File Dimension.exe

Size 3.9MB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 ba9cc3654a1f15161f1b51c50e89f5fd
SHA1 9c4561198c12be1f51d9f170792579840efc034a
SHA256 4351152d2d66169a6a96382fda5bcea721294a576903a3388f0fbd674821ed14
SHA512
c3270312028414ee54530c6d6190a7ea83824d18a9e0c3b4f9060b1c5d749826c5c894638dd5ccd2a5376be249e896de3173c09a4ef6ab9eb1cdf8c4c290f2fc
CRC32 0E532037
ssdeep None
PDB Path C:\vmagent_new\bin\joblist\526671\out\Release\cefutil.pdb
Yara
  • anti_dbg - Checks if being debugged
  • screenshot - Take screenshot
  • win_mutex - Create or check mutex
  • win_registry - Affect system registries
  • win_token - Affect system token
  • win_files_operation - Affect private profile
  • win_hook - Affect hook table

Score

This file shows numerous signs of malicious behavior.

The score of this file is 4.0 out of 10.

Please notice: The scoring system is currently still in development and should be considered an alpha feature.


Feedback

Expecting different results? Send us this analysis and we will inspect it. Click here

Information on Execution

Analysis
Category Started Completed Duration Routing Logs
FILE May 30, 2025, 11 p.m. May 30, 2025, 11 p.m. 30 seconds internet Show Analyzer Log
Show Cuckoo Log

Analyzer Log

2025-05-30 22:59:56,015 [analyzer] DEBUG: Starting analyzer from: C:\tmpdyrg_l
2025-05-30 22:59:56,030 [analyzer] DEBUG: Pipe server name: \??\PIPE\aqKheyNmJuTMfcksSQ
2025-05-30 22:59:56,030 [analyzer] DEBUG: Log pipe server name: \??\PIPE\ecbXvqfyZJhSsOZsIYtlNbrFjvnRIlkk
2025-05-30 22:59:56,250 [analyzer] DEBUG: Started auxiliary module Curtain
2025-05-30 22:59:56,250 [analyzer] DEBUG: Started auxiliary module DbgView
2025-05-30 22:59:56,733 [analyzer] DEBUG: Started auxiliary module Disguise
2025-05-30 22:59:56,921 [analyzer] DEBUG: Loaded monitor into process with pid 500
2025-05-30 22:59:56,921 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets
2025-05-30 22:59:56,921 [analyzer] DEBUG: Started auxiliary module Human
2025-05-30 22:59:56,921 [analyzer] DEBUG: Started auxiliary module InstallCertificate
2025-05-30 22:59:56,921 [analyzer] DEBUG: Started auxiliary module Reboot
2025-05-30 22:59:56,983 [analyzer] DEBUG: Started auxiliary module RecentFiles
2025-05-30 22:59:56,983 [analyzer] DEBUG: Started auxiliary module Screenshots
2025-05-30 22:59:57,000 [analyzer] DEBUG: Started auxiliary module Sysmon
2025-05-30 22:59:57,000 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n
2025-05-30 22:59:57,092 [lib.api.process] ERROR: Failed to execute process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\Dimension.exe' with arguments ['bin\\inject-x86.exe', '--app', u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\Dimension.exe', '--only-start', '--curdir', 'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp'] (Error: Command '['bin\\inject-x86.exe', '--app', u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\Dimension.exe', '--only-start', '--curdir', 'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp']' returned non-zero exit status 1)

Cuckoo Log

2025-05-30 23:00:02,684 [cuckoo.core.scheduler] INFO: Task #6518174: acquired machine win7x6430 (label=win7x6430)
2025-05-30 23:00:02,685 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.230 for task #6518174
2025-05-30 23:00:03,040 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 3916818 (interface=vboxnet0, host=192.168.168.230)
2025-05-30 23:00:04,384 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x6430
2025-05-30 23:00:04,920 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x6430 to vmcloak
2025-05-30 23:00:13,632 [cuckoo.core.guest] INFO: Starting analysis #6518174 on guest (id=win7x6430, ip=192.168.168.230)
2025-05-30 23:00:14,637 [cuckoo.core.guest] DEBUG: win7x6430: not ready yet
2025-05-30 23:00:19,664 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x6430, ip=192.168.168.230)
2025-05-30 23:00:19,742 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x6430, ip=192.168.168.230, monitor=latest, size=6660546)
2025-05-30 23:00:21,231 [cuckoo.core.resultserver] DEBUG: Task #6518174: live log analysis.log initialized.
2025-05-30 23:00:22,090 [cuckoo.core.resultserver] DEBUG: Task #6518174 is sending a BSON stream
2025-05-30 23:00:23,348 [cuckoo.core.resultserver] DEBUG: Task #6518174: File upload for 'shots/0001.jpg'
2025-05-30 23:00:23,362 [cuckoo.core.resultserver] DEBUG: Task #6518174 uploaded file length: 133508
2025-05-30 23:00:23,792 [cuckoo.core.guest] WARNING: win7x6430: analysis #6518174 caught an exception
Traceback (most recent call last):
  File "C:/tmpdyrg_l/analyzer.py", line 824, in <module>
    success = analyzer.run()
  File "C:/tmpdyrg_l/analyzer.py", line 673, in run
    pids = self.package.start(self.target)
  File "C:\tmpdyrg_l\modules\packages\exe.py", line 34, in start
    return self.execute(path, args=shlex.split(args))
  File "C:\tmpdyrg_l\lib\common\abstracts.py", line 205, in execute
    "Unable to execute the initial process, analysis aborted."
CuckooPackageError: Unable to execute the initial process, analysis aborted.

2025-05-30 23:00:23,806 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks
2025-05-30 23:00:23,831 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer
2025-05-30 23:00:24,728 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x6430 to path /srv/cuckoo/cwd/storage/analyses/6518174/memory.dmp
2025-05-30 23:00:24,730 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x6430
2025-05-30 23:00:32,357 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.230 for task #6518174
2025-05-30 23:00:32,358 [cuckoo.core.resultserver] DEBUG: Cancel <Context for LOG> for task 6518174
2025-05-30 23:00:32,646 [cuckoo.core.scheduler] DEBUG: Released database task #6518174
2025-05-30 23:00:32,663 [cuckoo.core.scheduler] INFO: Task #6518174: analysis procedure completed

Signatures

Yara rules detected for file (7 events)
description Checks if being debugged rule anti_dbg
description Take screenshot rule screenshot
description Create or check mutex rule win_mutex
description Affect system registries rule win_registry
description Affect system token rule win_token
description Affect private profile rule win_files_operation
description Affect hook table rule win_hook
This executable has a PDB path (1 event)
pdb_path C:\vmagent_new\bin\joblist\526671\out\Release\cefutil.pdb
The file contains an unknown PE resource name possibly indicative of a packer (1 event)
resource name FILE
File has been identified by 4 AntiVirus engine on IRMA as malicious (4 events)
G Data Antivirus (Windows) Virus: Gen:Variant.Babar.658741 (Engine A)
eScan Antivirus (Linux) Gen:Variant.Babar.658741(DB)
Bitdefender Antivirus (Linux) Gen:Variant.Babar.658741
Emsisoft Commandline Scanner (Windows) Gen:Variant.Babar.658741 (B)
Screenshots
Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action VT Location
No hosts contacted.
Cuckoo

We're processing your submission... This could take a few seconds.