Size | 78.4KB |
---|---|
Type | PE32 executable (GUI) Intel 80386, for MS Windows |
MD5 | da25700f283fbaf216fa4b4ea5ffb529 |
SHA1 | 7b6c269ce7d0f636445c1ccf9f89f49906207903 |
SHA256 | 2eb1361091951a041aac3fff75182b2346722a79398989a37c4b18b51ff2106e |
SHA512 |
04d39b94b1a28e9903bc673212e3223d624c560a2bfa8391421f3cd33e9931a6398e7afe7be9ec7318963ca81fcd8a15bbd881e5429fa6b66413bef7373e0007
|
CRC32 | 8AA44DF7 |
ssdeep | None |
Yara |
|
This file is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | July 14, 2025, 12:41 p.m. | July 14, 2025, 12:42 p.m. | 68 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-07-09 07:33:30,030 [analyzer] DEBUG: Starting analyzer from: C:\tmpt1gcja 2025-07-09 07:33:30,030 [analyzer] DEBUG: Pipe server name: \??\PIPE\hyUFQEsxdCUoVDcaJDJOfHZ 2025-07-09 07:33:30,030 [analyzer] DEBUG: Log pipe server name: \??\PIPE\jnSmuraeafXmEoINgEgeUiKCcuulpyQt 2025-07-09 07:33:30,312 [analyzer] DEBUG: Started auxiliary module Curtain 2025-07-09 07:33:30,312 [analyzer] DEBUG: Started auxiliary module DbgView 2025-07-09 07:33:30,733 [analyzer] DEBUG: Started auxiliary module Disguise 2025-07-09 07:33:30,953 [analyzer] DEBUG: Loaded monitor into process with pid 508 2025-07-09 07:33:30,967 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-07-09 07:33:30,967 [analyzer] DEBUG: Started auxiliary module Human 2025-07-09 07:33:30,967 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-07-09 07:33:30,967 [analyzer] DEBUG: Started auxiliary module Reboot 2025-07-09 07:33:31,030 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-07-09 07:33:31,030 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-07-09 07:33:31,030 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-07-09 07:33:31,030 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-07-09 07:33:31,140 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\2eb1361091951a041aac3fff75182b2346722a79398989a37c4b18b51ff2106e.exe' with arguments '' and pid 868 2025-07-09 07:33:31,328 [analyzer] DEBUG: Loaded monitor into process with pid 868 2025-07-09 07:33:31,375 [analyzer] INFO: Added new file to list with pid 868 and path C:\Users\Administrator\AppData\Local\Temp\asih.exe 2025-07-09 07:33:31,483 [analyzer] INFO: Injected into process with pid 544 and name u'asih.exe' 2025-07-09 07:33:31,655 [analyzer] DEBUG: Loaded monitor into process with pid 544 2025-07-09 07:33:32,140 [analyzer] INFO: Process with pid 868 has terminated 2025-07-09 07:33:52,733 [analyzer] INFO: Added new file to list with pid 544 and path C:\Users\Administrator\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2D85F72862B55C4EADD9E66E06947F3D 2025-07-09 07:33:52,733 [analyzer] INFO: Added new file to list with pid 544 and path C:\Users\Administrator\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2D85F72862B55C4EADD9E66E06947F3D 2025-07-09 07:33:52,953 [analyzer] INFO: Added new file to list with pid 544 and path C:\Users\Administrator\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015 2025-07-09 07:33:52,953 [analyzer] INFO: Added new file to list with pid 544 and path C:\Users\Administrator\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015 2025-07-09 07:34:00,140 [analyzer] INFO: Analysis timeout hit, terminating analysis. 2025-07-09 07:34:00,328 [analyzer] INFO: Terminating remaining processes before shutdown. 2025-07-09 07:34:00,328 [lib.api.process] INFO: Successfully terminated process with pid 544. 2025-07-09 07:34:00,358 [analyzer] INFO: Analysis completed.
2025-07-14 12:41:41,536 [cuckoo.core.scheduler] INFO: Task #6704982: acquired machine win7x642 (label=win7x642) 2025-07-14 12:41:41,537 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.202 for task #6704982 2025-07-14 12:41:41,983 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 1676118 (interface=vboxnet0, host=192.168.168.202) 2025-07-14 12:41:42,071 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x642 2025-07-14 12:41:43,195 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x642 to vmcloak 2025-07-14 12:42:00,345 [cuckoo.core.guest] INFO: Starting analysis #6704982 on guest (id=win7x642, ip=192.168.168.202) 2025-07-14 12:42:01,351 [cuckoo.core.guest] DEBUG: win7x642: not ready yet 2025-07-14 12:42:06,380 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x642, ip=192.168.168.202) 2025-07-14 12:42:06,522 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x642, ip=192.168.168.202, monitor=latest, size=6660546) 2025-07-14 12:42:07,946 [cuckoo.core.resultserver] DEBUG: Task #6704982: live log analysis.log initialized. 2025-07-14 12:42:08,855 [cuckoo.core.resultserver] DEBUG: Task #6704982 is sending a BSON stream 2025-07-14 12:42:09,216 [cuckoo.core.resultserver] DEBUG: Task #6704982 is sending a BSON stream 2025-07-14 12:42:09,631 [cuckoo.core.resultserver] DEBUG: Task #6704982 is sending a BSON stream 2025-07-14 12:42:10,122 [cuckoo.core.resultserver] DEBUG: Task #6704982: File upload for 'shots/0001.jpg' 2025-07-14 12:42:10,148 [cuckoo.core.resultserver] DEBUG: Task #6704982 uploaded file length: 133549 2025-07-14 12:42:22,560 [cuckoo.core.guest] DEBUG: win7x642: analysis #6704982 still processing 2025-07-14 12:42:37,816 [cuckoo.core.guest] DEBUG: win7x642: analysis #6704982 still processing 2025-07-14 12:42:38,218 [cuckoo.core.resultserver] DEBUG: Task #6704982: File upload for 'curtain/1752039240.25.curtain.log' 2025-07-14 12:42:38,221 [cuckoo.core.resultserver] DEBUG: Task #6704982 uploaded file length: 36 2025-07-14 12:42:38,370 [cuckoo.core.resultserver] DEBUG: Task #6704982: File upload for 'sysmon/1752039240.33.sysmon.xml' 2025-07-14 12:42:38,374 [cuckoo.core.resultserver] DEBUG: Task #6704982: File upload for 'files/aff03f923f83eb46_2d85f72862b55c4eadd9e66e06947f3d' 2025-07-14 12:42:38,377 [cuckoo.core.resultserver] DEBUG: Task #6704982 uploaded file length: 192 2025-07-14 12:42:38,378 [cuckoo.core.resultserver] DEBUG: Task #6704982: File upload for 'files/c2f882ddc13eb8d7_94308059b57b3142e455b38a6eb92015' 2025-07-14 12:42:38,379 [cuckoo.core.resultserver] DEBUG: Task #6704982 uploaded file length: 344 2025-07-14 12:42:38,381 [cuckoo.core.resultserver] DEBUG: Task #6704982: File upload for 'files/4c847e0c28733ed3_94308059b57b3142e455b38a6eb92015' 2025-07-14 12:42:38,383 [cuckoo.core.resultserver] DEBUG: Task #6704982 uploaded file length: 73513 2025-07-14 12:42:38,384 [cuckoo.core.resultserver] DEBUG: Task #6704982: File upload for 'files/b6f39bc1db8f30bd_asih.exe' 2025-07-14 12:42:38,386 [cuckoo.core.resultserver] DEBUG: Task #6704982: File upload for 'files/96bcec06264976f3_2d85f72862b55c4eadd9e66e06947f3d' 2025-07-14 12:42:38,387 [cuckoo.core.resultserver] DEBUG: Task #6704982 uploaded file length: 1391 2025-07-14 12:42:38,388 [cuckoo.core.resultserver] DEBUG: Task #6704982 uploaded file length: 80464 2025-07-14 12:42:38,397 [cuckoo.core.resultserver] DEBUG: Task #6704982 uploaded file length: 491784 2025-07-14 12:42:38,980 [cuckoo.core.resultserver] DEBUG: Task #6704982 had connection reset for <Context for LOG> 2025-07-14 12:42:40,829 [cuckoo.core.guest] INFO: win7x642: analysis completed successfully 2025-07-14 12:42:40,846 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-07-14 12:42:40,883 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-07-14 12:42:41,888 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x642 to path /srv/cuckoo/cwd/storage/analyses/6704982/memory.dmp 2025-07-14 12:42:41,889 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x642 2025-07-14 12:42:49,804 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.202 for task #6704982 2025-07-14 12:42:50,256 [cuckoo.core.scheduler] DEBUG: Released database task #6704982 2025-07-14 12:42:50,280 [cuckoo.core.scheduler] INFO: Task #6704982: analysis procedure completed
description | Detection of Cryptolocker Samples | rule | CryptoLocker_set1 | ||||||
description | Detection of CryptoLocker Variants | rule | CryptoLocker_rule2 | ||||||
description | Affect private profile | rule | win_files_operation |
section | gu_idata |
section | gu_rsrcs |
file | C:\Users\Administrator\AppData\Local\Temp\asih.exe |
file | C:\Users\Administrator\AppData\Local\Temp\asih.exe |
file | C:\Users\Administrator\AppData\Local\Temp\asih.exe |
file | C:\Users\jbayuelo\AppData\Local\Temp\Rar$EX00.060\Invoice_OCT-02-2013.exe |
G Data Antivirus (Windows) | Virus: Trojan.Agent.BALW (Engine A), Win32.Trojan-Downloader.Upatre.BJ (Engine B) |
Avast Core Security (Linux) | Win32:Agent-ASIV [Trj] |
C4S ClamAV (Linux) | Win.Trojan.Upatre-3337 |
Trend Micro SProtect (Linux) | TROJ_UPATRE.SMAG |
Trellix (Linux) | PWSZbot-FIE |
WithSecure (Linux) | Trojan.TR/Dropper.Gen |
eScan Antivirus (Linux) | Trojan.Agent.BALW(DB) |
ESET Security (Windows) | Win32/TrojanDownloader.Small.AAB trojan |
Sophos Anti-Virus (Linux) | Troj/Mdrop-FLP |
DrWeb Antivirus (Linux) | Trojan.DownLoad3.28161 |
ClamAV (Linux) | Win.Trojan.Upatre-3337 |
Bitdefender Antivirus (Linux) | Trojan.Agent.BALW |
Kaspersky Standard (Windows) | HEUR:Trojan.Win32.Generic |
Emsisoft Commandline Scanner (Windows) | Trojan.Agent.BALW (B) |
Bkav | W32.AIDetectMalware |
tehtris | Generic.Malware |
Cynet | Malicious (score: 100) |
Skyhigh | BehavesLike.Win32.PWSZbot.lz |
ALYac | Trojan.Agent.BALW |
Cylance | Unsafe |
VIPRE | Trojan.Agent.BALW |
Sangfor | Trojan.Win32.Save.a |
CrowdStrike | win/malicious_confidence_100% (D) |
BitDefender | Trojan.Agent.BALW |
K7GW | Trojan-Downloader ( 0055c6c71 ) |
K7AntiVirus | Trojan-Downloader ( 0055c6c71 ) |
Arcabit | Trojan.Agent.BALW |
Baidu | Win32.Trojan-Downloader.Small.c |
VirIT | Trojan.Win32.AgentT.DYVF |
Symantec | ML.Attribute.HighConfidence |
Elastic | malicious (high confidence) |
ESET-NOD32 | Win32/TrojanDownloader.Small.AAB |
APEX | Malicious |
Avast | Win32:Gepys-E [Trj] |
ClamAV | Win.Trojan.Upatre-3337 |
Kaspersky | HEUR:Trojan.Win32.Generic |
NANO-Antivirus | Trojan.Win32.DownLoad3.cjxpzu |
SUPERAntiSpyware | Trojan.Agent/Gen-Injector |
MicroWorld-eScan | Trojan.Agent.BALW |
Rising | Downloader.Waski!1.A489 (CLASSIC) |
Emsisoft | Trojan.Agent.BALW (B) |
F-Secure | Trojan.TR/Dropper.Gen |
DrWeb | Trojan.DownLoad3.28161 |
Zillya | Downloader.Small.Win32.228156 |
TrendMicro | TROJ_UPATRE.SMAG |
McAfeeD | Real Protect-LS!DA25700F283F |
Trapmine | malicious.high.ml.score |
CTX | exe.trojan.balw |
Sophos | Troj/Mdrop-FLP |
SentinelOne | Static AI - Malicious PE |
Jiangmin | TrojanSpy.Zbot.eafz |
Webroot | W32.Trojan.Gen |
Detected | |
Avira | TR/Dropper.Gen |
Antiy-AVL | Trojan/Win32.Waski.a |
Kingsoft | malware.kb.a.999 |
Gridinsoft | Ransom.Win32.Zbot.oa!s1 |
Xcitium | TrojWare.Win32.TrojanDownloader.Upatre.MAUA@5rueuc |
Microsoft | TrojanDownloader:Win32/Upatre |
ViRobot | Trojan.Win32.U.Agent.27648 |
ZoneAlarm | Troj/Mdrop-FLP |
GData | Win32.Trojan-Downloader.Upatre.BJ |
Varist | W32/Upatre.RF.gen!Eldorado |
AhnLab-V3 | Trojan/Win.Kryptk.R635829 |