Size | 2.1MB |
---|---|
Type | PE32 executable (GUI) Intel 80386, for MS Windows |
MD5 | 239aada2f73b0f4f35003b1e8c8a9086 |
SHA1 | 35420156f97cf8e9137e67184b743d12594a72b9 |
SHA256 | 253177e5117a18a8f99af115e17dc731baeda94a3db1179d27d7655451d3a9a3 |
SHA512 |
2340093c5e3eefcb6f7f645b298ab91fe14c4399bc61a9b7157942a2324a5d288901485d0633ac92cb7b3dc4e10ed8c0796cd09750d89058b4befd17fdf88180
|
CRC32 | 7A655DFE |
ssdeep | None |
PDB Path | D:\BranchAI\win\Release\stubs\x86\ExternalUi.pdb |
Yara |
|
This file is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | June 30, 2025, 5:42 p.m. | June 30, 2025, 5:44 p.m. | 110 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-06-23 02:28:49,015 [analyzer] DEBUG: Starting analyzer from: C:\tmp4hzt0l 2025-06-23 02:28:49,015 [analyzer] DEBUG: Pipe server name: \??\PIPE\bFgUTYmckktYXgEttIiDbfLLnF 2025-06-23 02:28:49,015 [analyzer] DEBUG: Log pipe server name: \??\PIPE\imYcHOTHPGiohQSRMxTAVrBzExAl 2025-06-23 02:28:49,483 [analyzer] DEBUG: Started auxiliary module Curtain 2025-06-23 02:28:49,483 [analyzer] DEBUG: Started auxiliary module DbgView 2025-06-23 02:28:49,953 [analyzer] DEBUG: Started auxiliary module Disguise 2025-06-23 02:28:50,155 [analyzer] DEBUG: Loaded monitor into process with pid 504 2025-06-23 02:28:50,155 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-06-23 02:28:50,155 [analyzer] DEBUG: Started auxiliary module Human 2025-06-23 02:28:50,155 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-06-23 02:28:50,171 [analyzer] DEBUG: Started auxiliary module Reboot 2025-06-23 02:28:50,280 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-06-23 02:28:50,280 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-06-23 02:28:50,296 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-06-23 02:28:50,296 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-06-23 02:28:50,453 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\253177e5117a18a8f99af115e17dc731baeda94a3db1179d27d7655451d3a9a3.exe' with arguments '' and pid 1392 2025-06-23 02:28:50,687 [analyzer] DEBUG: Loaded monitor into process with pid 1392 2025-06-23 02:28:51,092 [analyzer] INFO: Added new file to list with pid 1392 and path C:\Users\Administrator\AppData\Roaming\Flexera Software LLC\InstallShield Update Service Scheduler 19.0.0.1\install\decoder.dll 2025-06-23 02:28:51,250 [analyzer] INFO: Added new file to list with pid 1392 and path C:\Users\Administrator\AppData\Roaming\Flexera Software LLC\InstallShield Update Service Scheduler 19.0.0.1\install\24EADB7\InstallShield Update Service Scheduler.msi 2025-06-23 02:29:19,515 [analyzer] INFO: Analysis timeout hit, terminating analysis. 2025-06-23 02:29:19,921 [analyzer] INFO: Terminating remaining processes before shutdown. 2025-06-23 02:29:19,937 [lib.api.process] INFO: Successfully terminated process with pid 1392. 2025-06-23 02:29:19,953 [analyzer] INFO: Analysis completed.
2025-06-30 17:42:10,266 [cuckoo.core.scheduler] INFO: Task #6620380: acquired machine win7x6420 (label=win7x6420) 2025-06-30 17:42:10,267 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.220 for task #6620380 2025-06-30 17:42:10,565 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 3202012 (interface=vboxnet0, host=192.168.168.220) 2025-06-30 17:42:13,561 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x6420 2025-06-30 17:42:14,078 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x6420 to vmcloak 2025-06-30 17:42:41,113 [cuckoo.core.guest] INFO: Starting analysis #6620380 on guest (id=win7x6420, ip=192.168.168.220) 2025-06-30 17:42:42,118 [cuckoo.core.guest] DEBUG: win7x6420: not ready yet 2025-06-30 17:42:47,145 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x6420, ip=192.168.168.220) 2025-06-30 17:42:47,228 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x6420, ip=192.168.168.220, monitor=latest, size=6660546) 2025-06-30 17:42:48,932 [cuckoo.core.resultserver] DEBUG: Task #6620380: live log analysis.log initialized. 2025-06-30 17:42:50,039 [cuckoo.core.resultserver] DEBUG: Task #6620380 is sending a BSON stream 2025-06-30 17:42:50,597 [cuckoo.core.resultserver] DEBUG: Task #6620380 is sending a BSON stream 2025-06-30 17:42:51,336 [cuckoo.core.resultserver] DEBUG: Task #6620380: File upload for 'shots/0001.jpg' 2025-06-30 17:42:51,350 [cuckoo.core.resultserver] DEBUG: Task #6620380 uploaded file length: 133747 2025-06-30 17:42:52,465 [cuckoo.core.resultserver] DEBUG: Task #6620380: File upload for 'shots/0002.jpg' 2025-06-30 17:42:52,480 [cuckoo.core.resultserver] DEBUG: Task #6620380 uploaded file length: 135990 2025-06-30 17:43:03,560 [cuckoo.core.guest] DEBUG: win7x6420: analysis #6620380 still processing 2025-06-30 17:43:18,797 [cuckoo.core.guest] DEBUG: win7x6420: analysis #6620380 still processing 2025-06-30 17:43:19,705 [cuckoo.core.resultserver] DEBUG: Task #6620380: File upload for 'curtain/1750638559.75.curtain.log' 2025-06-30 17:43:19,712 [cuckoo.core.resultserver] DEBUG: Task #6620380 uploaded file length: 36 2025-06-30 17:43:19,876 [cuckoo.core.resultserver] DEBUG: Task #6620380: File upload for 'sysmon/1750638559.92.sysmon.xml' 2025-06-30 17:43:19,884 [cuckoo.core.resultserver] DEBUG: Task #6620380 uploaded file length: 797558 2025-06-30 17:43:19,890 [cuckoo.core.resultserver] DEBUG: Task #6620380: File upload for 'files/97a89c7bccf2d910_decoder.dll' 2025-06-30 17:43:19,895 [cuckoo.core.resultserver] DEBUG: Task #6620380 uploaded file length: 128664 2025-06-30 17:43:19,902 [cuckoo.core.resultserver] DEBUG: Task #6620380: File upload for 'files/e511a959081836c3_installshield update service scheduler.msi' 2025-06-30 17:43:19,911 [cuckoo.core.resultserver] DEBUG: Task #6620380 uploaded file length: 867328 2025-06-30 17:43:20,429 [cuckoo.core.resultserver] DEBUG: Task #6620380: File upload for 'shots/0003.jpg' 2025-06-30 17:43:20,444 [cuckoo.core.resultserver] DEBUG: Task #6620380 uploaded file length: 133479 2025-06-30 17:43:20,460 [cuckoo.core.resultserver] DEBUG: Task #6620380 had connection reset for <Context for LOG> 2025-06-30 17:43:21,811 [cuckoo.core.guest] INFO: win7x6420: analysis completed successfully 2025-06-30 17:43:21,825 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-06-30 17:43:21,861 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-06-30 17:43:22,626 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x6420 to path /srv/cuckoo/cwd/storage/analyses/6620380/memory.dmp 2025-06-30 17:43:22,628 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x6420 2025-06-30 17:44:00,434 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.220 for task #6620380 2025-06-30 17:44:00,915 [cuckoo.core.scheduler] DEBUG: Released database task #6620380 2025-06-30 17:44:00,934 [cuckoo.core.scheduler] INFO: Task #6620380: analysis procedure completed
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Anti-Sandbox checks for ThreatExpert | rule | antisb_threatExpert | ||||||
description | Disable AntiVirus | rule | disable_antivirus | ||||||
description | Communications over HTTP | rule | network_http | ||||||
description | Escalade priviledges | rule | escalate_priv | ||||||
description | Take screenshot | rule | screenshot | ||||||
description | Run a keylogger | rule | keylogger | ||||||
description | Affect system registries | rule | win_registry | ||||||
description | Affect system token | rule | win_token | ||||||
description | Affect private profile | rule | win_files_operation |
pdb_path | D:\BranchAI\win\Release\stubs\x86\ExternalUi.pdb |
resource name | IMAGE_FILE |
resource name | RTF_FILE |
file | C:\Users\Administrator\AppData\Roaming\Flexera Software LLC\InstallShield Update Service Scheduler 19.0.0.1\install\decoder.dll |
file | C:\Users\Administrator\AppData\Roaming\Flexera Software LLC\InstallShield Update Service Scheduler 19.0.0.1\install\24EADB7\InstallShield Update Service Scheduler.msi |
file | C:\Users\Administrator\AppData\Roaming\Flexera Software LLC\InstallShield Update Service Scheduler 19.0.0.1\install\decoder.dll |
G Data Antivirus (Windows) | Virus: Trojan.Generic.38135870 (Engine A) |
eScan Antivirus (Linux) | Trojan.Generic.38135870(DB) |
ESET Security (Windows) | multiple detections |
Sophos Anti-Virus (Linux) | Mal/Generic-S |
Bitdefender Antivirus (Linux) | Trojan.Generic.38135870 |
Kaspersky Standard (Windows) | HEUR:Trojan.Script.Agent.gen |
Emsisoft Commandline Scanner (Windows) | Trojan.Generic.38135870 (B) |
Lionic | Trojan.Win32.Pacoredi.4!c |
Cylance | Unsafe |
Sangfor | Trojan.Win32.Agent.Vnxu |
Symantec | Trojan.Gen.MBT |
ESET-NOD32 | multiple detections |
Avast | FileRepMalware [Misc] |
Kaspersky | HEUR:Trojan.Script.Agent.gen |
Alibaba | Trojan:JS/Pacoredi.c1e1e118 |
Rising | Trojan.Pacoredi!8.F53B (CLOUD) |
McAfeeD | ti!253177E5117A |
CTX | exe.trojan.pacoredi |
Sophos | Mal/Generic-S |
Detected | |
Kingsoft | Script.Trojan.Agent.gen |
VBA32 | Trojan.SMSSend |
Ikarus | Trojan.MSIL.Pacoredi |
Tencent | Win32.Trojan.FalseSign.Htgl |
TrellixENS | Artemis!239AADA2F73B |
Fortinet | W32/NDAoF |
AVG | FileRepMalware [Misc] |
alibabacloud | Trojan[downloader]:Javascript/Agent.AWEZ |