Size | 73.5KB |
---|---|
Type | PE32 executable (GUI) Intel 80386, for MS Windows |
MD5 | 77cfc2a42d1c861193961037df405a4d |
SHA1 | 26c55615ab3a01f2feb2a74e413ba90a488dd860 |
SHA256 | 53997ac8a46f745dcdecab9f423a6ea0ffd9cd1e657f47ead8df7cb5c78a7e5e |
SHA512 |
ee25ad6dfd3a273aba3888d281556ec6e99abff5f29dc180149d8dba16757b6c0cf9ace7678eb202e08dfca8ebe1447998ead9eb66c77f7297f4e5a6d037d33f
|
CRC32 | BB9AD748 |
ssdeep | None |
Yara |
|
This file is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | June 9, 2025, 8:58 p.m. | June 9, 2025, 9:08 p.m. | 586 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-06-09 14:03:35,015 [analyzer] DEBUG: Starting analyzer from: C:\tmpzepe2z 2025-06-09 14:03:35,030 [analyzer] DEBUG: Pipe server name: \??\PIPE\WfshvPcZPqIitDKJwVIQfCtBs 2025-06-09 14:03:35,030 [analyzer] DEBUG: Log pipe server name: \??\PIPE\JxgqUXMjYtXrEjqVhqMw 2025-06-09 14:03:35,030 [analyzer] DEBUG: No analysis package specified, trying to detect it automagically. 2025-06-09 14:03:35,030 [analyzer] INFO: Automatically selected analysis package "exe" 2025-06-09 14:03:35,328 [analyzer] DEBUG: Started auxiliary module Curtain 2025-06-09 14:03:35,328 [analyzer] DEBUG: Started auxiliary module DbgView 2025-06-09 14:03:35,967 [analyzer] DEBUG: Started auxiliary module Disguise 2025-06-09 14:03:36,171 [analyzer] DEBUG: Loaded monitor into process with pid 504 2025-06-09 14:03:36,171 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-06-09 14:03:36,171 [analyzer] DEBUG: Started auxiliary module Human 2025-06-09 14:03:36,171 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-06-09 14:03:36,187 [analyzer] DEBUG: Started auxiliary module Reboot 2025-06-09 14:03:36,265 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-06-09 14:03:36,265 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-06-09 14:03:36,280 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-06-09 14:03:36,280 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-06-09 14:03:36,421 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\53997ac8a46f745d_fohbyc.exe' with arguments '' and pid 1576 2025-06-09 14:03:36,640 [analyzer] DEBUG: Loaded monitor into process with pid 1576 2025-06-09 14:03:36,953 [analyzer] INFO: Added new file to list with pid 1576 and path C:\Users\Administrator\AppData\Roaming\Microsoft\fyamff.exe 2025-06-09 14:03:38,015 [analyzer] INFO: Injected into process with pid 3028 and name u'nslookup.exe' 2025-06-09 14:03:38,250 [analyzer] DEBUG: Loaded monitor into process with pid 3028 2025-06-09 14:03:41,421 [analyzer] INFO: Process with pid 3028 has terminated 2025-06-09 20:05:58,394 [analyzer] INFO: Analysis timeout hit, terminating analysis. 2025-06-09 20:05:59,551 [analyzer] INFO: Terminating remaining processes before shutdown. 2025-06-09 20:05:59,551 [lib.api.process] INFO: Successfully terminated process with pid 1576. 2025-06-09 20:05:59,565 [analyzer] INFO: Analysis completed.
2025-06-09 20:59:05,360 [cuckoo.core.scheduler] INFO: Task #6549936: acquired machine win7x6417 (label=win7x6417) 2025-06-09 20:59:05,361 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.217 for task #6549936 2025-06-09 20:59:06,663 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 635846 (interface=vboxnet0, host=192.168.168.217) 2025-06-09 20:59:06,847 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x6417 2025-06-09 20:59:09,583 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x6417 to vmcloak 2025-06-09 21:02:26,922 [cuckoo.core.guest] INFO: Starting analysis #6549936 on guest (id=win7x6417, ip=192.168.168.217) 2025-06-09 21:02:28,286 [cuckoo.core.guest] DEBUG: win7x6417: not ready yet 2025-06-09 21:02:35,095 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x6417, ip=192.168.168.217) 2025-06-09 21:02:36,555 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x6417, ip=192.168.168.217, monitor=latest, size=6660546) 2025-06-09 21:02:37,955 [cuckoo.core.resultserver] DEBUG: Task #6549936: live log analysis.log initialized. 2025-06-09 21:02:39,077 [cuckoo.core.resultserver] DEBUG: Task #6549936 is sending a BSON stream 2025-06-09 21:02:39,505 [cuckoo.core.resultserver] DEBUG: Task #6549936 is sending a BSON stream 2025-06-09 21:02:40,346 [cuckoo.core.resultserver] DEBUG: Task #6549936: File upload for 'shots/0001.jpg' 2025-06-09 21:02:40,359 [cuckoo.core.resultserver] DEBUG: Task #6549936 uploaded file length: 133449 2025-06-09 21:02:41,140 [cuckoo.core.resultserver] DEBUG: Task #6549936 is sending a BSON stream 2025-06-09 21:02:54,035 [cuckoo.core.guest] DEBUG: win7x6417: analysis #6549936 still processing 2025-06-09 21:03:12,034 [cuckoo.core.guest] DEBUG: win7x6417: analysis #6549936 still processing 2025-06-09 21:03:27,657 [cuckoo.core.guest] DEBUG: win7x6417: analysis #6549936 still processing 2025-06-09 21:03:43,889 [cuckoo.core.guest] DEBUG: win7x6417: analysis #6549936 still processing 2025-06-09 21:03:58,968 [cuckoo.core.guest] DEBUG: win7x6417: analysis #6549936 still processing 2025-06-09 21:04:16,720 [cuckoo.core.guest] DEBUG: win7x6417: analysis #6549936 still processing 2025-06-09 21:04:32,304 [cuckoo.core.guest] DEBUG: win7x6417: analysis #6549936 still processing 2025-06-09 21:04:49,013 [cuckoo.core.guest] DEBUG: win7x6417: analysis #6549936 still processing 2025-06-09 21:05:06,289 [cuckoo.core.guest] DEBUG: win7x6417: analysis #6549936 still processing 2025-06-09 21:05:22,567 [cuckoo.core.guest] DEBUG: win7x6417: analysis #6549936 still processing 2025-06-09 21:05:38,102 [cuckoo.core.guest] DEBUG: win7x6417: analysis #6549936 still processing 2025-06-09 21:05:54,773 [cuckoo.core.guest] DEBUG: win7x6417: analysis #6549936 still processing 2025-06-09 21:05:58,578 [cuckoo.core.resultserver] DEBUG: Task #6549936: File upload for 'curtain/1749492358.57.curtain.log' 2025-06-09 21:05:58,582 [cuckoo.core.resultserver] DEBUG: Task #6549936 uploaded file length: 36 2025-06-09 21:05:59,470 [cuckoo.core.resultserver] DEBUG: Task #6549936: File upload for 'sysmon/1749492359.47.sysmon.xml' 2025-06-09 21:05:59,556 [cuckoo.core.resultserver] DEBUG: Task #6549936 uploaded file length: 12825224 2025-06-09 21:05:59,593 [cuckoo.core.resultserver] DEBUG: Task #6549936 had connection reset for <Context for LOG> 2025-06-09 21:05:59,596 [cuckoo.core.resultserver] DEBUG: Task #6549936: File upload for 'files/3e7ab248af0399a4_fyamff.exe' 2025-06-09 21:05:59,612 [cuckoo.core.resultserver] DEBUG: Task #6549936 uploaded file length: 75264 2025-06-09 21:06:00,841 [cuckoo.core.guest] INFO: win7x6417: analysis completed successfully 2025-06-09 21:06:00,854 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-06-09 21:06:00,878 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-06-09 21:06:04,137 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x6417 to path /srv/cuckoo/cwd/storage/analyses/6549936/memory.dmp 2025-06-09 21:06:04,147 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x6417 2025-06-09 21:08:43,286 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.217 for task #6549936 2025-06-09 21:08:44,807 [cuckoo.core.scheduler] DEBUG: Released database task #6549936 2025-06-09 21:08:45,204 [cuckoo.core.scheduler] INFO: Task #6549936: analysis procedure completed
description | Gandcrab Payload | rule | Gandcrab | ||||||
description | This rule detects GandCrab ransomware once it is in an unpacked state. | rule | CrowdStrike_CSIT_18151_01 | ||||||
description | Communications over HTTP | rule | network_http | ||||||
description | Create or check mutex | rule | win_mutex | ||||||
description | Affect system registries | rule | win_registry | ||||||
description | Affect private profile | rule | win_files_operation |
file | C:\Users\Administrator\AppData\Roaming\Microsoft\fyamff.exe |
file | C:\Users\Administrator\AppData\Roaming\Microsoft\fyamff.exe |
cmdline | nslookup nomoreransom.bit dns1.soprodns.ru |
cmdline | nslookup emsisoft.bit dns1.soprodns.ru |
snort | ET INFO External IP Lookup Domain in DNS Lookup (whatismyipaddress .com) |
snort | ET INFO DNS Query Domain .bit |
suricata | ET INFO External IP Lookup Domain in DNS Lookup (whatismyipaddress .com) |
suricata | ETPRO MALWARE GandCrab DNS Lookup 1 |
suricata | ET INFO DNS Query Domain .bit |
suricata | ETPRO MALWARE GandCrab DNS Lookup 3 |
registry | HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString |
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce\apulxugwked | reg_value | "C:\Users\Administrator\AppData\Roaming\Microsoft\fyamff.exe" |
G Data Antivirus (Windows) | Virus: Generic.Ransom.GandCrab.C3AA3758 (Engine A), Win32.Trojan-Ransom.GandCrab.D (Engine B) |
Avast Core Security (Linux) | Win32:MalwareX-gen [Ransom] |
C4S ClamAV (Linux) | Win.Ransomware.Gandcrab-6667060-0 |
Trend Micro SProtect (Linux) | Ransom_GANDCRAB.SMALY-4 |
Trellix (Linux) | GenericRXDY-EJ |
WithSecure (Linux) | Trojan.TR/FileCoder.oytet |
eScan Antivirus (Linux) | Generic.Ransom.GandCrab.C3AA3758(DB) |
ESET Security (Windows) | Win32/Filecoder.GandCrab.B trojan |
Sophos Anti-Virus (Linux) | Troj/GandCrab-A |
DrWeb Antivirus (Linux) | Trojan.Encoder.27154 |
ClamAV (Linux) | Win.Ransomware.Gandcrab-6667060-0 |
Bitdefender Antivirus (Linux) | Generic.Ransom.GandCrab.C3AA3758 |
Kaspersky Standard (Windows) | Trojan-Ransom.Win32.GandCrypt.jes |
Emsisoft Commandline Scanner (Windows) | Trojan.Agent (A) |