Size | 141.0KB |
---|---|
Type | PE32 executable (GUI) Intel 80386, for MS Windows |
MD5 | 4c68ef27d7e379b56f76fc140edc1ad8 |
SHA1 | 9481882455e29294c04cd95ff74e0347fb6936e6 |
SHA256 | f65a8af1100b56f2ebe014caeaa5bb2fbbca2da76cb99f3142354e31fbba5c8c |
SHA512 |
2607ae207206654e38280549170fc5867dd1678696575c7a19fd78e285d1be0ab446a4fa478adc6b11d5614113ab3301ff885e38ea0e00e0acc2489595358552
|
CRC32 | EFBA848E |
ssdeep | None |
Yara |
|
This archive is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
ARCHIVE | April 18, 2025, 2:15 p.m. | April 18, 2025, 2:16 p.m. | 65 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-04-18 14:15:11,030 [analyzer] DEBUG: Starting analyzer from: C:\tmpj6atou 2025-04-18 14:15:11,030 [analyzer] DEBUG: Pipe server name: \??\PIPE\YtopuHgaHmrXTEvUCTRqKRGdVSJpx 2025-04-18 14:15:11,046 [analyzer] DEBUG: Log pipe server name: \??\PIPE\pjXhJZWRYfCBdibCLtWECDcKQShmPiEF 2025-04-18 14:15:11,296 [analyzer] DEBUG: Started auxiliary module Curtain 2025-04-18 14:15:11,296 [analyzer] DEBUG: Started auxiliary module DbgView 2025-04-18 14:15:11,780 [analyzer] DEBUG: Started auxiliary module Disguise 2025-04-18 14:15:11,983 [analyzer] DEBUG: Loaded monitor into process with pid 504 2025-04-18 14:15:11,983 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-04-18 14:15:11,983 [analyzer] DEBUG: Started auxiliary module Human 2025-04-18 14:15:11,983 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-04-18 14:15:11,983 [analyzer] DEBUG: Started auxiliary module Reboot 2025-04-18 14:15:12,062 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-04-18 14:15:12,062 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-04-18 14:15:12,078 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-04-18 14:15:12,078 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-04-18 14:15:12,265 [lib.api.process] INFO: Successfully executed process from path 'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\f65a8af1100b56f2ebe014caeaa5bb2fbbca2da76cb99f3142354e31fbba5c8c.exe' with arguments '' and pid 2464 2025-04-18 14:15:12,546 [analyzer] DEBUG: Loaded monitor into process with pid 2464 2025-04-18 14:15:13,733 [analyzer] INFO: Injected into process with pid 1704 and name u'explorer.exe' 2025-04-18 14:15:14,000 [analyzer] DEBUG: Loaded monitor into process with pid 1704 2025-04-18 13:16:06,996 [analyzer] INFO: Analysis timeout hit, terminating analysis. 2025-04-18 13:16:07,214 [lib.api.process] ERROR: Failed to dump memory of 32-bit process with pid 2464. 2025-04-18 13:16:07,387 [lib.api.process] ERROR: Failed to dump memory of 64-bit process with pid 1704. 2025-04-18 13:16:07,651 [analyzer] INFO: Terminating remaining processes before shutdown. 2025-04-18 13:16:07,651 [lib.api.process] INFO: Successfully terminated process with pid 2464. 2025-04-18 13:16:07,667 [lib.api.process] INFO: Successfully terminated process with pid 1704. 2025-04-18 13:16:07,667 [analyzer] INFO: Analysis completed.
2025-04-18 14:15:13,319 [cuckoo.core.scheduler] INFO: Task #6298218: acquired machine win7x6416 (label=win7x6416) 2025-04-18 14:15:13,319 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.216 for task #6298218 2025-04-18 14:15:13,736 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 3217801 (interface=vboxnet0, host=192.168.168.216) 2025-04-18 14:15:13,765 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x6416 2025-04-18 14:15:14,382 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x6416 to vmcloak 2025-04-18 14:15:29,133 [cuckoo.core.guest] INFO: Starting analysis #6298218 on guest (id=win7x6416, ip=192.168.168.216) 2025-04-18 14:15:30,139 [cuckoo.core.guest] DEBUG: win7x6416: not ready yet 2025-04-18 14:15:35,188 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x6416, ip=192.168.168.216) 2025-04-18 14:15:35,262 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x6416, ip=192.168.168.216, monitor=latest, size=6660546) 2025-04-18 14:15:36,713 [cuckoo.core.resultserver] DEBUG: Task #6298218: live log analysis.log initialized. 2025-04-18 14:15:37,654 [cuckoo.core.resultserver] DEBUG: Task #6298218 is sending a BSON stream 2025-04-18 14:15:38,184 [cuckoo.core.resultserver] DEBUG: Task #6298218 is sending a BSON stream 2025-04-18 14:15:38,938 [cuckoo.core.resultserver] DEBUG: Task #6298218: File upload for 'shots/0001.jpg' 2025-04-18 14:15:38,952 [cuckoo.core.resultserver] DEBUG: Task #6298218 uploaded file length: 133571 2025-04-18 14:15:39,528 [cuckoo.core.resultserver] DEBUG: Task #6298218 is sending a BSON stream 2025-04-18 14:15:51,389 [cuckoo.core.guest] DEBUG: win7x6416: analysis #6298218 still processing 2025-04-18 14:16:06,480 [cuckoo.core.guest] DEBUG: win7x6416: analysis #6298218 still processing 2025-04-18 14:16:07,553 [cuckoo.core.resultserver] DEBUG: Task #6298218: File upload for 'curtain/1744974967.54.curtain.log' 2025-04-18 14:16:07,556 [cuckoo.core.resultserver] DEBUG: Task #6298218 uploaded file length: 36 2025-04-18 14:16:07,660 [cuckoo.core.resultserver] DEBUG: Task #6298218: File upload for 'sysmon/1744974967.65.sysmon.xml' 2025-04-18 14:16:07,667 [cuckoo.core.resultserver] DEBUG: Task #6298218 uploaded file length: 130948 2025-04-18 14:16:07,911 [cuckoo.core.resultserver] DEBUG: Task #6298218: File upload for 'shots/0002.jpg' 2025-04-18 14:16:07,921 [cuckoo.core.resultserver] DEBUG: Task #6298218 uploaded file length: 129623 2025-04-18 14:16:07,939 [cuckoo.core.resultserver] DEBUG: Task #6298218 had connection reset for <Context for LOG> 2025-04-18 14:16:09,494 [cuckoo.core.guest] INFO: win7x6416: analysis completed successfully 2025-04-18 14:16:09,510 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-04-18 14:16:09,534 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-04-18 14:16:10,600 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x6416 to path /srv/cuckoo/cwd/storage/analyses/6298218/memory.dmp 2025-04-18 14:16:10,601 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x6416 2025-04-18 14:16:18,476 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.216 for task #6298218 2025-04-18 14:16:18,762 [cuckoo.core.scheduler] DEBUG: Released database task #6298218 2025-04-18 14:16:18,781 [cuckoo.core.scheduler] INFO: Task #6298218: analysis procedure completed
description | Detects Encrial credential stealer malware | rule | MAL_Envrial_Jan18_1 | ||||||
description | Heaven's Gate: Switch from 32-bit to 64-mode | rule | HeavensGate | ||||||
description | Detects Codoso APT Gh0st Malware | rule | Codoso_Gh0st_2 | ||||||
description | Detects Codoso APT Gh0st Malware | rule | Codoso_Gh0st_1 | ||||||
description | Detects Codoso APT Gh0st Malware | rule | Codoso_Gh0st_2 | ||||||
description | Detects Codoso APT Gh0st Malware | rule | Codoso_Gh0st_1 | ||||||
description | (no description) | rule | AveMaria_WarZone | ||||||
description | Detect functions coded with ROR edi,D; Detect CobaltStrike used by differents groups APT | rule | Cobalt_functions | ||||||
description | (no description) | rule | powershell | ||||||
description | Code injection with CreateRemoteThread in a remote process | rule | inject_thread |
resource name | WM_DSP |
name | WM_DSP | language | LANG_ENGLISH | filetype | PE32 executable (GUI) Intel 80386, for MS Windows | sublanguage | SUBLANG_ARABIC_QATAR | offset | 0x00156070 | size | 0x00002c00 |
file | C:\Users\Administrator\AppData\Local\Temp\f65a8af1100b56f2ebe014caeaa5bb2fbbca2da76cb99f3142354e31fbba5c8c.exe:Zone.Identifier |
G Data Antivirus (Windows) | Virus: Gen:Heur.Mint.Zard.39 (Engine A), Win32.Trojan.PSE.IJ6QMG (Engine B) |
Avast Core Security (Linux) | Win32:MalwareX-gen [Rat] |
C4S ClamAV (Linux) | Win.Downloader.Powershell-9856919-0 |
Trend Micro SProtect (Linux) | TrojanSpy.Win32.MOCRT.SM |
Trellix (Linux) | PWS-FDNF |
WithSecure (Linux) | Trojan.TR/Redcap.ghjpt |
eScan Antivirus (Linux) | Gen:Heur.Mint.Zard.39(DB) |
ESET Security (Windows) | a variant of Win32/Warzone.A trojan |
Sophos Anti-Virus (Linux) | Troj/AveMaria-A |
DrWeb Antivirus (Linux) | Trojan.Uacbypass.28 |
ClamAV (Linux) | Win.Downloader.Powershell-9856919-0 |
Bitdefender Antivirus (Linux) | Gen:Heur.Mint.Zard.39 |
Emsisoft Commandline Scanner (Windows) | Gen:Heur.Mint.Zard.39 (B) |
Bkav | W32.ScorpiTemfuJ.Trojan |
Lionic | Trojan.Win32.Agentb.X!c |
Cynet | Malicious (score: 100) |
CAT-QuickHeal | Trojan.Ghanarava.1694779518dc1ad8 |
Skyhigh | BehavesLike.Win32.Generic.ch |
Cylance | Unsafe |
VIPRE | Gen:Heur.Mint.Zard.39 |
Sangfor | Trojan.Win32.Save.a |
CrowdStrike | win/malicious_confidence_100% (W) |
BitDefender | Gen:Heur.Mint.Zard.39 |
K7GW | Trojan ( 0054d10e1 ) |
K7AntiVirus | Trojan ( 0054d10e1 ) |
Arcabit | Trojan.Mint.Zard.39 |
VirIT | Trojan.Win32.Genus.QJS |
Symantec | Infostealer |
Elastic | Windows.Generic.Threat |
ESET-NOD32 | a variant of Win32/Warzone.A |
APEX | Malicious |
Avast | Win32:Malware-gen |
ClamAV | Win.Downloader.Powershell-9856919-0 |
Kaspersky | Trojan.Win32.Agentb.jiad |
Alibaba | Trojan:Win32/Guildma.fb4ba4af |
NANO-Antivirus | Trojan.Win32.AntiAV.fljpfv |
SUPERAntiSpyware | Trojan.Agent/Gen-Crypt |
MicroWorld-eScan | Gen:Heur.Mint.Zard.39 |
Rising | Stealer.AveMaria!1.E64D (CLASSIC) |
Emsisoft | Gen:Heur.Mint.Zard.39 (B) |
F-Secure | Trojan.TR/Redcap.ghjpt |
DrWeb | Trojan.Uacbypass.28 |
Zillya | Trojan.Agent.Win32.3406532 |
TrendMicro | TrojanSpy.Win32.MOCRT.SM |
McAfeeD | Real Protect-LS!4C68EF27D7E3 |
Trapmine | malicious.high.ml.score |
CTX | exe.unknown.mint |
Sophos | Troj/AveMaria-A |
SentinelOne | Static AI - Malicious PE |
Jiangmin | Trojan.Agentb.nwr |
Webroot | W32.Trojan.Gen |
Detected | |
Avira | TR/Redcap.ghjpt |
Antiy-AVL | Trojan/Win32.Agentb |
Gridinsoft | Trojan.Win32.Agent.oa!s1 |
Microsoft | Trojan:Win32/Guildma!pz |
ZoneAlarm | Mal/EncPk-MP |
GData | Win32.Trojan.PSE.38UUO1 |
Varist | W32/Antiav.INDT-0919 |
AhnLab-V3 | Trojan/Win32.AveMaria.R263895 |
McAfee | PWS-FDNF!4C68EF27D7E3 |
TACHYON | Trojan/W32.Agent.144384.YB |
DeepInstinct | MALICIOUS |