Size | 1.0MB |
---|---|
Type | PE32 executable (GUI) Intel 80386, for MS Windows |
MD5 | d7bb7ff28d2fa2fe9eb1f7110f855e95 |
SHA1 | dcecc6484d9f4abdd8eef280b7e07486630c564e |
SHA256 | 9fea97e4b6379e4a4ac9c9a027e2fb8145d381594cf3f116bacb6a0f3d8bc57a |
SHA512 |
2bfbab99343033c5c7981c1aa84f0447eb10449b5d08db620899cbe4a6345acfef7cb4de2b846bf945abd9ed9d52bfa89937795a5ee19da6692dd6292be7b126
|
CRC32 | 1FB25E1A |
ssdeep | None |
Yara |
|
This file is very suspicious, with a score of 9.0 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | June 25, 2025, 12:49 p.m. | June 25, 2025, 12:55 p.m. | 365 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-06-21 12:41:38,015 [analyzer] DEBUG: Starting analyzer from: C:\tmpblqbwr 2025-06-21 12:41:38,015 [analyzer] DEBUG: Pipe server name: \??\PIPE\NDCvYfOTCjgZeBUefJTNJQlVLnebMGws 2025-06-21 12:41:38,015 [analyzer] DEBUG: Log pipe server name: \??\PIPE\AFVZCzhQkHijGVhUM 2025-06-21 12:41:38,015 [analyzer] DEBUG: No analysis package specified, trying to detect it automagically. 2025-06-21 12:41:38,030 [analyzer] INFO: Automatically selected analysis package "exe" 2025-06-21 12:41:38,437 [analyzer] DEBUG: Started auxiliary module Curtain 2025-06-21 12:41:38,437 [analyzer] DEBUG: Started auxiliary module DbgView 2025-06-21 12:41:39,030 [analyzer] DEBUG: Started auxiliary module Disguise 2025-06-21 12:41:39,250 [analyzer] DEBUG: Loaded monitor into process with pid 504 2025-06-21 12:41:39,250 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-06-21 12:41:39,250 [analyzer] DEBUG: Started auxiliary module Human 2025-06-21 12:41:39,250 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-06-21 12:41:39,265 [analyzer] DEBUG: Started auxiliary module Reboot 2025-06-21 12:41:39,375 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-06-21 12:41:39,375 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-06-21 12:41:39,375 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-06-21 12:41:39,390 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-06-21 12:41:39,483 [lib.api.process] ERROR: Failed to execute process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\9fea97e4b6379e4a_scegli_nome_allegato.exe' with arguments ['bin\\inject-x86.exe', '--app', u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\9fea97e4b6379e4a_scegli_nome_allegato.exe', '--only-start', '--curdir', 'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp'] (Error: Command '['bin\\inject-x86.exe', '--app', u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\9fea97e4b6379e4a_scegli_nome_allegato.exe', '--only-start', '--curdir', 'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp']' returned non-zero exit status 1)
2025-06-25 12:49:59,463 [cuckoo.core.scheduler] INFO: Task #6588614: acquired machine win7x6418 (label=win7x6418) 2025-06-25 12:49:59,463 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.218 for task #6588614 2025-06-25 12:49:59,811 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 3989227 (interface=vboxnet0, host=192.168.168.218) 2025-06-25 12:50:02,444 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x6418 2025-06-25 12:50:02,990 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x6418 to vmcloak 2025-06-25 12:53:15,133 [cuckoo.core.guest] INFO: Starting analysis #6588614 on guest (id=win7x6418, ip=192.168.168.218) 2025-06-25 12:53:16,140 [cuckoo.core.guest] DEBUG: win7x6418: not ready yet 2025-06-25 12:53:21,171 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x6418, ip=192.168.168.218) 2025-06-25 12:53:21,592 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x6418, ip=192.168.168.218, monitor=latest, size=6660546) 2025-06-25 12:53:23,327 [cuckoo.core.resultserver] DEBUG: Task #6588614: live log analysis.log initialized. 2025-06-25 12:53:24,528 [cuckoo.core.resultserver] DEBUG: Task #6588614 is sending a BSON stream 2025-06-25 12:53:25,841 [cuckoo.core.resultserver] DEBUG: Task #6588614: File upload for 'shots/0001.jpg' 2025-06-25 12:53:25,889 [cuckoo.core.resultserver] DEBUG: Task #6588614 uploaded file length: 133497 2025-06-25 12:53:25,941 [cuckoo.core.guest] WARNING: win7x6418: analysis #6588614 caught an exception Traceback (most recent call last): File "C:/tmpblqbwr/analyzer.py", line 824, in <module> success = analyzer.run() File "C:/tmpblqbwr/analyzer.py", line 673, in run pids = self.package.start(self.target) File "C:\tmpblqbwr\modules\packages\exe.py", line 34, in start return self.execute(path, args=shlex.split(args)) File "C:\tmpblqbwr\lib\common\abstracts.py", line 205, in execute "Unable to execute the initial process, analysis aborted." CuckooPackageError: Unable to execute the initial process, analysis aborted. 2025-06-25 12:53:26,131 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-06-25 12:53:26,192 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-06-25 12:53:27,045 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x6418 to path /srv/cuckoo/cwd/storage/analyses/6588614/memory.dmp 2025-06-25 12:53:27,060 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x6418 2025-06-25 12:55:50,396 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.218 for task #6588614 2025-06-25 12:55:50,400 [cuckoo.core.resultserver] DEBUG: Cancel <Context for LOG> for task 6588614 2025-06-25 12:55:50,803 [cuckoo.core.scheduler] DEBUG: Released database task #6588614 2025-06-25 12:55:50,838 [cuckoo.core.scheduler] INFO: Task #6588614: analysis procedure completed
description | Take screenshot | rule | screenshot | ||||||
description | Run a keylogger | rule | keylogger | ||||||
description | Affect system registries | rule | win_registry | ||||||
description | Affect private profile | rule | win_files_operation | ||||||
description | Affect hook table | rule | win_hook |
section | .itext |
packer | BobSoft Mini Delphi -> BoB / BobSoft |
Cybereason | malicious.84d9f4 |
APEX | Malicious |
Zillya | Adware.BrowseFox.Win32.170659 |
Sophos | Generic ML PUA (PUA) |
Ikarus | Trojan.Patched |
SentinelOne | Static AI - Suspicious PE |
CrowdStrike | win/malicious_confidence_60% (W) |
MaxSecure | Trojan.Malware.300983.susgen |