Size | 5.7KB |
---|---|
Type | PE32 executable (DLL) (GUI) Intel 80386, for MS Windows |
MD5 | b9a98b7872030d5b60671a9e47ebab25 |
SHA1 | 4d4f2502779cd26d2bf7a3855b5be898d762ad30 |
SHA256 | 4a6b518f3de12fc1ed0cba18fc59b0764d1c87b0158fa64b868653f9137976b2 |
SHA512 |
462b6b00c64520d69ccf767532c8518275c51260d1bfed9740f03513debc624693607a9c93efab09de0655e8452b44ef2f716a811e60a29caf341b4f57291a7f
|
CRC32 | 0DE68A63 |
ssdeep | None |
Yara |
|
This file is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | June 30, 2025, 5:57 p.m. | June 30, 2025, 5:58 p.m. | 103 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-06-23 02:41:46,015 [analyzer] DEBUG: Starting analyzer from: C:\tmpt1gcja 2025-06-23 02:41:46,015 [analyzer] DEBUG: Pipe server name: \??\PIPE\zmDEMbidqelHNdFqyGmoNCVaMhBCQuT 2025-06-23 02:41:46,015 [analyzer] DEBUG: Log pipe server name: \??\PIPE\VExFhoycBVamjIxWGTvcAitutoNg 2025-06-23 02:41:46,390 [analyzer] DEBUG: Started auxiliary module Curtain 2025-06-23 02:41:46,390 [analyzer] DEBUG: Started auxiliary module DbgView 2025-06-23 02:41:46,905 [analyzer] DEBUG: Started auxiliary module Disguise 2025-06-23 02:41:47,108 [analyzer] DEBUG: Loaded monitor into process with pid 508 2025-06-23 02:41:47,108 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-06-23 02:41:47,108 [analyzer] DEBUG: Started auxiliary module Human 2025-06-23 02:41:47,108 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-06-23 02:41:47,108 [analyzer] DEBUG: Started auxiliary module Reboot 2025-06-23 02:41:47,203 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-06-23 02:41:47,203 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-06-23 02:41:47,203 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-06-23 02:41:47,203 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-06-23 02:41:47,280 [lib.api.process] INFO: Successfully executed process from path 'C:\\Windows\\System32\\rundll32.exe' with arguments [u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\4a6b518f3de12fc1ed0cba18fc59b0764d1c87b0158fa64b868653f9137976b2.dll,DllMain'] and pid 1140 2025-06-23 02:41:47,483 [analyzer] DEBUG: Loaded monitor into process with pid 1140 2025-06-23 02:41:47,625 [analyzer] INFO: Injected into process with pid 636 and name u'rundll32.exe' 2025-06-23 02:41:47,875 [analyzer] DEBUG: Loaded monitor into process with pid 636 2025-06-23 02:42:16,328 [analyzer] INFO: Analysis timeout hit, terminating analysis. 2025-06-23 02:42:16,750 [analyzer] INFO: Terminating remaining processes before shutdown. 2025-06-23 02:42:16,750 [lib.api.process] INFO: Successfully terminated process with pid 1140. 2025-06-23 02:42:16,750 [lib.api.process] INFO: Successfully terminated process with pid 636. 2025-06-23 02:42:16,750 [analyzer] INFO: Analysis completed.
2025-06-30 17:57:07,443 [cuckoo.core.scheduler] INFO: Task #6620461: acquired machine win7x642 (label=win7x642) 2025-06-30 17:57:07,445 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.202 for task #6620461 2025-06-30 17:57:07,765 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 3234997 (interface=vboxnet0, host=192.168.168.202) 2025-06-30 17:57:07,799 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x642 2025-06-30 17:57:08,365 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x642 to vmcloak 2025-06-30 17:57:51,147 [cuckoo.core.guest] INFO: Starting analysis #6620461 on guest (id=win7x642, ip=192.168.168.202) 2025-06-30 17:57:52,154 [cuckoo.core.guest] DEBUG: win7x642: not ready yet 2025-06-30 17:57:57,187 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x642, ip=192.168.168.202) 2025-06-30 17:57:57,283 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x642, ip=192.168.168.202, monitor=latest, size=6660546) 2025-06-30 17:57:58,788 [cuckoo.core.resultserver] DEBUG: Task #6620461: live log analysis.log initialized. 2025-06-30 17:57:59,675 [cuckoo.core.resultserver] DEBUG: Task #6620461 is sending a BSON stream 2025-06-30 17:57:59,972 [cuckoo.core.resultserver] DEBUG: Task #6620461 is sending a BSON stream 2025-06-30 17:58:00,426 [cuckoo.core.resultserver] DEBUG: Task #6620461 is sending a BSON stream 2025-06-30 17:58:00,967 [cuckoo.core.resultserver] DEBUG: Task #6620461: File upload for 'shots/0001.jpg' 2025-06-30 17:58:00,982 [cuckoo.core.resultserver] DEBUG: Task #6620461 uploaded file length: 135793 2025-06-30 17:58:13,427 [cuckoo.core.guest] DEBUG: win7x642: analysis #6620461 still processing 2025-06-30 17:58:28,537 [cuckoo.core.guest] DEBUG: win7x642: analysis #6620461 still processing 2025-06-30 17:58:29,205 [cuckoo.core.resultserver] DEBUG: Task #6620461: File upload for 'curtain/1750639336.56.curtain.log' 2025-06-30 17:58:29,209 [cuckoo.core.resultserver] DEBUG: Task #6620461 uploaded file length: 36 2025-06-30 17:58:29,382 [cuckoo.core.resultserver] DEBUG: Task #6620461: File upload for 'sysmon/1750639336.75.sysmon.xml' 2025-06-30 17:58:29,401 [cuckoo.core.resultserver] DEBUG: Task #6620461 uploaded file length: 640828 2025-06-30 17:58:29,953 [cuckoo.core.resultserver] DEBUG: Task #6620461: File upload for 'shots/0002.jpg' 2025-06-30 17:58:29,971 [cuckoo.core.resultserver] DEBUG: Task #6620461 uploaded file length: 133566 2025-06-30 17:58:29,984 [cuckoo.core.resultserver] DEBUG: Task #6620461 had connection reset for <Context for LOG> 2025-06-30 17:58:31,551 [cuckoo.core.guest] INFO: win7x642: analysis completed successfully 2025-06-30 17:58:31,565 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-06-30 17:58:31,594 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-06-30 17:58:32,375 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x642 to path /srv/cuckoo/cwd/storage/analyses/6620461/memory.dmp 2025-06-30 17:58:32,376 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x642 2025-06-30 17:58:50,148 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.202 for task #6620461 2025-06-30 17:58:50,472 [cuckoo.core.scheduler] DEBUG: Released database task #6620461 2025-06-30 17:58:50,489 [cuckoo.core.scheduler] INFO: Task #6620461: analysis procedure completed
description | Malware can spread east-west file | rule | spreading_file |
packer | Armadillo v1.xx - v2.xx |
G Data Antivirus (Windows) | Virus: Gen:Variant.Barys.381598 (Engine A), Win32.Worm.Bundpil.B (Engine B) |
Avast Core Security (Linux) | Win32:Sg-I [Trj] |
C4S ClamAV (Linux) | Win.Adware.Downware-251 |
Trend Micro SProtect (Linux) | WORM_GAMARUE.SML |
Trellix (Linux) | W32/Worm-FJV |
WithSecure (Linux) | Worm.WORM/Gamarue.511265 |
eScan Antivirus (Linux) | Gen:Variant.Barys.381598(DB) |
ESET Security (Windows) | Win32/Bundpil.AO worm |
Sophos Anti-Virus (Linux) | W32/Gamarue-BL |
DrWeb Antivirus (Linux) | Trojan.MulDrop4.25343 |
ClamAV (Linux) | Win.Adware.Downware-251 |
Bitdefender Antivirus (Linux) | Gen:Variant.Barys.381598 |
Kaspersky Standard (Windows) | Worm.Win32.Debris.b |
Emsisoft Commandline Scanner (Windows) | Gen:Variant.Barys.381598 (B) |
tehtris | Generic.Malware |
Cynet | Malicious (score: 100) |
CAT-QuickHeal | Trojan.Agent.WL |
Skyhigh | BehavesLike.Win32.AndromedaDownloader.zt |
ALYac | Gen:Variant.Barys.381598 |
Cylance | Unsafe |
VIPRE | Gen:Variant.Barys.381598 |
Sangfor | Suspicious.Win32.Save.a |
CrowdStrike | win/malicious_confidence_100% (W) |
BitDefender | Gen:Variant.Barys.381598 |
K7GW | EmailWorm ( 0040f5281 ) |
K7AntiVirus | EmailWorm ( 0040f5281 ) |
Arcabit | Trojan.Barys.D5D29E |
Baidu | Win32.Worm.Bundpil.y |
VirIT | Worm.Win32.Generic.GRN |
Symantec | Downloader.Dromedan |
Elastic | malicious (high confidence) |
ESET-NOD32 | Win32/Bundpil.AO |
APEX | Malicious |
Avast | Win32:Sg-I [Trj] |
ClamAV | Win.Adware.Downware-251 |
Kaspersky | Worm.Win32.Debris.b |
NANO-Antivirus | Trojan.Win32.Debris.cqkxyu |
SUPERAntiSpyware | Trojan.Agent/Gen-Crypt |
MicroWorld-eScan | Gen:Variant.Barys.381598 |
Rising | Worm.Gamarue!1.9CB3 (CLASSIC) |
Emsisoft | Gen:Variant.Barys.381598 (B) |
F-Secure | Worm.WORM/Gamarue.511265 |
DrWeb | Trojan.MulDrop4.25343 |
Zillya | Worm.DebrisGen.Win32.11 |
TrendMicro | WORM_GAMARUE.SML |
McAfeeD | ti!4A6B518F3DE1 |
CTX | dll.unknown.barys |
Sophos | W32/Gamarue-BL |
SentinelOne | Static AI - Malicious PE |
Jiangmin | Trojan/Generic.axdgt |
Webroot | W32.Worm.Gen |
Detected | |
Avira | WORM/Gamarue.511265 |
Antiy-AVL | Worm/Win32.Bundpil |
Kingsoft | malware.kb.a.998 |
Xcitium | Worm.Win32.Bundpil.AH@4yjufs |
Microsoft | TrojanDownloader:Win32/Andromeda!pz |
ZoneAlarm | W32/Gamarue-BL |
GData | Win32.Worm.Bundpil.B |
Varist | W32/Csyr.B.gen!Eldorado |
AhnLab-V3 | Worm/Win32.Debris.R71328 |
VBA32 | Worm.Gamarue |
DeepInstinct | MALICIOUS |
Malwarebytes | Bundpil.Worm.AutoRun.DDS |