Size | 199.4KB |
---|---|
Type | PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows |
MD5 | b12ec2f34f250207f26cc9fd3dfd72a4 |
SHA1 | 530fdbfc6f5da002eaa096026d83112537b580be |
SHA256 | a7c7379ae65f7f101e85cd2f0f24ea65d56cf750c497a5032b24a660310f5d20 |
SHA512 |
89c7aa8b7ae314c1f1f55475d2b15fc2ce5081539a0a8be972aacc9d572b736bbfbc657bed3082dcbe9b891023f9fcbb2f52ad6d733ca747278827ea76efed6a
|
CRC32 | 53E68877 |
ssdeep | None |
Yara |
|
This file is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | July 14, 2025, 12:51 p.m. | July 14, 2025, 12:52 p.m. | 68 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-07-09 07:33:41,000 [analyzer] DEBUG: Starting analyzer from: C:\tmpdyrg_l 2025-07-09 07:33:41,015 [analyzer] DEBUG: Pipe server name: \??\PIPE\OSdSUxiusqtxaBAy 2025-07-09 07:33:41,015 [analyzer] DEBUG: Log pipe server name: \??\PIPE\stCBfsCmvBUAxcfLfA 2025-07-09 07:33:41,280 [analyzer] DEBUG: Started auxiliary module Curtain 2025-07-09 07:33:41,280 [analyzer] DEBUG: Started auxiliary module DbgView 2025-07-09 07:33:41,703 [analyzer] DEBUG: Started auxiliary module Disguise 2025-07-09 07:33:41,905 [analyzer] DEBUG: Loaded monitor into process with pid 500 2025-07-09 07:33:41,905 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-07-09 07:33:41,905 [analyzer] DEBUG: Started auxiliary module Human 2025-07-09 07:33:41,905 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-07-09 07:33:41,905 [analyzer] DEBUG: Started auxiliary module Reboot 2025-07-09 07:33:41,983 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-07-09 07:33:41,983 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-07-09 07:33:41,983 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-07-09 07:33:41,983 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-07-09 07:33:42,108 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\a7c7379ae65f7f101e85cd2f0f24ea65d56cf750c497a5032b24a660310f5d20.exe' with arguments '' and pid 2084 2025-07-09 07:33:42,296 [analyzer] DEBUG: Loaded monitor into process with pid 2084 2025-07-09 07:33:42,312 [analyzer] INFO: Added new file to list with pid 2084 and path C:\Windows\MSWDM.EXE 2025-07-09 07:33:42,390 [analyzer] INFO: Injected into process with pid 2592 and name u'MSWDM.EXE' 2025-07-09 07:33:42,390 [analyzer] INFO: Added new file to list with pid 2084 and path C:\Windows\devB36A.tmp 2025-07-09 07:34:11,125 [analyzer] INFO: Analysis timeout hit, terminating analysis. 2025-07-09 07:34:11,437 [analyzer] INFO: Terminating remaining processes before shutdown. 2025-07-09 07:34:11,437 [lib.api.process] INFO: Successfully terminated process with pid 2592. 2025-07-09 07:34:11,437 [analyzer] WARNING: File at path u'c:\\windows\\devb36a.tmp' does not exist, skip. 2025-07-09 07:34:11,453 [analyzer] INFO: Analysis completed.
2025-07-14 12:51:17,075 [cuckoo.core.scheduler] INFO: Task #6705026: acquired machine win7x6430 (label=win7x6430) 2025-07-14 12:51:17,076 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.230 for task #6705026 2025-07-14 12:51:17,475 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 1701298 (interface=vboxnet0, host=192.168.168.230) 2025-07-14 12:51:17,858 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x6430 2025-07-14 12:51:18,903 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x6430 to vmcloak 2025-07-14 12:51:30,754 [cuckoo.core.guest] INFO: Starting analysis #6705026 on guest (id=win7x6430, ip=192.168.168.230) 2025-07-14 12:51:31,759 [cuckoo.core.guest] DEBUG: win7x6430: not ready yet 2025-07-14 12:51:36,792 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x6430, ip=192.168.168.230) 2025-07-14 12:51:36,874 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x6430, ip=192.168.168.230, monitor=latest, size=6660546) 2025-07-14 12:51:38,064 [cuckoo.core.resultserver] DEBUG: Task #6705026: live log analysis.log initialized. 2025-07-14 12:51:38,927 [cuckoo.core.resultserver] DEBUG: Task #6705026 is sending a BSON stream 2025-07-14 12:51:39,288 [cuckoo.core.resultserver] DEBUG: Task #6705026 is sending a BSON stream 2025-07-14 12:51:39,566 [cuckoo.core.resultserver] DEBUG: Task #6705026 is sending a BSON stream 2025-07-14 12:51:40,210 [cuckoo.core.resultserver] DEBUG: Task #6705026: File upload for 'shots/0001.jpg' 2025-07-14 12:51:40,227 [cuckoo.core.resultserver] DEBUG: Task #6705026 uploaded file length: 133441 2025-07-14 12:51:52,807 [cuckoo.core.guest] DEBUG: win7x6430: analysis #6705026 still processing 2025-07-14 12:52:07,906 [cuckoo.core.guest] DEBUG: win7x6430: analysis #6705026 still processing 2025-07-14 12:52:08,425 [cuckoo.core.resultserver] DEBUG: Task #6705026: File upload for 'curtain/1752039251.33.curtain.log' 2025-07-14 12:52:08,428 [cuckoo.core.resultserver] DEBUG: Task #6705026 uploaded file length: 36 2025-07-14 12:52:08,524 [cuckoo.core.resultserver] DEBUG: Task #6705026: File upload for 'sysmon/1752039251.44.sysmon.xml' 2025-07-14 12:52:08,530 [cuckoo.core.resultserver] DEBUG: Task #6705026 uploaded file length: 257632 2025-07-14 12:52:08,533 [cuckoo.core.resultserver] DEBUG: Task #6705026: File upload for 'files/44f370bb3f52c550_mswdm.exe' 2025-07-14 12:52:08,538 [cuckoo.core.resultserver] DEBUG: Task #6705026 uploaded file length: 81920 2025-07-14 12:52:09,230 [cuckoo.core.resultserver] DEBUG: Task #6705026 had connection reset for <Context for LOG> 2025-07-14 12:52:10,922 [cuckoo.core.guest] INFO: win7x6430: analysis completed successfully 2025-07-14 12:52:10,937 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-07-14 12:52:10,973 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-07-14 12:52:12,124 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x6430 to path /srv/cuckoo/cwd/storage/analyses/6705026/memory.dmp 2025-07-14 12:52:12,125 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x6430 2025-07-14 12:52:25,273 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.230 for task #6705026 2025-07-14 12:52:25,680 [cuckoo.core.scheduler] DEBUG: Released database task #6705026 2025-07-14 12:52:25,721 [cuckoo.core.scheduler] INFO: Task #6705026: analysis procedure completed
description | The packer/protector section names/keywords | rule | suspicious_packer_section | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | File downloader/dropper | rule | network_dropper | ||||||
description | Escalade priviledges | rule | escalate_priv | ||||||
description | Affect system registries | rule | win_registry | ||||||
description | Affect system token | rule | win_token | ||||||
description | Affect private profile | rule | win_files_operation |
section | .aspack |
section | .adata |
packer | Armadillo v1.71 |
name | RT_CURSOR | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x000109f0 | size | 0x00000134 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | Device independent bitmap graphic, 48 x 96 x 4, image size 1152 | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x000120c8 | size | 0x000008a8 | ||||||||||||||||||
name | RT_GROUP_CURSOR | language | LANG_CHINESE | filetype | Lotus unknown worksheet or configuration, revision 0x1 | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00010b28 | size | 0x00000014 | ||||||||||||||||||
name | RT_GROUP_ICON | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x000120b4 | size | 0x00000014 |
file | C:\Windows\MSWDM.EXE |
file | C:\Windows\MSWDM.EXE |
reg_key | HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM | reg_value | MSWDM.EXE | ||||||
reg_key | HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM | reg_value | MSWDM.EXE |
G Data Antivirus (Windows) | Virus: Trojan.GenericKD.66110182 (Engine A), Win32.Virus.Ipamor-Main.A (Engine B) |
Avast Core Security (Linux) | Win32:Ipamor |
C4S ClamAV (Linux) | Win.Trojan.Iparm-1 |
Trellix (Linux) | W32/Ipamor |
WithSecure (Linux) | Trojan.TR/Agent.arue |
eScan Antivirus (Linux) | Trojan.GenericKD.66110182(DB) |
ESET Security (Windows) | a variant of Win32/Ipamor.G virus |
Sophos Anti-Virus (Linux) | W32/Ipamor-B |
DrWeb Antivirus (Linux) | Trojan.MulDrop26.36640 |
ClamAV (Linux) | Win.Trojan.Iparm-1 |
Bitdefender Antivirus (Linux) | Trojan.GenericKD.66110182 |
Kaspersky Standard (Windows) | Trojan-Banker.Win32.Banbra.vwsb |
Emsisoft Commandline Scanner (Windows) | Trojan.GenericKD.66110182 (B) |
Bkav | W32.AIDetectMalware |
tehtris | Generic.Malware |
Cynet | Malicious (score: 100) |
CAT-QuickHeal | Trojan.Mauvaise.SL1 |
ALYac | Trojan.GenericKD.66110182 |
Cylance | Unsafe |
VIPRE | Trojan.GenericKD.66110182 |
Sangfor | Suspicious.Win32.Save.ins |
CrowdStrike | win/malicious_confidence_100% (D) |
BitDefender | Trojan.GenericKD.66110182 |
K7GW | Virus ( 0040f5921 ) |
K7AntiVirus | Virus ( 0040f5921 ) |
Arcabit | Trojan.Generic.D3F0C2E6 |
Baidu | Win32.Virus.Ipamor.b |
VirIT | Win32.Ipamor.F |
Symantec | W32.HLLP.Ipamor |
Elastic | malicious (high confidence) |
ESET-NOD32 | a variant of Win32/Ipamor.G |
APEX | Malicious |
Avast | Win32:Ipamor |
ClamAV | Win.Trojan.Iparm-1 |
Kaspersky | Trojan-Banker.Win32.Banbra.vwsb |
NANO-Antivirus | Virus.Win32.Ipamor.cxoj |
MicroWorld-eScan | Trojan.GenericKD.66110182 |
Emsisoft | Trojan.GenericKD.66110182 (B) |
F-Secure | Trojan.TR/Agent.arue |
DrWeb | Trojan.MulDrop26.36640 |
Zillya | Virus.Ipamor.Win32.5 |
McAfeeD | Real Protect-LS!B12EC2F34F25 |
Trapmine | malicious.high.ml.score |
CTX | exe.trojan.generic |
Sophos | W32/Ipamor-B |
SentinelOne | Static AI - Malicious PE |
Jiangmin | Trojan.Generic.ghobc |
Webroot | W32.Trojan.Ipamor |
Detected | |
Avira | TR/Agent.arue |
Antiy-AVL | Virus/Win32.Ipamor.g |
Gridinsoft | Trojan.Win32.Agent.vb!s1 |
Xcitium | Virus.Win32.Ipamor.G@8j5juk |
Microsoft | Virus:Win32/Ipamor.A |
ZoneAlarm | W32/Ipamor-B |
GData | Win32.Virus.Ipamor-Main.A |
Varist | W32/Trojan.IYAH-9049 |
AhnLab-V3 | Win32/Ipamor.D.X1356 |
Acronis | suspicious |
VBA32 | Virus.Facepalm.231207 |
TACHYON | Worm/W32.Ipamor.Zen.D |
DeepInstinct | MALICIOUS |
Malwarebytes | Generic.Malware.AI.DDS |