Size | 49.5KB |
---|---|
Type | PE32+ executable (GUI) x86-64, for MS Windows |
MD5 | 15796971d60f9d71ad162060f0f76a02 |
SHA1 | f94291972a7c439c2f29c7cedf85452717d82568 |
SHA256 | 21e51ee7ba87cd60f692628292e221c17286df1c39e36410e7a0ae77df0f6b4b |
SHA512 |
9ccbfc60988ae13d4f21901f3ccbfab9b9b74907632c526850a07c8c0763a55c9e353e88dd9bd7efb96f7dd87c25d9c6013f986fbfe3ac0a147bf44da22ce2a7
|
CRC32 | D0F9623B |
ssdeep | None |
Yara |
|
This file is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | April 18, 2025, 4:16 p.m. | April 18, 2025, 4:18 p.m. | 72 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-04-18 16:16:45,015 [analyzer] DEBUG: Starting analyzer from: C:\tmpj6atou 2025-04-18 16:16:45,046 [analyzer] DEBUG: Pipe server name: \??\PIPE\cAlDAwexHDXwLNKlUfZH 2025-04-18 16:16:45,046 [analyzer] DEBUG: Log pipe server name: \??\PIPE\IUCGdjKzMqkLbJpRaVAVkYByzABPAx 2025-04-18 16:16:45,328 [analyzer] DEBUG: Started auxiliary module Curtain 2025-04-18 16:16:45,328 [analyzer] DEBUG: Started auxiliary module DbgView 2025-04-18 16:16:45,733 [analyzer] DEBUG: Started auxiliary module Disguise 2025-04-18 16:16:45,921 [analyzer] DEBUG: Loaded monitor into process with pid 504 2025-04-18 16:16:45,921 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-04-18 16:16:45,921 [analyzer] DEBUG: Started auxiliary module Human 2025-04-18 16:16:45,921 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-04-18 16:16:45,921 [analyzer] DEBUG: Started auxiliary module Reboot 2025-04-18 16:16:46,000 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-04-18 16:16:46,015 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-04-18 16:16:46,015 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-04-18 16:16:46,015 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-04-18 16:16:46,187 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\21e51ee7ba87cd60f692628292e221c17286df1c39e36410e7a0ae77df0f6b4b.exe' with arguments '' and pid 2520 2025-04-18 16:16:46,421 [analyzer] DEBUG: Loaded monitor into process with pid 2520 2025-04-18 15:17:59,864 [analyzer] INFO: Analysis timeout hit, terminating analysis. 2025-04-18 15:18:00,128 [lib.api.process] ERROR: Failed to dump memory of 64-bit process with pid 2520. 2025-04-18 15:18:00,253 [lib.common.results] ERROR: Exception uploading file 'C:\\curtain.log' to host: Config instance has no attribute 'ip' 2025-04-18 15:18:00,378 [lib.common.results] ERROR: Exception uploading file 'C:\\sysmon.xml' to host: Config instance has no attribute 'ip' 2025-04-18 15:18:00,378 [analyzer] INFO: Terminating remaining processes before shutdown. 2025-04-18 15:18:00,378 [lib.api.process] INFO: Successfully terminated process with pid 2520. 2025-04-18 15:18:00,378 [analyzer] INFO: Analysis completed.
2025-04-18 16:16:59,724 [cuckoo.core.scheduler] INFO: Task #6298273: acquired machine win7x6416 (label=win7x6416) 2025-04-18 16:16:59,725 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.216 for task #6298273 2025-04-18 16:17:00,108 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 3272019 (interface=vboxnet0, host=192.168.168.216) 2025-04-18 16:17:00,176 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x6416 2025-04-18 16:17:00,700 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x6416 to vmcloak 2025-04-18 16:17:22,143 [cuckoo.core.guest] INFO: Starting analysis #6298273 on guest (id=win7x6416, ip=192.168.168.216) 2025-04-18 16:17:23,150 [cuckoo.core.guest] DEBUG: win7x6416: not ready yet 2025-04-18 16:17:28,175 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x6416, ip=192.168.168.216) 2025-04-18 16:17:28,243 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x6416, ip=192.168.168.216, monitor=latest, size=6660546) 2025-04-18 16:17:29,624 [cuckoo.core.resultserver] DEBUG: Task #6298273: live log analysis.log initialized. 2025-04-18 16:17:30,528 [cuckoo.core.resultserver] DEBUG: Task #6298273 is sending a BSON stream 2025-04-18 16:17:30,926 [cuckoo.core.resultserver] DEBUG: Task #6298273 is sending a BSON stream 2025-04-18 16:17:31,816 [cuckoo.core.resultserver] DEBUG: Task #6298273: File upload for 'shots/0001.jpg' 2025-04-18 16:17:31,849 [cuckoo.core.resultserver] DEBUG: Task #6298273 uploaded file length: 133569 2025-04-18 16:17:44,142 [cuckoo.core.guest] DEBUG: win7x6416: analysis #6298273 still processing 2025-04-18 16:17:59,465 [cuckoo.core.guest] DEBUG: win7x6416: analysis #6298273 still processing 2025-04-18 16:18:00,398 [cuckoo.core.resultserver] DEBUG: Task #6298273 had connection reset for <Context for LOG> 2025-04-18 16:18:02,479 [cuckoo.core.guest] INFO: win7x6416: analysis completed successfully 2025-04-18 16:18:02,492 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-04-18 16:18:02,558 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-04-18 16:18:03,575 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x6416 to path /srv/cuckoo/cwd/storage/analyses/6298273/memory.dmp 2025-04-18 16:18:03,577 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x6416 2025-04-18 16:18:11,480 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.216 for task #6298273 2025-04-18 16:18:11,740 [cuckoo.core.scheduler] DEBUG: Released database task #6298273 2025-04-18 16:18:11,758 [cuckoo.core.scheduler] INFO: Task #6298273: analysis procedure completed
description | The packer/protector section names/keywords | rule | suspicious_packer_section |
section | {u'size_of_data': u'0x0000c200', u'virtual_address': u'0x00119000', u'entropy': 7.878790817037181, u'name': u'UPX1', u'virtual_size': u'0x0000d000'} | entropy | 7.87879081704 | description | A section with a high entropy has been found | |||||||||
entropy | 0.989795918367 | description | Overall entropy of this PE file is high |
section | UPX0 | description | Section name indicates UPX | ||||||
section | UPX1 | description | Section name indicates UPX |
suricata | Stamus Networks MS-SRVS service - NetrShareEnum |
G Data Antivirus (Windows) | Virus: Gen:Variant.Ser.Ulise.6643 (Engine A) |
Avast Core Security (Linux) | Win64:Evo-gen [Trj] |
Trend Micro SProtect (Linux) | Ransom.Win64.LOCKBIT.YXFAITTT |
Trellix (Linux) | W64/Lockbit trojan |
WithSecure (Linux) | Trojan:W32/Generic.abch!fsmind |
eScan Antivirus (Linux) | Gen:Variant.Ser.Ulise.6643(DB) |
ESET Security (Windows) | Win64/Filecoder.Lockbit.C trojan |
Sophos Anti-Virus (Linux) | Mal/Generic-S |
DrWeb Antivirus (Linux) | Trojan.MulDrop28.53639 |
Bitdefender Antivirus (Linux) | Gen:Variant.Ser.Ulise.6643 |
Emsisoft Commandline Scanner (Windows) | Gen:Variant.Ser.Ulise.6643 (B) |
Bkav | W32.Common.4A8DA7E3 |
Lionic | Trojan.Win32.Udochka.tsIz |
Cynet | Malicious (score: 99) |
CAT-QuickHeal | Trojan.Ghanarava.1735858663f76a02 |
Skyhigh | BehavesLike.Win64.Generic.pc |
ALYac | Trojan.Ransom.LockBit |
Cylance | Unsafe |
VIPRE | Gen:Variant.Ser.Ulise.6643 |
Sangfor | Suspicious.Win32.Save.a |
CrowdStrike | win/malicious_confidence_100% (W) |
BitDefender | Gen:Variant.Ser.Ulise.6643 |
K7GW | Trojan ( 005beca91 ) |
K7AntiVirus | Trojan ( 005beca91 ) |
Arcabit | Trojan.Ser.Ulise.D19F3 |
VirIT | Trojan.Win64.Agent.GAZ |
Symantec | Trojan Horse |
Elastic | malicious (high confidence) |
ESET-NOD32 | Win64/Filecoder.Lockbit.C |
APEX | Malicious |
Avast | Win64:Evo-gen [Trj] |
Kaspersky | Trojan.Win32.Udochka.cat |
Alibaba | Trojan:Win64/Udochka.e21a79d5 |
NANO-Antivirus | Trojan.Win64.Redcap.kuktuc |
MicroWorld-eScan | Gen:Variant.Ser.Ulise.6643 |
Rising | Trojan.Injector!8.C4 (TFE:1:oVak9L0IvpM) |
Emsisoft | Gen:Variant.Ser.Ulise.6643 (B) |
F-Secure | Trojan.TR/Redcap.vyauq |
DrWeb | Trojan.MulDrop28.53639 |
Zillya | Trojan.Filecoder.Win64.117654 |
TrendMicro | Ransom.Win64.LOCKBIT.YXFAITTT |
McAfeeD | Real Protect-LS!15796971D60F |
CTX | exe.trojan.lockbit |
Sophos | Mal/Generic-S |
SentinelOne | Static AI - Suspicious PE |
Detected | |
Avira | TR/Redcap.vyauq |
Antiy-AVL | GrayWare/Win32.Kryptik.ffp |
Kingsoft | Win32.Trojan.Agentb.gen |
Gridinsoft | Ransom.Win64.LockBit.dd!s2 |
Xcitium | Malware@#gv13wwo6ia5u |
Microsoft | Ransom:Win64/LockBit.M |
ViRobot | Trojan.Win.Z.Lockbit.50688.A |
GData | Gen:Variant.Ser.Ulise.6643 |
Varist | W64/ABRansom.NIGN-4678 |
AhnLab-V3 | Ransomware/Win.LockBit.C5726424 |
McAfee | Artemis!15796971D60F |
DeepInstinct | MALICIOUS |
VBA32 | TrojanRansom.LockBit |
Malwarebytes | Ransom.LockBit |
Ikarus | Trojan-Ransom.LockBit |