Size | 46.6KB |
---|---|
Type | HTML document, Unicode text, UTF-8 text, with very long lines (30858) |
MD5 | 069a8c534f2d982b2ff9a36bdfe2164b |
SHA1 | 8cec46cc738014a8608bf16787b1dc08d62524bb |
SHA256 | aa074712cd694857518807501d91052cc3d21eb31ffd4348eebb3ab067f1c19d |
SHA512 |
da8ac8dfcb5744b29010716a1343752b8d6a1fdbb66c9f674b7e571ef02aad3709afba9b74bcb3afe04e4286cef2fdb862acb4ea0a0e20095e1c74bee1bfa338
|
CRC32 | 2553834F |
ssdeep | None |
Yara | None matched |
This file is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | April 11, 2025, 1:54 p.m. | April 11, 2025, 2:01 p.m. | 422 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-04-10 13:22:03,015 [analyzer] DEBUG: Starting analyzer from: C:\tmptpreht 2025-04-10 13:22:03,015 [analyzer] DEBUG: Pipe server name: \??\PIPE\uVWPKzlAGRyPbuwTbEoQjIipwRYTaMgt 2025-04-10 13:22:03,015 [analyzer] DEBUG: Log pipe server name: \??\PIPE\OeFcgTSAfxiRjgwD 2025-04-10 13:22:03,375 [analyzer] DEBUG: Started auxiliary module Curtain 2025-04-10 13:22:03,375 [analyzer] DEBUG: Started auxiliary module DbgView 2025-04-10 13:22:04,015 [analyzer] DEBUG: Started auxiliary module Disguise 2025-04-10 13:22:04,217 [analyzer] DEBUG: Loaded monitor into process with pid 500 2025-04-10 13:22:04,217 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-04-10 13:22:04,217 [analyzer] DEBUG: Started auxiliary module Human 2025-04-10 13:22:04,217 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-04-10 13:22:04,233 [analyzer] DEBUG: Started auxiliary module Reboot 2025-04-10 13:22:04,280 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-04-10 13:22:04,280 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-04-10 13:22:04,280 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-04-10 13:22:04,280 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-04-10 13:22:04,280 [modules.packages.js] INFO: Submitted file is missing extension, added .js 2025-04-10 13:22:04,375 [lib.api.process] INFO: Successfully executed process from path 'C:\\Windows\\System32\\wscript.exe' with arguments [u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\aa074712cd694857518807501d91052cc3d21eb31ffd4348eebb3ab067f1c19d.js'] and pid 1440 2025-04-10 13:22:04,625 [analyzer] DEBUG: Loaded monitor into process with pid 1440 2025-04-10 13:22:04,983 [analyzer] INFO: io=NULL 2025-04-10 13:22:04,983 [analyzer] DEBUG: Error resolving function jscript!ActiveXObjectFncObj_Construct through our custom callback. 2025-04-10 13:22:05,000 [analyzer] INFO: io=NULL 2025-04-10 13:22:05,000 [analyzer] DEBUG: Error resolving function jscript!COleScript_Compile through our custom callback. 2025-04-10 13:22:05,000 [analyzer] INFO: io=NULL 2025-04-10 13:22:05,000 [analyzer] DEBUG: Error resolving function jscript!Math_random through our custom callback. 2025-04-10 13:22:05,046 [analyzer] INFO: io=NULL 2025-04-10 13:22:05,046 [analyzer] DEBUG: Error resolving function jscript!ActiveXObjectFncObj_Construct through our custom callback. 2025-04-10 13:22:05,046 [analyzer] INFO: io=NULL 2025-04-10 13:22:05,046 [analyzer] DEBUG: Error resolving function jscript!COleScript_Compile through our custom callback. 2025-04-10 13:22:05,046 [analyzer] INFO: io=NULL 2025-04-10 13:22:05,046 [analyzer] DEBUG: Error resolving function jscript!Math_random through our custom callback. 2025-04-10 13:22:33,453 [analyzer] INFO: Analysis timeout hit, terminating analysis. 2025-04-10 13:22:33,921 [analyzer] INFO: Terminating remaining processes before shutdown. 2025-04-10 13:22:33,921 [lib.api.process] INFO: Successfully terminated process with pid 1440. 2025-04-10 13:22:33,937 [analyzer] INFO: Analysis completed.
2025-04-11 13:54:12,191 [cuckoo.core.scheduler] INFO: Task #6259035: acquired machine win7x641 (label=win7x641) 2025-04-11 13:54:12,192 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.201 for task #6259035 2025-04-11 13:54:12,620 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 3080155 (interface=vboxnet0, host=192.168.168.201) 2025-04-11 13:54:12,661 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x641 2025-04-11 13:54:13,464 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x641 to vmcloak 2025-04-11 13:57:04,351 [cuckoo.core.guest] INFO: Starting analysis #6259035 on guest (id=win7x641, ip=192.168.168.201) 2025-04-11 13:57:05,363 [cuckoo.core.guest] DEBUG: win7x641: not ready yet 2025-04-11 13:57:10,409 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x641, ip=192.168.168.201) 2025-04-11 13:57:11,596 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x641, ip=192.168.168.201, monitor=latest, size=6660546) 2025-04-11 13:57:14,475 [cuckoo.core.resultserver] DEBUG: Task #6259035: live log analysis.log initialized. 2025-04-11 13:57:14,817 [cuckoo.core.resultserver] DEBUG: Task #6259035 is sending a BSON stream 2025-04-11 13:57:15,123 [cuckoo.core.resultserver] DEBUG: Task #6259035 is sending a BSON stream 2025-04-11 13:57:16,060 [cuckoo.core.resultserver] DEBUG: Task #6259035: File upload for 'shots/0001.jpg' 2025-04-11 13:57:16,084 [cuckoo.core.resultserver] DEBUG: Task #6259035 uploaded file length: 133467 2025-04-11 13:57:17,374 [cuckoo.core.resultserver] DEBUG: Task #6259035: File upload for 'shots/0002.jpg' 2025-04-11 13:57:17,388 [cuckoo.core.resultserver] DEBUG: Task #6259035 uploaded file length: 137143 2025-04-11 13:57:28,836 [cuckoo.core.guest] DEBUG: win7x641: analysis #6259035 still processing 2025-04-11 13:57:44,067 [cuckoo.core.guest] DEBUG: win7x641: analysis #6259035 still processing 2025-04-11 13:57:44,297 [cuckoo.core.resultserver] DEBUG: Task #6259035: File upload for 'curtain/1744284153.69.curtain.log' 2025-04-11 13:57:44,300 [cuckoo.core.resultserver] DEBUG: Task #6259035 uploaded file length: 36 2025-04-11 13:57:44,518 [cuckoo.core.resultserver] DEBUG: Task #6259035: File upload for 'sysmon/1744284153.91.sysmon.xml' 2025-04-11 13:57:44,537 [cuckoo.core.resultserver] DEBUG: Task #6259035 uploaded file length: 1271986 2025-04-11 13:57:45,318 [cuckoo.core.resultserver] DEBUG: Task #6259035: File upload for 'shots/0003.jpg' 2025-04-11 13:57:45,330 [cuckoo.core.resultserver] DEBUG: Task #6259035 uploaded file length: 133467 2025-04-11 13:57:45,341 [cuckoo.core.resultserver] DEBUG: Task #6259035 had connection reset for <Context for LOG> 2025-04-11 13:57:47,096 [cuckoo.core.guest] INFO: win7x641: analysis completed successfully 2025-04-11 13:57:47,115 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-04-11 13:57:47,181 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-04-11 13:57:48,452 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x641 to path /srv/cuckoo/cwd/storage/analyses/6259035/memory.dmp 2025-04-11 13:57:48,456 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x641 2025-04-11 14:01:12,992 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.201 for task #6259035 2025-04-11 14:01:14,338 [cuckoo.core.scheduler] DEBUG: Released database task #6259035 2025-04-11 14:01:14,364 [cuckoo.core.scheduler] INFO: Task #6259035: analysis procedure completed
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid |
WithSecure (Linux) | Malware.HTML/Redirect.PSDT |
Cynet | Malicious (score: 99) |
F-Secure | Malware.HTML/Redirect.PSDT |
Avira | HTML/Redirect.PSDT |
GData | HTML.Trojan.Agent.6BOJ1O |
Fortinet | JS/Kryptik.CFD!tr |