Size | 74.6KB |
---|---|
Type | PE32 executable (GUI) Intel 80386, for MS Windows |
MD5 | c81b98fe25dd8213f25ca80aae127652 |
SHA1 | 9e42fd00bd3c240def02cd6ea9cff8e2757c9f19 |
SHA256 | 602e38a7be0fd90c9628b0721c95fd7693498440bde6e4eca25baf077b84e358 |
SHA512 |
a07f5f35af27ff8587cd761bf27de1a428f5c87a3be745b96e90eba405466498c7c2da705fbcf97dc847dc438aa252fbcaa35616a40003c5307d502bea268ea6
|
CRC32 | 4FEDBD2C |
ssdeep | None |
Yara |
|
This file is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | July 13, 2025, 6:58 a.m. | July 13, 2025, 7:01 a.m. | 169 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-07-08 23:00:19,030 [analyzer] DEBUG: Starting analyzer from: C:\tmpj6atou 2025-07-08 23:00:19,030 [analyzer] DEBUG: Pipe server name: \??\PIPE\NsJhRqUKJpfscPhHsdnTzEJdvhgCcId 2025-07-08 23:00:19,030 [analyzer] DEBUG: Log pipe server name: \??\PIPE\qmsZgWBEpXAuoysEuPTCUuuytcDb 2025-07-08 23:00:19,280 [analyzer] DEBUG: Started auxiliary module Curtain 2025-07-08 23:00:19,280 [analyzer] DEBUG: Started auxiliary module DbgView 2025-07-08 23:00:19,703 [analyzer] DEBUG: Started auxiliary module Disguise 2025-07-08 23:00:19,905 [analyzer] DEBUG: Loaded monitor into process with pid 504 2025-07-08 23:00:19,905 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-07-08 23:00:19,905 [analyzer] DEBUG: Started auxiliary module Human 2025-07-08 23:00:19,905 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-07-08 23:00:19,905 [analyzer] DEBUG: Started auxiliary module Reboot 2025-07-08 23:00:19,967 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-07-08 23:00:19,967 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-07-08 23:00:19,967 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-07-08 23:00:19,967 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-07-08 23:00:20,078 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\602e38a7be0fd90c9628b0721c95fd7693498440bde6e4eca25baf077b84e358.exe' with arguments '' and pid 3008 2025-07-08 23:00:20,280 [analyzer] DEBUG: Loaded monitor into process with pid 3008 2025-07-08 23:00:20,390 [analyzer] INFO: Added new file to list with pid 3008 and path C:\Users\Administrator\AppData\Local\Temp\pissa.exe 2025-07-08 23:00:20,562 [analyzer] INFO: Injected into process with pid 2016 and name u'pissa.exe' 2025-07-08 23:00:20,733 [analyzer] DEBUG: Loaded monitor into process with pid 2016 2025-07-08 23:00:21,092 [analyzer] INFO: Process with pid 3008 has terminated 2025-07-08 23:00:43,296 [analyzer] INFO: Added new file to list with pid 2016 and path C:\Users\Administrator\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015 2025-07-08 23:00:43,296 [analyzer] INFO: Added new file to list with pid 2016 and path C:\Users\Administrator\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015 2025-07-08 23:00:49,092 [analyzer] INFO: Analysis timeout hit, terminating analysis. 2025-07-08 23:00:49,390 [analyzer] INFO: Terminating remaining processes before shutdown. 2025-07-08 23:00:49,390 [lib.api.process] INFO: Successfully terminated process with pid 2016. 2025-07-08 23:00:49,405 [analyzer] INFO: Analysis completed.
2025-07-13 06:58:16,374 [cuckoo.core.scheduler] INFO: Task #6697058: acquired machine win7x6416 (label=win7x6416) 2025-07-13 06:58:16,374 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.216 for task #6697058 2025-07-13 06:58:16,609 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 3020321 (interface=vboxnet0, host=192.168.168.216) 2025-07-13 06:58:16,755 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x6416 2025-07-13 06:58:17,552 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x6416 to vmcloak 2025-07-13 06:59:10,515 [cuckoo.core.guest] INFO: Starting analysis #6697058 on guest (id=win7x6416, ip=192.168.168.216) 2025-07-13 06:59:11,521 [cuckoo.core.guest] DEBUG: win7x6416: not ready yet 2025-07-13 06:59:16,553 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x6416, ip=192.168.168.216) 2025-07-13 06:59:16,634 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x6416, ip=192.168.168.216, monitor=latest, size=6660546) 2025-07-13 06:59:17,937 [cuckoo.core.resultserver] DEBUG: Task #6697058: live log analysis.log initialized. 2025-07-13 06:59:18,787 [cuckoo.core.resultserver] DEBUG: Task #6697058 is sending a BSON stream 2025-07-13 06:59:19,146 [cuckoo.core.resultserver] DEBUG: Task #6697058 is sending a BSON stream 2025-07-13 06:59:19,597 [cuckoo.core.resultserver] DEBUG: Task #6697058 is sending a BSON stream 2025-07-13 06:59:20,047 [cuckoo.core.resultserver] DEBUG: Task #6697058: File upload for 'shots/0001.jpg' 2025-07-13 06:59:20,069 [cuckoo.core.resultserver] DEBUG: Task #6697058 uploaded file length: 133564 2025-07-13 06:59:32,585 [cuckoo.core.guest] DEBUG: win7x6416: analysis #6697058 still processing 2025-07-13 06:59:47,706 [cuckoo.core.guest] DEBUG: win7x6416: analysis #6697058 still processing 2025-07-13 06:59:48,195 [cuckoo.core.resultserver] DEBUG: Task #6697058: File upload for 'curtain/1752008449.23.curtain.log' 2025-07-13 06:59:48,205 [cuckoo.core.resultserver] DEBUG: Task #6697058 uploaded file length: 36 2025-07-13 06:59:48,330 [cuckoo.core.resultserver] DEBUG: Task #6697058: File upload for 'sysmon/1752008449.38.sysmon.xml' 2025-07-13 06:59:48,337 [cuckoo.core.resultserver] DEBUG: Task #6697058: File upload for 'files/b58734ae3524c18e_94308059b57b3142e455b38a6eb92015' 2025-07-13 06:59:48,340 [cuckoo.core.resultserver] DEBUG: Task #6697058 uploaded file length: 344 2025-07-13 06:59:48,343 [cuckoo.core.resultserver] DEBUG: Task #6697058 uploaded file length: 933344 2025-07-13 06:59:48,348 [cuckoo.core.resultserver] DEBUG: Task #6697058: File upload for 'files/4c847e0c28733ed3_94308059b57b3142e455b38a6eb92015' 2025-07-13 06:59:48,351 [cuckoo.core.resultserver] DEBUG: Task #6697058: File upload for 'files/f2f4cc6adf6d1778_pissa.exe' 2025-07-13 06:59:48,352 [cuckoo.core.resultserver] DEBUG: Task #6697058 uploaded file length: 76590 2025-07-13 06:59:48,354 [cuckoo.core.resultserver] DEBUG: Task #6697058 uploaded file length: 73513 2025-07-13 06:59:48,862 [cuckoo.core.resultserver] DEBUG: Task #6697058 had connection reset for <Context for LOG> 2025-07-13 06:59:50,718 [cuckoo.core.guest] INFO: win7x6416: analysis completed successfully 2025-07-13 06:59:50,733 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-07-13 06:59:50,763 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-07-13 06:59:51,569 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x6416 to path /srv/cuckoo/cwd/storage/analyses/6697058/memory.dmp 2025-07-13 06:59:51,572 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x6416 2025-07-13 07:01:04,896 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.216 for task #6697058 2025-07-13 07:01:05,353 [cuckoo.core.scheduler] DEBUG: Released database task #6697058 2025-07-13 07:01:05,377 [cuckoo.core.scheduler] INFO: Task #6697058: analysis procedure completed
description | The packer/protector section names/keywords | rule | suspicious_packer_section | ||||||
description | Detection of CryptoLocker Variants | rule | CryptoLocker_rule2 | ||||||
description | Affect private profile | rule | win_files_operation |
section | .vmp0 |
file | C:\Users\Administrator\AppData\Local\Temp\pissa.exe |
file | C:\Users\Administrator\AppData\Local\Temp\pissa.exe |
file | C:\Users\Administrator\AppData\Local\Temp\pissa.exe |
section | .vmp0 | description | Section name indicates VMProtect |
G Data Antivirus (Windows) | Virus: Trojan.GenericKDZ.109048 (Engine A), Win32.Trojan-Downloader.Upatre.BJ (Engine B) |
Avast Core Security (Linux) | Win32:Evo-gen [Trj] |
C4S ClamAV (Linux) | Win.Trojan.Upatre-3335 |
Trellix (Linux) | Downloader-FTW |
WithSecure (Linux) | Trojan.TR/Bublik.wgoc |
eScan Antivirus (Linux) | Trojan.GenericKDZ.109048(DB) |
ESET Security (Windows) | Win32/TrojanDownloader.Small.AAB trojan |
Sophos Anti-Virus (Linux) | Troj/Agent-AECC |
DrWeb Antivirus (Linux) | Trojan.DownLoad3.28161 |
ClamAV (Linux) | Win.Trojan.Upatre-3335 |
Bitdefender Antivirus (Linux) | Trojan.GenericKDZ.109048 |
Kaspersky Standard (Windows) | HEUR:Trojan.Win32.Bublik.pef |
Emsisoft Commandline Scanner (Windows) | Trojan.GenericKDZ.109048 (B) |
Bkav | W32.FamVT.GeND.Trojan |
Lionic | Trojan.Win32.Generic.lNlt |
tehtris | Generic.Malware |
Cynet | Malicious (score: 100) |
Skyhigh | BehavesLike.Win32.PWSZbot.lm |
ALYac | Trojan.GenericKDZ.109048 |
Cylance | Unsafe |
VIPRE | Trojan.GenericKDZ.109048 |
Sangfor | Suspicious.Win32.Save.a |
CrowdStrike | win/malicious_confidence_100% (W) |
BitDefender | Trojan.GenericKDZ.109048 |
K7GW | Trojan-Downloader ( 004b8d141 ) |
K7AntiVirus | Trojan-Downloader ( 004b8d141 ) |
Arcabit | Trojan.Generic.D1A9F8 |
Baidu | Win32.Trojan-Downloader.Small.c |
VirIT | Trojan.Win32.X-Fiha.GS |
Symantec | ML.Attribute.HighConfidence |
Elastic | malicious (high confidence) |
ESET-NOD32 | Win32/TrojanDownloader.Small.AAB |
APEX | Malicious |
Avast | Win32:Evo-gen [Trj] |
ClamAV | Win.Trojan.Upatre-3335 |
Kaspersky | HEUR:Trojan.Win32.Bublik.pef |
Alibaba | TrojanPSW:Win32/Bublik.5d32b4fb |
NANO-Antivirus | Trojan.Win32.DownLoad3.cqgpgw |
MicroWorld-eScan | Trojan.GenericKDZ.109048 |
Rising | Malware.FakePDF/ICON!1.9C28 (CLASSIC) |
Emsisoft | Trojan.GenericKDZ.109048 (B) |
F-Secure | Trojan.TR/Bublik.wgoc |
DrWeb | Trojan.DownLoad3.28161 |
Zillya | Trojan.Small.Win32.108630 |
McAfeeD | Real Protect-LS!C81B98FE25DD |
Trapmine | malicious.high.ml.score |
CTX | exe.trojan.bublik |
Sophos | Troj/Agent-AECC |
SentinelOne | Static AI - Malicious PE |
Jiangmin | Trojan/Bublik.gdr |
Webroot | W32.Trojan.Gen |
Detected | |
Avira | TR/Bublik.wgoc |
Antiy-AVL | Trojan/Win32.Waski.a |
Kingsoft | malware.kb.a.999 |
Gridinsoft | Malware.Win32.Gen.bot!se49786 |
Xcitium | TrojWare.Win32.Trojan.XPACK.Gen@2ho5ur |
Microsoft | PWS:Win32/Zbot!pz |
ZoneAlarm | Troj/Agent-AECC |
GData | Win32.Trojan-Downloader.Upatre.BJ |
Varist | W32/Trojan.QDKH-4745 |
AhnLab-V3 | Win-Trojan/Agent.25600.AAV |
Acronis | suspicious |