Size | 618.3KB |
---|---|
Type | PE32+ executable (GUI) x86-64, for MS Windows |
MD5 | c9cfd746c986b9cc0c7e1096a2227630 |
SHA1 | b633dc0c6c300943b9b88c8aa19fef94959e2151 |
SHA256 | d9c99b09d5dc6f9229b6f1d7fe13c15e7c9255349c45ca9306e071a1b83e16f3 |
SHA512 |
559bd19f0ddf3d0c3f74338da6510ae28d5945643c07c48cd89b4248c77bfdf4aeb4c57931eba9bce321198948225cad06c15d7a78b349f0f4a5dd03ddb1b424
|
CRC32 | B2E0D0A3 |
ssdeep | None |
PDB Path | shvlzm.pdb |
Yara |
|
This file is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | Aug. 28, 2025, 4:56 p.m. | Aug. 28, 2025, 4:57 p.m. | 40 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-08-26 16:59:32,015 [analyzer] DEBUG: Starting analyzer from: C:\tmpj6atou 2025-08-26 16:59:32,030 [analyzer] DEBUG: Pipe server name: \??\PIPE\aDSWXJPpxZtKcjXLCubpAzbUrwCdZ 2025-08-26 16:59:32,030 [analyzer] DEBUG: Log pipe server name: \??\PIPE\AJTcvHCWdiiQZmVgkSNysLBfUnT 2025-08-26 16:59:32,342 [analyzer] DEBUG: Started auxiliary module Curtain 2025-08-26 16:59:32,342 [analyzer] DEBUG: Started auxiliary module DbgView 2025-08-26 16:59:32,875 [analyzer] DEBUG: Started auxiliary module Disguise 2025-08-26 16:59:33,078 [analyzer] DEBUG: Loaded monitor into process with pid 504 2025-08-26 16:59:33,078 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-08-26 16:59:33,078 [analyzer] DEBUG: Started auxiliary module Human 2025-08-26 16:59:33,078 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-08-26 16:59:33,078 [analyzer] DEBUG: Started auxiliary module Reboot 2025-08-26 16:59:33,125 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-08-26 16:59:33,125 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-08-26 16:59:33,125 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-08-26 16:59:33,125 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-08-26 16:59:33,250 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\d9c99b09d5dc6f9229b6f1d7fe13c15e7c9255349c45ca9306e071a1b83e16f3.exe' with arguments '' and pid 2520 2025-08-26 16:59:34,250 [analyzer] INFO: Process with pid 2520 has terminated 2025-08-26 16:59:34,250 [analyzer] INFO: Process list is empty, terminating analysis. 2025-08-26 16:59:35,515 [analyzer] INFO: Terminating remaining processes before shutdown. 2025-08-26 16:59:35,515 [analyzer] INFO: Analysis completed.
2025-08-28 16:56:55,783 [cuckoo.core.scheduler] INFO: Task #6920111: acquired machine win7x6416 (label=win7x6416) 2025-08-28 16:56:55,784 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.216 for task #6920111 2025-08-28 16:56:56,137 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 2709297 (interface=vboxnet0, host=192.168.168.216) 2025-08-28 16:56:56,519 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x6416 2025-08-28 16:56:56,979 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x6416 to vmcloak 2025-08-28 16:57:12,078 [cuckoo.core.guest] INFO: Starting analysis #6920111 on guest (id=win7x6416, ip=192.168.168.216) 2025-08-28 16:57:13,085 [cuckoo.core.guest] DEBUG: win7x6416: not ready yet 2025-08-28 16:57:18,186 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x6416, ip=192.168.168.216) 2025-08-28 16:57:18,277 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x6416, ip=192.168.168.216, monitor=latest, size=6660546) 2025-08-28 16:57:19,820 [cuckoo.core.resultserver] DEBUG: Task #6920111: live log analysis.log initialized. 2025-08-28 16:57:20,842 [cuckoo.core.resultserver] DEBUG: Task #6920111 is sending a BSON stream 2025-08-28 16:57:22,064 [cuckoo.core.resultserver] DEBUG: Task #6920111: File upload for 'shots/0001.jpg' 2025-08-28 16:57:22,097 [cuckoo.core.resultserver] DEBUG: Task #6920111 uploaded file length: 133577 2025-08-28 16:57:23,222 [cuckoo.core.resultserver] DEBUG: Task #6920111: File upload for 'curtain/1756220375.39.curtain.log' 2025-08-28 16:57:23,225 [cuckoo.core.resultserver] DEBUG: Task #6920111 uploaded file length: 36 2025-08-28 16:57:23,339 [cuckoo.core.resultserver] DEBUG: Task #6920111: File upload for 'sysmon/1756220375.5.sysmon.xml' 2025-08-28 16:57:23,723 [cuckoo.core.resultserver] DEBUG: Task #6920111 uploaded file length: 24832 2025-08-28 16:57:24,198 [cuckoo.core.resultserver] DEBUG: Task #6920111 had connection reset for <Context for LOG> 2025-08-28 16:57:25,271 [cuckoo.core.guest] INFO: win7x6416: analysis completed successfully 2025-08-28 16:57:25,284 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-08-28 16:57:25,313 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-08-28 16:57:26,072 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x6416 to path /srv/cuckoo/cwd/storage/analyses/6920111/memory.dmp 2025-08-28 16:57:26,074 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x6416 2025-08-28 16:57:35,624 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.216 for task #6920111 2025-08-28 16:57:35,943 [cuckoo.core.scheduler] DEBUG: Released database task #6920111 2025-08-28 16:57:35,963 [cuckoo.core.scheduler] INFO: Task #6920111: analysis procedure completed
description | (no description) | rule | DebuggerException__SetConsoleCtrl | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Anti-Sandbox checks for ThreatExpert | rule | antisb_threatExpert | ||||||
description | Code injection with CreateRemoteThread in a remote process | rule | inject_thread | ||||||
description | Listen for incoming communication | rule | network_tcp_listen | ||||||
description | Communications over RAW socket | rule | network_tcp_socket | ||||||
description | Escalade priviledges | rule | escalate_priv | ||||||
description | Create or check mutex | rule | win_mutex | ||||||
description | Affect system registries | rule | win_registry | ||||||
description | Affect system token | rule | win_token |
pdb_path | shvlzm.pdb |
resource name | MUI |
section | {u'size_of_data': u'0x00013000', u'virtual_address': u'0x00007000', u'entropy': 7.239557676805926, u'name': u'.rsrc', u'virtual_size': u'0x00012e30'} | entropy | 7.23955767681 | description | A section with a high entropy has been found | |||||||||
entropy | 0.826086956522 | description | Overall entropy of this PE file is high |
Avast Core Security (Linux) | Win64:Malware-gen |
C4S ClamAV (Linux) | Win.Malware.Ipamor-9935088-0 |
WithSecure (Linux) | Heuristic.HEUR/AGEN.1312890 |
ClamAV (Linux) | Win.Malware.Ipamor-9935088-0 |
Bkav | W64.AIDetectMalware |
tehtris | Generic.Malware |
Cynet | Malicious (score: 100) |
Skyhigh | BehavesLike.Win64.AdwareInstCap.jh |
Cylance | Unsafe |
Sangfor | Trojan.Win32.Save.a |
CrowdStrike | win/malicious_confidence_60% (D) |
K7GW | Riskware ( 00584baa1 ) |
K7AntiVirus | Riskware ( 00584baa1 ) |
Symantec | ML.Attribute.HighConfidence |
Elastic | malicious (high confidence) |
APEX | Malicious |
Avast | Win64:Malware-gen |
ClamAV | Win.Malware.Ipamor-9935088-0 |
F-Secure | Heuristic.HEUR/AGEN.1312890 |
McAfeeD | Real Protect-LS!C9CFD746C986 |
Sophos | Generic ML PUA (PUA) |
SentinelOne | Static AI - Malicious PE |
Detected | |
Avira | HEUR/AGEN.1312890 |
Microsoft | Trojan:Win32/Wacatac.B!ml |
Varist | W64/Ipamor.AA.gen!Eldorado |
DeepInstinct | MALICIOUS |
Malwarebytes | VB.Trojan.Generic.DDS |
TrellixENS | Artemis!C9CFD746C986 |
MaxSecure | Trojan.Malware.121218.susgen |
Fortinet | W64/Agent.3759!tr |
AVG | Win64:Malware-gen |
alibabacloud | Trojan:Win/Wacapew.99adcfbf |