Size | 55.7KB |
---|---|
Type | PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed |
MD5 | 6fc4c0255b7c330d39cebd24ae0daffe |
SHA1 | 2682d2c73c30cbca826465291ad90036f62883b5 |
SHA256 | 3c956a8da12bca81042f523c690bdedac611501540380a5d560dec4ca5d04f4b |
SHA512 |
a09060582b5e2fedf1bed58952df09c0906c124b260a35fb41db3cb13d7501360ec46f4bf4a3c3ac20f9d6192a0e138edc0aba4f54da86e3f9477fd9edb3a391
|
CRC32 | B7793D35 |
ssdeep | None |
Yara |
|
This file is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | June 30, 2025, 5:53 p.m. | June 30, 2025, 5:55 p.m. | 108 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-06-23 02:41:41,015 [analyzer] DEBUG: Starting analyzer from: C:\tmpdrdvpd 2025-06-23 02:41:41,015 [analyzer] DEBUG: Pipe server name: \??\PIPE\VaJBAhDloIopxCJsKKil 2025-06-23 02:41:41,015 [analyzer] DEBUG: Log pipe server name: \??\PIPE\xhPmYdxjlailmGOhde 2025-06-23 02:41:41,265 [analyzer] DEBUG: Started auxiliary module Curtain 2025-06-23 02:41:41,265 [analyzer] DEBUG: Started auxiliary module DbgView 2025-06-23 02:41:41,812 [analyzer] DEBUG: Started auxiliary module Disguise 2025-06-23 02:41:42,015 [analyzer] DEBUG: Loaded monitor into process with pid 508 2025-06-23 02:41:42,015 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-06-23 02:41:42,015 [analyzer] DEBUG: Started auxiliary module Human 2025-06-23 02:41:42,015 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-06-23 02:41:42,015 [analyzer] DEBUG: Started auxiliary module Reboot 2025-06-23 02:41:42,171 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-06-23 02:41:42,171 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-06-23 02:41:42,187 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-06-23 02:41:42,187 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-06-23 02:41:42,342 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\3c956a8da12bca81042f523c690bdedac611501540380a5d560dec4ca5d04f4b.exe' with arguments '' and pid 2960 2025-06-23 02:41:42,562 [analyzer] DEBUG: Loaded monitor into process with pid 2960 2025-06-23 02:41:42,640 [analyzer] INFO: Added new file to list with pid 2960 and path C:\Windows\windows.exe 2025-06-23 02:41:42,655 [analyzer] INFO: Added new file to list with pid 2960 and path C:\system.exe 2025-06-23 02:41:42,765 [analyzer] INFO: Injected into process with pid 2116 and name u'iexplore.exe' 2025-06-23 02:41:43,046 [analyzer] DEBUG: Loaded monitor into process with pid 2116 2025-06-23 02:42:11,342 [analyzer] INFO: Analysis timeout hit, terminating analysis. 2025-06-23 02:42:11,578 [analyzer] INFO: Terminating remaining processes before shutdown. 2025-06-23 02:42:11,578 [lib.api.process] INFO: Successfully terminated process with pid 2960. 2025-06-23 02:42:11,578 [lib.api.process] INFO: Successfully terminated process with pid 2116. 2025-06-23 02:42:11,592 [analyzer] INFO: Analysis completed.
2025-06-30 17:53:56,818 [cuckoo.core.scheduler] INFO: Task #6620444: acquired machine win7x6412 (label=win7x6412) 2025-06-30 17:53:56,818 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.212 for task #6620444 2025-06-30 17:53:57,149 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 3230536 (interface=vboxnet0, host=192.168.168.212) 2025-06-30 17:53:57,230 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x6412 2025-06-30 17:53:57,766 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x6412 to vmcloak 2025-06-30 17:54:27,947 [cuckoo.core.guest] INFO: Starting analysis #6620444 on guest (id=win7x6412, ip=192.168.168.212) 2025-06-30 17:54:28,954 [cuckoo.core.guest] DEBUG: win7x6412: not ready yet 2025-06-30 17:54:33,983 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x6412, ip=192.168.168.212) 2025-06-30 17:54:34,078 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x6412, ip=192.168.168.212, monitor=latest, size=6660546) 2025-06-30 17:54:35,209 [cuckoo.core.resultserver] DEBUG: Task #6620444: live log analysis.log initialized. 2025-06-30 17:54:36,165 [cuckoo.core.resultserver] DEBUG: Task #6620444 is sending a BSON stream 2025-06-30 17:54:36,697 [cuckoo.core.resultserver] DEBUG: Task #6620444 is sending a BSON stream 2025-06-30 17:54:37,094 [cuckoo.core.resultserver] DEBUG: Task #6620444 is sending a BSON stream 2025-06-30 17:54:37,497 [cuckoo.core.resultserver] DEBUG: Task #6620444: File upload for 'shots/0001.jpg' 2025-06-30 17:54:37,515 [cuckoo.core.resultserver] DEBUG: Task #6620444 uploaded file length: 133465 2025-06-30 17:54:48,935 [cuckoo.core.resultserver] DEBUG: Task #6620444: File upload for 'shots/0002.jpg' 2025-06-30 17:54:48,966 [cuckoo.core.resultserver] DEBUG: Task #6620444 uploaded file length: 138287 2025-06-30 17:54:49,867 [cuckoo.core.guest] DEBUG: win7x6412: analysis #6620444 still processing 2025-06-30 17:54:56,228 [cuckoo.core.resultserver] DEBUG: Task #6620444: File upload for 'shots/0003.jpg' 2025-06-30 17:54:56,265 [cuckoo.core.resultserver] DEBUG: Task #6620444 uploaded file length: 138122 2025-06-30 17:55:04,992 [cuckoo.core.guest] DEBUG: win7x6412: analysis #6620444 still processing 2025-06-30 17:55:05,673 [cuckoo.core.resultserver] DEBUG: Task #6620444: File upload for 'curtain/1750639331.45.curtain.log' 2025-06-30 17:55:05,676 [cuckoo.core.resultserver] DEBUG: Task #6620444 uploaded file length: 36 2025-06-30 17:55:05,793 [cuckoo.core.resultserver] DEBUG: Task #6620444: File upload for 'sysmon/1750639331.58.sysmon.xml' 2025-06-30 17:55:05,802 [cuckoo.core.resultserver] DEBUG: Task #6620444: File upload for 'files/a7332d208e9d7a88_system.exe' 2025-06-30 17:55:05,806 [cuckoo.core.resultserver] DEBUG: Task #6620444 uploaded file length: 57003 2025-06-30 17:55:05,807 [cuckoo.core.resultserver] DEBUG: Task #6620444 uploaded file length: 664002 2025-06-30 17:55:05,813 [cuckoo.core.resultserver] DEBUG: Task #6620444: File upload for 'files/d6742d407a5a8194_windows.exe' 2025-06-30 17:55:05,815 [cuckoo.core.resultserver] DEBUG: Task #6620444 uploaded file length: 57003 2025-06-30 17:55:06,579 [cuckoo.core.resultserver] DEBUG: Task #6620444 had connection reset for <Context for LOG> 2025-06-30 17:55:08,008 [cuckoo.core.guest] INFO: win7x6412: analysis completed successfully 2025-06-30 17:55:08,027 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-06-30 17:55:08,051 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-06-30 17:55:08,926 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x6412 to path /srv/cuckoo/cwd/storage/analyses/6620444/memory.dmp 2025-06-30 17:55:08,927 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x6412 2025-06-30 17:55:44,775 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.212 for task #6620444 2025-06-30 17:55:45,105 [cuckoo.core.scheduler] DEBUG: Released database task #6620444 2025-06-30 17:55:45,130 [cuckoo.core.scheduler] INFO: Task #6620444: analysis procedure completed
description | (no description) | rule | UPX | ||||||
description | The packer/protector section names/keywords | rule | suspicious_packer_section |
Application Crash | Process iexplore.exe with pid 2116 crashed |
name | RT_VERSION | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00028044 | size | 0x00000220 |
file | c:\system.exe |
file | C:\Windows\windows.exe |
section | {u'size_of_data': u'0x00007600', u'virtual_address': u'0x0001a000', u'entropy': 7.8650845085517735, u'name': u'UPX1', u'virtual_size': u'0x00008000'} | entropy | 7.86508450855 | description | A section with a high entropy has been found | |||||||||
entropy | 0.54128440367 | description | Overall entropy of this PE file is high |
section | UPX0 | description | Section name indicates UPX | ||||||
section | UPX1 | description | Section name indicates UPX |
cmdline | C:\Program Files\Internet Explorer\IEXPLORE.EXE http://www.212ok.com/Gbook.asp?qita |
cmdline | "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2116 CREDAT:275457 /prefetch:2 |
G Data Antivirus (Windows) | Virus: Generic.Dacic.76A3436A.A.19A63A80 (Engine A), Win32.Trojan.PSE.76SMGI (Engine B) |
Avast Core Security (Linux) | Win32:MalwareX-gen [Trj] |
C4S ClamAV (Linux) | Win.Malware.Fvxvgjb-10038176-0 |
Trellix (Linux) | GenericRXAE-GJ |
WithSecure (Linux) | Trojan.TR/Dropper.Gen |
eScan Antivirus (Linux) | Generic.Dacic.76A3436A.A.19A63A80(DB) |
ESET Security (Windows) | a variant of Win32/VB.PRB trojan |
Sophos Anti-Virus (Linux) | Mal/StartP-A |
DrWeb Antivirus (Linux) | Trojan.Click1.59924 |
ClamAV (Linux) | Win.Malware.Fvxvgjb-10038176-0 |
Bitdefender Antivirus (Linux) | Generic.Dacic.76A3436A.A.19A63A80 |
Kaspersky Standard (Windows) | Trojan.Win32.Pasta.zyb |
Emsisoft Commandline Scanner (Windows) | Generic.Dacic.76A3436A.A.19A63A80 (B) |
Bkav | W32.AIDetectMalware |
tehtris | Generic.Malware |
Cynet | Malicious (score: 100) |
CAT-QuickHeal | Trojan.PastaVMF.S28606252 |
ALYac | Generic.Dacic.76A3436A.A.19A63A80 |
Cylance | Unsafe |
VIPRE | Generic.Dacic.76A3436A.A.19A63A80 |
Sangfor | Trojan.Win32.Save.a |
CrowdStrike | win/malicious_confidence_100% (W) |
BitDefender | Generic.Dacic.76A3436A.A.19A63A80 |
K7GW | Trojan ( 0059acdb1 ) |
K7AntiVirus | Trojan ( 0059acdb1 ) |
Arcabit | Generic.Dacic.76A3436A.A.19A63A80 |
VirIT | Trojan.Win32.AgentT.DZBF |
Symantec | ML.Attribute.HighConfidence |
Elastic | malicious (moderate confidence) |
ESET-NOD32 | a variant of Win32/VB.PRB |
APEX | Malicious |
Avast | Win32:MalwareX-gen [Trj] |
ClamAV | Win.Malware.Fvxvgjb-10038176-0 |
Kaspersky | Trojan.Win32.Pasta.zyb |
NANO-Antivirus | Trojan.Win32.Pasta.eehyiu |
SUPERAntiSpyware | Trojan.Agent/Gen-Dropper |
MicroWorld-eScan | Generic.Dacic.76A3436A.A.19A63A80 |
Rising | Trojan.DL.Win32.VBcode.arq (CLASSIC) |
Emsisoft | Generic.Dacic.76A3436A.A.19A63A80 (B) |
F-Secure | Trojan.TR/Dropper.Gen |
DrWeb | Trojan.Click1.59924 |
Zillya | Trojan.Pasta.Win32.14366 |
McAfeeD | ti!3C956A8DA12B |
Trapmine | malicious.moderate.ml.score |
CTX | exe.unknown.dacic |
Sophos | Mal/StartP-A |
SentinelOne | Static AI - Malicious PE |
Jiangmin | Trojan/Pasta.gcn |
Webroot | W32.Trojan.Gen |
Detected | |
Avira | TR/Dropper.Gen |
Antiy-AVL | Trojan/Win32.VB |
Kingsoft | malware.kb.b.955 |
Gridinsoft | Trojan.Win32.Wacatac.dd!n |
Microsoft | Trojan:Win32/Phonzy.A!ml |
ZoneAlarm | Mal/StartP-A |
GData | Win32.Trojan.StartPage.AL |
Varist | W32/Trojan.EAXY-2722 |
AhnLab-V3 | Trojan/Win.Scar.R644300 |
VBA32 | Trojan.VBRA.02582 |
DeepInstinct | MALICIOUS |
Malwarebytes | Generic.Malware.AI.DDS |
Ikarus | Trojan-Dropper.Agent |