:46:17,015 [analyzer] DEBUG: Pipe server name: \??\PIPE\AFwXRaNUvNNxdxkpkYKwWD 2025-01-30 08:46:17,015 [analyzer] DEBUG: Log pipe server name: \??\PIPE\fcXvLIoHmJLXSGuLqMpxSETTBAHpXf 2025-01-30 08:46:17,328 [analyzer] DEBUG: Started auxiliary module Curtain 2025-01-30 08:46:17,328 [analyzer] DEBUG: Started auxiliary module DbgView 2025-01-30 08:46:17,905 [analyzer] DEBUG: Started auxiliary module Disguise 2025-01-30 08:46:18,108 [analyzer] DEBUG: Loaded monitor into process with pid 512 2025-01-30 08:46:18,108 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-01-30 08:46:18,108 [analyzer] DEBUG: Started auxiliary module Human 2025-01-30 08:46:18,108 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-01-30 08:46:18,108 [analyzer] DEBUG: Started auxiliary module Reboot 2025-01-30 08:46:18,187 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-01-30 08:46:18,203 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-01-30 08:46:18,203 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-01-30 08:46:18,203 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-01-30 08:46:18,265 [lib.api.process] ERROR: Failed to execute process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\7909ced70e1df1e57d9395c993525cd7c51177bd4c4375ea4af42a64b18e174c.exe' with arguments ['bin\\inject-x86.exe', '--app', u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\7909ced70e1df1e57d9395c993525cd7c51177bd4c4375ea4af42a64b18e174c.exe', '--only-start', '--curdir', 'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp'] (Error: Command '['bin\\inject-x86.exe', '--app', u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\7909ced70e1df1e57d9395c993525cd7c51177bd4c4375ea4af42a64b18e174c.exe', '--only-start', '--curdir', 'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp']' returned non-zero exit status 1)
2025-01-30 20:43:38,536 [cuckoo.core.scheduler] INFO: Task #5856937: acquired machine win7x6410 (label=win7x6410) 2025-01-30 20:43:38,536 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.210 for task #5856937 2025-01-30 20:43:38,997 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 67599 (interface=vboxnet0, host=192.168.168.210) 2025-01-30 20:43:39,093 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x6410 2025-01-30 20:43:40,129 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x6410 to vmcloak 2025-01-30 20:46:44,382 [cuckoo.core.guest] INFO: Starting analysis #5856937 on guest (id=win7x6410, ip=192.168.168.210) 2025-01-30 20:46:45,387 [cuckoo.core.guest] DEBUG: win7x6410: not ready yet 2025-01-30 20:46:50,411 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x6410, ip=192.168.168.210) 2025-01-30 20:46:50,486 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x6410, ip=192.168.168.210, monitor=latest, size=6660546) 2025-01-30 20:46:51,743 [cuckoo.core.resultserver] DEBUG: Task #5856937: live log analysis.log initialized. 2025-01-30 20:46:52,911 [cuckoo.core.resultserver] DEBUG: Task #5856937 is sending a BSON stream 2025-01-30 20:46:54,061 [cuckoo.core.resultserver] DEBUG: Task #5856937: File upload for 'shots/0001.jpg' 2025-01-30 20:46:54,079 [cuckoo.core.resultserver] DEBUG: Task #5856937 uploaded file length: 133469 2025-01-30 20:46:54,367 [cuckoo.core.guest] WARNING: win7x6410: analysis #5856937 caught an exception Traceback (most recent call last): File "C:/tmp2zg5xi/analyzer.py", line 824, in <module> success = analyzer.run() File "C:/tmp2zg5xi/analyzer.py", line 673, in run pids = self.package.start(self.target) File "C:\tmp2zg5xi\modules\packages\exe.py", line 34, in start return self.execute(path, args=shlex.split(args)) File "C:\tmp2zg5xi\lib\common\abstracts.py", line 205, in execute "Unable to execute the initial process, analysis aborted." CuckooPackageError: Unable to execute the initial process, analysis aborted. 2025-01-30 20:46:54,378 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-01-30 20:46:54,401 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-01-30 20:46:55,718 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x6410 to path /srv/cuckoo/cwd/storage/analyses/5856937/memory.dmp 2025-01-30 20:46:55,719 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x6410 2025-01-30 20:50:04,599 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.210 for task #5856937 2025-01-30 20:50:04,602 [cuckoo.core.resultserver] DEBUG: Cancel <Context for LOG> for task 5856937 2025-01-30 20:50:05,241 [cuckoo.core.scheduler] DEBUG: Released database task #5856937 2025-01-30 20:50:05,271 [cuckoo.core.scheduler] INFO: Task #5856937: analysis procedure completed
description | (no description) | rule | SEH__vba | ||||||
description | Affect system registries | rule | win_registry |
G Data Antivirus (Windows) | Virus: Gen:Variant.Graftor.27488 (Engine A) |
Avast Core Security (Linux) | Win32:VB-GNM [Wrm] |
C4S ClamAV (Linux) | Win.Worm.Sality-6823315-0 |
Sophos Anti-Virus (Linux) | Mal/Generic-S |
eScan Antivirus (Linux) | Gen:Variant.Graftor.27488(DB) |
ESET Security (Windows) | a variant of Win32/VB.OPS worm |
McAfee CLI scanner (Linux) | W32/YahLover.worm.aa virus |
DrWeb Antivirus (Linux) | Worm.Siggen.6336 |
Trend Micro SProtect (Linux) | WORM_IMAUT.SME |
ClamAV (Linux) | Win.Worm.Sality-6823315-0 |
Bitdefender Antivirus (Linux) | Gen:Variant.Graftor.27488 |
Kaspersky Standard (Windows) | HEUR:Trojan.Win32.Generic |
Emsisoft Commandline Scanner (Windows) | Gen:Variant.Graftor.27488 (B) |
Bkav | W32.AIDetectMalware |
Cynet | Malicious (score: 100) |
CAT-QuickHeal | Worm.Codungi.A6 |
Skyhigh | BehavesLike.Win32.Generic.kt |
ALYac | Gen:Variant.Graftor.27488 |
Cylance | Unsafe |
VIPRE | Gen:Variant.Graftor.27488 |
Sangfor | Trojan.Win32.Save.a |
CrowdStrike | win/malicious_confidence_100% (D) |
BitDefender | Gen:Variant.Graftor.27488 |
Arcabit | Trojan.Graftor.D6B60 |
Baidu | Win32.Trojan-Downloader.VB.b |
VirIT | Trojan.Win32.Citem.AKJ |
Symantec | Trojan.Gen.MBT |
Elastic | malicious (high confidence) |
ESET-NOD32 | a variant of Win32/VB.OPS |
APEX | Malicious |
Avast | Win32:VB-GNM [Wrm] |
ClamAV | Win.Worm.Sality-6823315-0 |
Kaspersky | HEUR:Trojan.Win32.Generic |
Alibaba | Worm:Win32/YahLover.f0f3c42d |
NANO-Antivirus | Virus.Win32.Gen.ccmw |
MicroWorld-eScan | Gen:Variant.Graftor.27488 |
Rising | Worm.VB!1.B58C (CLASSIC) |
Emsisoft | Gen:Variant.Graftor.27488 (B) |
DrWeb | Worm.Siggen.6336 |
TrendMicro | WORM_IMAUT.SME |
Trapmine | malicious.high.ml.score |
CTX | exe.unknown.graftor |
Sophos | Mal/Generic-S |
SentinelOne | Static AI - Malicious PE |
FireEye | Generic.mg.39d244873d52a06b |
Jiangmin | Trojan.Generic.kkjm |
Detected | |
Antiy-AVL | Trojan/Win32.VB |
Kingsoft | Win32.Troj.Agent.cks |
Gridinsoft | Trojan.Win32.Wacatac.dd!n |
Xcitium | TrojWare.Win32.VB.IOK@54rlsj |
Microsoft | Trojan:Win32/Vindor!pz |
ViRobot | Trojan.Win32.Agent.975360 |
GData | Gen:Variant.Graftor.27488 |
Varist | W32/A-9d091a78!Eldorado |
McAfee | W32/YahLover.worm.aa |
DeepInstinct | MALICIOUS |
Malwarebytes | Generic.Malware.AI.DDS |
Ikarus | IM-Worm.Win32.VB |
Panda | Generic Malware |
Zoner | Probably Heur.ExeHeaderL |
TrendMicro-HouseCall | WORM_IMAUT.SME |
Tencent | Trojan.Win32.VB.tpa |