Size | 2.1MB |
---|---|
Type | PE32+ executable (GUI) x86-64, for MS Windows |
MD5 | e1a56ac8909c96d8624cc8d485aac2bc |
SHA1 | ad766f059b32c8a074d0c45645393683c83c2f91 |
SHA256 | 0674b2797d6dc0a9ff2b7fc4f0c407f993cdb64c6d1eab6990c35ac2e5864fe6 |
SHA512 |
8dd37ce3040ef73bf1d83effb2df87f2fda7c45cb550988f06df4af1e4b194201cf8789618cdbc30833e949b22648fbfda633554f4184b69d6f3e1217380a4e1
|
CRC32 | 5C1A221F |
ssdeep | None |
Yara |
|
This file is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | April 11, 2025, 1:56 p.m. | April 11, 2025, 2:03 p.m. | 393 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-04-10 13:22:07,015 [analyzer] DEBUG: Starting analyzer from: C:\tmpht3fil 2025-04-10 13:22:07,015 [analyzer] DEBUG: Pipe server name: \??\PIPE\YfDoIULugmpfbXHuIOAVNEcvswmXofn 2025-04-10 13:22:07,015 [analyzer] DEBUG: Log pipe server name: \??\PIPE\sWThbhvHHROJHZKhGjtw 2025-04-10 13:22:07,265 [analyzer] DEBUG: Started auxiliary module Curtain 2025-04-10 13:22:07,265 [analyzer] DEBUG: Started auxiliary module DbgView 2025-04-10 13:22:07,750 [analyzer] DEBUG: Started auxiliary module Disguise 2025-04-10 13:22:07,953 [analyzer] DEBUG: Loaded monitor into process with pid 504 2025-04-10 13:22:07,953 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-04-10 13:22:07,953 [analyzer] DEBUG: Started auxiliary module Human 2025-04-10 13:22:07,953 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-04-10 13:22:07,953 [analyzer] DEBUG: Started auxiliary module Reboot 2025-04-10 13:22:08,046 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-04-10 13:22:08,046 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-04-10 13:22:08,046 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-04-10 13:22:08,046 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-04-10 13:22:08,108 [lib.api.process] ERROR: Failed to execute process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\0674b2797d6dc0a9ff2b7fc4f0c407f993cdb64c6d1eab6990c35ac2e5864fe6.exe' with arguments ['bin\\inject-x64.exe', '--app', u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\0674b2797d6dc0a9ff2b7fc4f0c407f993cdb64c6d1eab6990c35ac2e5864fe6.exe', '--only-start', '--curdir', 'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp'] (Error: Command '['bin\\inject-x64.exe', '--app', u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\0674b2797d6dc0a9ff2b7fc4f0c407f993cdb64c6d1eab6990c35ac2e5864fe6.exe', '--only-start', '--curdir', 'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp']' returned non-zero exit status 1)
2025-04-11 13:56:34,848 [cuckoo.core.scheduler] INFO: Task #6259045: acquired machine win7x6411 (label=win7x6411) 2025-04-11 13:56:34,848 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.211 for task #6259045 2025-04-11 13:56:35,214 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 3083244 (interface=vboxnet0, host=192.168.168.211) 2025-04-11 13:56:36,669 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x6411 2025-04-11 13:56:37,303 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x6411 to vmcloak 2025-04-11 13:59:15,691 [cuckoo.core.guest] INFO: Starting analysis #6259045 on guest (id=win7x6411, ip=192.168.168.211) 2025-04-11 13:59:16,697 [cuckoo.core.guest] DEBUG: win7x6411: not ready yet 2025-04-11 13:59:21,729 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x6411, ip=192.168.168.211) 2025-04-11 13:59:21,811 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x6411, ip=192.168.168.211, monitor=latest, size=6660546) 2025-04-11 13:59:23,215 [cuckoo.core.resultserver] DEBUG: Task #6259045: live log analysis.log initialized. 2025-04-11 13:59:24,232 [cuckoo.core.resultserver] DEBUG: Task #6259045 is sending a BSON stream 2025-04-11 13:59:25,425 [cuckoo.core.resultserver] DEBUG: Task #6259045: File upload for 'shots/0001.jpg' 2025-04-11 13:59:25,440 [cuckoo.core.resultserver] DEBUG: Task #6259045 uploaded file length: 133467 2025-04-11 13:59:25,724 [cuckoo.core.guest] WARNING: win7x6411: analysis #6259045 caught an exception Traceback (most recent call last): File "C:/tmpht3fil/analyzer.py", line 824, in <module> success = analyzer.run() File "C:/tmpht3fil/analyzer.py", line 673, in run pids = self.package.start(self.target) File "C:\tmpht3fil\modules\packages\exe.py", line 34, in start return self.execute(path, args=shlex.split(args)) File "C:\tmpht3fil\lib\common\abstracts.py", line 205, in execute "Unable to execute the initial process, analysis aborted." CuckooPackageError: Unable to execute the initial process, analysis aborted. 2025-04-11 13:59:25,738 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-04-11 13:59:25,774 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-04-11 13:59:26,822 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x6411 to path /srv/cuckoo/cwd/storage/analyses/6259045/memory.dmp 2025-04-11 13:59:26,823 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x6411 2025-04-11 14:03:06,800 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.211 for task #6259045 2025-04-11 14:03:06,801 [cuckoo.core.resultserver] DEBUG: Cancel <Context for LOG> for task 6259045 2025-04-11 14:03:07,844 [cuckoo.core.scheduler] DEBUG: Released database task #6259045 2025-04-11 14:03:07,883 [cuckoo.core.scheduler] INFO: Task #6259045: analysis procedure completed
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Affect private profile | rule | win_files_operation |
section | .BSS |
section | .gxfg |
section | .retplne |
section | _RDATA |
section | .cSs |
section | {u'size_of_data': u'0x00058000', u'virtual_address': u'0x001c2000', u'entropy': 7.999458418906076, u'name': u'.cSs', u'virtual_size': u'0x00058000'} | entropy | 7.99945841891 | description | A section with a high entropy has been found |
ESET Security (Windows) | a variant of Win64/Kryptik.EZW trojan |
Sophos Anti-Virus (Linux) | Troj/Krypt-APK |
Bkav | W64.AIDetectMalware |
Lionic | Trojan.Win32.Krypt.4!c |
Cynet | Malicious (score: 100) |
CAT-QuickHeal | Trojan.Ghanarava.1744356388aac2bc |
Cylance | Unsafe |
CrowdStrike | win/malicious_confidence_90% (W) |
K7GW | Trojan ( 005c4e5e1 ) |
K7AntiVirus | Trojan ( 005c4e5e1 ) |
VirIT | Trojan.Win64.Agent.HXA |
Symantec | Trojan.Gen.2 |
Elastic | malicious (high confidence) |
ESET-NOD32 | a variant of Win64/Kryptik.EZW |
APEX | Malicious |
Rising | Trojan.ShellCodeLoader!1.12B07 (CLASSIC) |
Zillya | Trojan.Kryptik.Win64.56815 |
McAfeeD | ti!0674B2797D6D |
CTX | exe.trojan.generic |
Sophos | Troj/Krypt-APK |
SentinelOne | Static AI - Suspicious PE |
Detected | |
Antiy-AVL | Trojan[PSW]/Win32.Vidar |
Kingsoft | malware.kb.a.728 |
Gridinsoft | Trojan.Win64.Wacatac.oa!s1 |
Microsoft | Trojan:Win32/LummaStealer.Z!MTB |
ZoneAlarm | Troj/Krypt-APK |
GData | Win64.Trojan.Agent.KVSUGI |
Varist | W64/Agent.LBL.gen!Eldorado |
AhnLab-V3 | Dropper/Win.DropperX-gen.R698049 |
McAfee | Artemis!E1A56AC8909C |
Malwarebytes | Crypt.Trojan.MSIL.DDS |
Ikarus | Trojan.Win64.Krypt |
Panda | Trj/Chgt.AD |
TrendMicro-HouseCall | Trojan.Win32.VSX.PE04C9V |
Tencent | OB:Trojan.Win64.Injector.16001769 |
huorong | Trojan/Injector.cer |
MaxSecure | Trojan.Malware.324995110.susgen |
Fortinet | W64/GenKryptik.HHSB!tr |
alibabacloud | Trojan:Win/Wacatac.B9nj |