Size | 2.2MB |
---|---|
Type | PE32+ executable (DLL) (console) x86-64, for MS Windows |
MD5 | c20e07c348317a53216e87cb612c1325 |
SHA1 | 1e5b039ed82684333e986a1059ce31e965d57ccd |
SHA256 | 5dc9629dfdaaad318c2eb31c40275ff1a09e944b9b5559ac2ba9f60bd3c30512 |
SHA512 |
16fbde5159c2caf864d1bbed5fca14a8250870ee7c34aab6ef9ad331805e8f2f54bcec6ff84aaba59535c8116660fb5249faa5d72850effbc2937650458cb0f9
|
CRC32 | 4D0336D4 |
ssdeep | None |
PDB Path | C:\Users\Windows\Desktop\dev\Cookies\out\Release\kernel64.pdb |
Yara |
|
This file is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | May 19, 2025, 3:27 a.m. | May 19, 2025, 3:33 a.m. | 392 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-05-18 15:01:42,015 [analyzer] DEBUG: Starting analyzer from: C:\tmp4nivwu 2025-05-18 15:01:42,015 [analyzer] DEBUG: Pipe server name: \??\PIPE\SSmaLaZgZbbasGQwtKylUJJCFtZa 2025-05-18 15:01:42,015 [analyzer] DEBUG: Log pipe server name: \??\PIPE\TxQRPckdzgDMEHNMByPRmVdNpNqVj 2025-05-18 15:01:42,280 [analyzer] DEBUG: Started auxiliary module Curtain 2025-05-18 15:01:42,280 [analyzer] DEBUG: Started auxiliary module DbgView 2025-05-18 15:01:42,765 [analyzer] DEBUG: Started auxiliary module Disguise 2025-05-18 15:01:43,015 [analyzer] DEBUG: Loaded monitor into process with pid 508 2025-05-18 15:01:43,015 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-05-18 15:01:43,015 [analyzer] DEBUG: Started auxiliary module Human 2025-05-18 15:01:43,015 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-05-18 15:01:43,015 [analyzer] DEBUG: Started auxiliary module Reboot 2025-05-18 15:01:43,092 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-05-18 15:01:43,092 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-05-18 15:01:43,092 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-05-18 15:01:43,092 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-05-18 15:01:43,171 [lib.api.process] INFO: Successfully executed process from path 'C:\\Windows\\System32\\rundll32.exe' with arguments [u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\5dc9629dfdaaad318c2eb31c40275ff1a09e944b9b5559ac2ba9f60bd3c30512.dll,DllMain'] and pid 2888 2025-05-18 15:01:43,375 [analyzer] DEBUG: Loaded monitor into process with pid 2888 2025-05-18 15:01:43,453 [analyzer] CRITICAL: Error creating function stub for advapi32!ControlService. 2025-05-18 15:01:43,453 [analyzer] CRITICAL: Unable to change memory protection of advapi32!DeleteService at 0x09f498 6 to RWX (error code 0xc0000045)! 2025-05-18 15:01:43,453 [analyzer] CRITICAL: Unable to change memory protection of advapi32!OpenSCManagerA at 0x09f336 5 to RWX (error code 0xc0000045)! 2025-05-18 15:01:43,453 [analyzer] CRITICAL: Unable to change memory protection of advapi32!OpenSCManagerW at 0x09f4a8 6 to RWX (error code 0xc0000045)! 2025-05-18 15:01:43,467 [analyzer] CRITICAL: Error creating function stub for advapi32!OpenServiceA. 2025-05-18 15:01:43,467 [analyzer] CRITICAL: Unable to change memory protection of advapi32!OpenServiceW at 0x09f488 5 to RWX (error code 0xc0000045)! 2025-05-18 15:01:43,467 [analyzer] CRITICAL: Unable to change memory protection of advapi32!RegCloseKey at 0x09f6b4 5 to RWX (error code 0xc0000045)! 2025-05-18 15:01:43,467 [analyzer] CRITICAL: Unable to change memory protection of advapi32!RegDeleteValueA at 0x09f5ee 6 to RWX (error code 0xc0000045)! 2025-05-18 15:01:43,467 [analyzer] CRITICAL: Unable to change memory protection of advapi32!RegDeleteValueW at 0x09f5dc 10 to RWX (error code 0xc0000045)! 2025-05-18 15:01:43,483 [analyzer] CRITICAL: Unable to change memory protection of advapi32!StartServiceCtrlDispatcherW at 0x09f276 6 to RWX (error code 0xc0000045)! 2025-05-18 15:01:43,483 [analyzer] CRITICAL: Error creating function stub for advapi32!StartServiceW. 2025-05-18 15:01:43,500 [analyzer] CRITICAL: Error creating function stub for advapi32!ControlService. 2025-05-18 15:01:43,500 [analyzer] CRITICAL: Unable to change memory protection of advapi32!DeleteService at 0x09f498 6 to RWX (error code 0xc0000045)! 2025-05-18 15:01:43,500 [analyzer] CRITICAL: Unable to change memory protection of advapi32!OpenSCManagerA at 0x09f336 5 to RWX (error code 0xc0000045)! 2025-05-18 15:01:43,500 [analyzer] CRITICAL: Unable to change memory protection of advapi32!OpenSCManagerW at 0x09f4a8 6 to RWX (error code 0xc0000045)! 2025-05-18 15:01:43,500 [analyzer] CRITICAL: Error creating function stub for advapi32!OpenServiceA. 2025-05-18 15:01:43,500 [analyzer] CRITICAL: Unable to change memory protection of advapi32!OpenServiceW at 0x09f488 5 to RWX (error code 0xc0000045)! 2025-05-18 15:01:43,500 [analyzer] CRITICAL: Unable to change memory protection of advapi32!RegCloseKey at 0x09f6b4 5 to RWX (error code 0xc0000045)! 2025-05-18 15:01:43,500 [analyzer] CRITICAL: Unable to change memory protection of advapi32!RegDeleteValueA at 0x09f5ee 6 to RWX (error code 0xc0000045)! 2025-05-18 15:01:43,500 [analyzer] CRITICAL: Unable to change memory protection of advapi32!RegDeleteValueW at 0x09f5dc 10 to RWX (error code 0xc0000045)! 2025-05-18 15:01:43,500 [analyzer] CRITICAL: Unable to change memory protection of advapi32!StartServiceCtrlDispatcherW at 0x09f276 6 to RWX (error code 0xc0000045)! 2025-05-18 15:01:43,500 [analyzer] CRITICAL: Error creating function stub for advapi32!StartServiceW. 2025-05-19 02:30:23,733 [analyzer] INFO: Analysis timeout hit, terminating analysis. 2025-05-19 02:30:24,170 [analyzer] INFO: Terminating remaining processes before shutdown. 2025-05-19 02:30:24,170 [lib.api.process] INFO: Successfully terminated process with pid 2888. 2025-05-19 02:30:24,170 [analyzer] INFO: Analysis completed.
2025-05-19 03:27:03,699 [cuckoo.core.scheduler] INFO: Task #6487624: acquired machine win7x6424 (label=win7x6424) 2025-05-19 03:27:03,700 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.224 for task #6487624 2025-05-19 03:27:04,149 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 2480094 (interface=vboxnet0, host=192.168.168.224) 2025-05-19 03:27:06,465 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x6424 2025-05-19 03:27:07,059 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x6424 to vmcloak 2025-05-19 03:29:46,167 [cuckoo.core.guest] INFO: Starting analysis #6487624 on guest (id=win7x6424, ip=192.168.168.224) 2025-05-19 03:29:47,172 [cuckoo.core.guest] DEBUG: win7x6424: not ready yet 2025-05-19 03:29:52,208 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x6424, ip=192.168.168.224) 2025-05-19 03:29:52,279 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x6424, ip=192.168.168.224, monitor=latest, size=6660546) 2025-05-19 03:29:53,526 [cuckoo.core.resultserver] DEBUG: Task #6487624: live log analysis.log initialized. 2025-05-19 03:29:54,582 [cuckoo.core.resultserver] DEBUG: Task #6487624 is sending a BSON stream 2025-05-19 03:29:54,775 [cuckoo.core.resultserver] DEBUG: Task #6487624 is sending a BSON stream 2025-05-19 03:29:55,737 [cuckoo.core.resultserver] DEBUG: Task #6487624: File upload for 'shots/0001.jpg' 2025-05-19 03:29:55,747 [cuckoo.core.resultserver] DEBUG: Task #6487624 uploaded file length: 137907 2025-05-19 03:30:08,260 [cuckoo.core.guest] DEBUG: win7x6424: analysis #6487624 still processing 2025-05-19 03:30:23,612 [cuckoo.core.guest] DEBUG: win7x6424: analysis #6487624 still processing 2025-05-19 03:30:23,878 [cuckoo.core.resultserver] DEBUG: Task #6487624: File upload for 'curtain/1747614623.86.curtain.log' 2025-05-19 03:30:23,883 [cuckoo.core.resultserver] DEBUG: Task #6487624 uploaded file length: 36 2025-05-19 03:30:24,142 [cuckoo.core.resultserver] DEBUG: Task #6487624: File upload for 'sysmon/1747614624.05.sysmon.xml' 2025-05-19 03:30:24,183 [cuckoo.core.resultserver] DEBUG: Task #6487624 uploaded file length: 1827132 2025-05-19 03:30:24,483 [cuckoo.core.resultserver] DEBUG: Task #6487624: File upload for 'shots/0002.jpg' 2025-05-19 03:30:24,499 [cuckoo.core.resultserver] DEBUG: Task #6487624 uploaded file length: 133470 2025-05-19 03:30:24,511 [cuckoo.core.resultserver] DEBUG: Task #6487624 had connection reset for <Context for LOG> 2025-05-19 03:30:26,626 [cuckoo.core.guest] INFO: win7x6424: analysis completed successfully 2025-05-19 03:30:26,638 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-05-19 03:30:26,663 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-05-19 03:30:27,964 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x6424 to path /srv/cuckoo/cwd/storage/analyses/6487624/memory.dmp 2025-05-19 03:30:27,983 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x6424 2025-05-19 03:33:35,131 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.224 for task #6487624 2025-05-19 03:33:35,649 [cuckoo.core.scheduler] DEBUG: Released database task #6487624 2025-05-19 03:33:35,665 [cuckoo.core.scheduler] INFO: Task #6487624: analysis procedure completed
description | Detects maldoc With exploit for CVE_2017_11882 | rule | Maldoc_CVE_2017_11882 | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Communications over RAW socket | rule | network_tcp_socket | ||||||
description | Run a keylogger | rule | keylogger | ||||||
description | Affect private profile | rule | win_files_operation |
pdb_path | C:\Users\Windows\Desktop\dev\Cookies\out\Release\kernel64.pdb |
section | {u'size_of_data': u'0x000f9c00', u'virtual_address': u'0x00138000', u'entropy': 6.836153250672234, u'name': u'.data', u'virtual_size': u'0x00101e88'} | entropy | 6.83615325067 | description | A section with a high entropy has been found | |||||||||
entropy | 0.436816790555 | description | Overall entropy of this PE file is high |
Cynet | Malicious (score: 100) |
ESET-NOD32 | a variant of Win64/GenKryptik.HIZX |
ClamAV | Win.Malware.Lazy-10033364-0 |
Detected | |
Ikarus | Trojan.Win64.Krypt |
G Data Antivirus (Windows) | Virus: Gen:Variant.Tedy.774919 (Engine A) |
C4S ClamAV (Linux) | Win.Malware.Lazy-10033364-0 |
eScan Antivirus (Linux) | Gen:Variant.Tedy.774919(DB) |
ESET Security (Windows) | a variant of Win64/GenKryptik.HIZX trojan |
ClamAV (Linux) | Win.Malware.Lazy-10033364-0 |
Bitdefender Antivirus (Linux) | Gen:Variant.Tedy.774919 |
Emsisoft Commandline Scanner (Windows) | Gen:Variant.Tedy.774919 (B) |