Size | 315.8MB |
---|---|
Type | Unicode text, UTF-8 text, with very long lines (305), with CRLF line terminators |
MD5 | 5f037f63b946307d29ce35fc1bda6890 |
SHA1 | 490023ba0e5b4f6805f9b03bcee80afd79dea446 |
SHA256 | d5a1265d9f42f9089dc99f8ce10e172a3d5ca1db781623559eb2bd8c5d0ef78c |
SHA512 |
00a2c3fbc5ea51275b301f75b66c420784ab221da8664075eccd391459c6d4a32518f410bd2f710922854957856e7d105ec767822f55c3a8d8841b4f71a4ad95
|
CRC32 | 24EA0C79 |
ssdeep | None |
Yara | None matched |
This archive shows some signs of potential malicious behavior.
The score of this archive is 1.7 out of 10.
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
ARCHIVE | Sept. 21, 2025, 10:11 a.m. | Sept. 21, 2025, 10:12 a.m. | 90 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-09-21 10:11:14,905 [analyzer] DEBUG: Starting analyzer from: C:\tmpblqbwr 2025-09-21 10:11:14,905 [analyzer] DEBUG: Pipe server name: \??\PIPE\snpcKacntjUqGpFuxQRzjILe 2025-09-21 10:11:14,905 [analyzer] DEBUG: Log pipe server name: \??\PIPE\UeAggFoLyFnOvcDVp 2025-09-21 10:11:14,905 [analyzer] DEBUG: No analysis package specified, trying to detect it automagically. 2025-09-21 10:11:14,905 [analyzer] INFO: Automatically selected analysis package "ie" 2025-09-21 10:11:15,250 [analyzer] DEBUG: Started auxiliary module Curtain 2025-09-21 10:11:15,250 [analyzer] DEBUG: Started auxiliary module DbgView 2025-09-21 10:11:15,687 [analyzer] DEBUG: Started auxiliary module Disguise 2025-09-21 10:11:15,905 [analyzer] DEBUG: Loaded monitor into process with pid 504 2025-09-21 10:11:15,905 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-09-21 10:11:15,905 [analyzer] DEBUG: Started auxiliary module Human 2025-09-21 10:11:15,905 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-09-21 10:11:15,905 [analyzer] DEBUG: Started auxiliary module Reboot 2025-09-21 10:11:16,062 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-09-21 10:11:16,062 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-09-21 10:11:16,062 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-09-21 10:11:16,062 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-09-21 10:11:16,062 [modules.packages.ie] INFO: Submitted file is missing extension, adding .html 2025-09-21 10:11:16,155 [lib.api.process] INFO: Successfully executed process from path 'C:\\Program Files\\Internet Explorer\\iexplore.exe' with arguments ['C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\diia_citizen_db_2025.csv.html'] and pid 2112 2025-09-21 10:11:16,296 [analyzer] DEBUG: Loaded monitor into process with pid 2112 2025-09-21 10:11:17,796 [analyzer] DEBUG: Following legitimate IE11 process: "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2112 CREDAT:275457 /prefetch:2! 2025-09-21 10:11:17,858 [analyzer] INFO: Injected into process with pid 2656 and name u'iexplore.exe' 2025-09-21 10:11:17,967 [lib.api.process] ERROR: Failed to dump memory of 32-bit process with pid 2656. 2025-09-21 10:11:18,108 [analyzer] INFO: Added new file to list with pid 2112 and path C:\Users\Administrator\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{8B528BF1-96C2-11F0-A5CD-D8386987CDBA}.dat 2025-09-21 10:11:18,140 [analyzer] DEBUG: Loaded monitor into process with pid 2656 2025-09-21 10:11:18,171 [analyzer] INFO: Added new file to list with pid 2112 and path C:\Users\Administrator\AppData\Local\Temp\~DF4E6AEF7FB0943320.TMP 2025-09-21 10:11:18,328 [analyzer] DEBUG: Error resolving function mshtml!CDocument_write through our custom callback. 2025-09-21 10:11:18,328 [analyzer] DEBUG: Error resolving function mshtml!CElement_put_innerHTML through our custom callback. 2025-09-21 10:11:18,328 [analyzer] DEBUG: Error resolving function mshtml!CHyperlink_SetUrlComponent through our custom callback. 2025-09-21 10:11:18,328 [analyzer] DEBUG: Error resolving function mshtml!CIFrameElement_CreateElement through our custom callback. 2025-09-21 10:11:18,328 [analyzer] DEBUG: Error resolving function mshtml!CImgElement_put_src through our custom callback. 2025-09-21 10:11:18,328 [analyzer] DEBUG: Error resolving function mshtml!CScriptElement_put_src through our custom callback. 2025-09-21 10:11:18,328 [analyzer] DEBUG: Error resolving function mshtml!CWindow_AddTimeoutCode through our custom callback. 2025-09-21 10:11:18,342 [analyzer] DEBUG: Error resolving function mshtml!CDocument_write through our custom callback. 2025-09-21 10:11:18,342 [analyzer] DEBUG: Error resolving function mshtml!CElement_put_innerHTML through our custom callback. 2025-09-21 10:11:18,342 [analyzer] DEBUG: Error resolving function mshtml!CHyperlink_SetUrlComponent through our custom callback. 2025-09-21 10:11:18,342 [analyzer] DEBUG: Error resolving function mshtml!CIFrameElement_CreateElement through our custom callback. 2025-09-21 10:11:18,342 [analyzer] DEBUG: Error resolving function mshtml!CImgElement_put_src through our custom callback. 2025-09-21 10:11:18,342 [analyzer] DEBUG: Error resolving function mshtml!CScriptElement_put_src through our custom callback. 2025-09-21 10:11:18,342 [analyzer] DEBUG: Error resolving function mshtml!CWindow_AddTimeoutCode through our custom callback. 2025-09-21 10:11:18,796 [analyzer] INFO: Added new file to list with pid 2112 and path C:\Users\Administrator\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{8B528BF3-96C2-11F0-A5CD-D8386987CDBA}.dat 2025-09-21 10:11:18,828 [analyzer] INFO: Added new file to list with pid 2112 and path C:\Users\Administrator\AppData\Local\Temp\~DF012F482454C37EB5.TMP 2025-09-21 10:11:18,905 [analyzer] DEBUG: Error resolving function mshtml!CDocument_write through our custom callback. 2025-09-21 10:11:18,905 [analyzer] DEBUG: Error resolving function mshtml!CElement_put_innerHTML through our custom callback. 2025-09-21 10:11:18,905 [analyzer] DEBUG: Error resolving function mshtml!CHyperlink_SetUrlComponent through our custom callback. 2025-09-21 10:11:18,905 [analyzer] DEBUG: Error resolving function mshtml!CIFrameElement_CreateElement through our custom callback. 2025-09-21 10:11:18,921 [analyzer] DEBUG: Error resolving function mshtml!CImgElement_put_src through our custom callback. 2025-09-21 10:11:18,921 [analyzer] DEBUG: Error resolving function mshtml!CScriptElement_put_src through our custom callback. 2025-09-21 10:11:18,921 [analyzer] DEBUG: Error resolving function mshtml!CWindow_AddTimeoutCode through our custom callback. 2025-09-21 09:12:31,200 [analyzer] INFO: Analysis timeout hit, terminating analysis. 2025-09-21 09:12:31,418 [lib.api.process] ERROR: Failed to dump memory of 64-bit process with pid 2112. 2025-09-21 09:12:31,466 [lib.api.process] ERROR: Failed to dump memory of 32-bit process with pid 2656. 2025-09-21 09:12:31,621 [analyzer] INFO: Terminating remaining processes before shutdown. 2025-09-21 09:12:31,621 [lib.api.process] INFO: Successfully terminated process with pid 2112. 2025-09-21 09:12:31,621 [lib.api.process] INFO: Successfully terminated process with pid 2656. 2025-09-21 09:12:31,621 [analyzer] INFO: Error dumping file from path "c:\users\administrator\appdata\local\temp\~df4e6aef7fb0943320.tmp": [Errno 13] Permission denied: u'c:\\users\\administrator\\appdata\\local\\temp\\~df4e6aef7fb0943320.tmp' 2025-09-21 09:12:31,637 [analyzer] WARNING: File at path u'c:\\users\\administrator\\appdata\\local\\temp\\~df012f482454c37eb5.tmp' does not exist, skip. 2025-09-21 09:12:31,637 [analyzer] INFO: Analysis completed.
2025-09-21 10:11:22,035 [cuckoo.core.scheduler] INFO: Task #6977316: acquired machine win7x6418 (label=win7x6418) 2025-09-21 10:11:22,037 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.218 for task #6977316 2025-09-21 10:11:22,953 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 1171964 (interface=vboxnet0, host=192.168.168.218) 2025-09-21 10:11:22,980 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x6418 2025-09-21 10:11:24,299 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x6418 to vmcloak 2025-09-21 10:11:36,183 [cuckoo.core.guest] INFO: Starting analysis #6977316 on guest (id=win7x6418, ip=192.168.168.218) 2025-09-21 10:11:37,190 [cuckoo.core.guest] DEBUG: win7x6418: not ready yet 2025-09-21 10:11:42,214 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x6418, ip=192.168.168.218) 2025-09-21 10:11:42,291 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x6418, ip=192.168.168.218, monitor=latest, size=6660546) 2025-09-21 10:11:59,020 [cuckoo.core.resultserver] DEBUG: Task #6977316: live log analysis.log initialized. 2025-09-21 10:12:01,873 [cuckoo.core.resultserver] DEBUG: Task #6977316 is sending a BSON stream 2025-09-21 10:12:02,262 [cuckoo.core.resultserver] DEBUG: Task #6977316 is sending a BSON stream 2025-09-21 10:12:03,203 [cuckoo.core.resultserver] DEBUG: Task #6977316: File upload for 'shots/0001.jpg' 2025-09-21 10:12:03,225 [cuckoo.core.resultserver] DEBUG: Task #6977316 uploaded file length: 133506 2025-09-21 10:12:04,108 [cuckoo.core.resultserver] DEBUG: Task #6977316 is sending a BSON stream 2025-09-21 10:12:05,363 [cuckoo.core.resultserver] DEBUG: Task #6977316: File upload for 'shots/0002.jpg' 2025-09-21 10:12:05,367 [cuckoo.core.resultserver] DEBUG: Task #6977316 uploaded file length: 24554 2025-09-21 10:12:14,375 [cuckoo.core.guest] DEBUG: win7x6418: analysis #6977316 still processing 2025-09-21 10:12:29,501 [cuckoo.core.guest] DEBUG: win7x6418: analysis #6977316 still processing 2025-09-21 10:12:31,563 [cuckoo.core.resultserver] DEBUG: Task #6977316: File upload for 'curtain/1758438751.56.curtain.log' 2025-09-21 10:12:31,566 [cuckoo.core.resultserver] DEBUG: Task #6977316 uploaded file length: 36 2025-09-21 10:12:32,028 [cuckoo.core.resultserver] DEBUG: Task #6977316: File upload for 'sysmon/1758438751.62.sysmon.xml' 2025-09-21 10:12:32,045 [cuckoo.core.resultserver] DEBUG: Task #6977316 uploaded file length: 108448 2025-09-21 10:12:32,049 [cuckoo.core.resultserver] DEBUG: Task #6977316: File upload for 'files/cb0676dd2321ce22_recoverystore.{8b528bf1-96c2-11f0-a5cd-d8386987cdba}.dat' 2025-09-21 10:12:32,053 [cuckoo.core.resultserver] DEBUG: Task #6977316 uploaded file length: 5120 2025-09-21 10:12:32,055 [cuckoo.core.resultserver] DEBUG: Task #6977316: File upload for 'files/53b266b792d2b3f0_{8b528bf3-96c2-11f0-a5cd-d8386987cdba}.dat' 2025-09-21 10:12:32,058 [cuckoo.core.resultserver] DEBUG: Task #6977316 uploaded file length: 3584 2025-09-21 10:12:32,108 [cuckoo.core.resultserver] DEBUG: Task #6977316: File upload for 'shots/0003.jpg' 2025-09-21 10:12:32,124 [cuckoo.core.resultserver] DEBUG: Task #6977316 uploaded file length: 133458 2025-09-21 10:12:32,136 [cuckoo.core.resultserver] DEBUG: Task #6977316 had connection reset for <Context for LOG> 2025-09-21 10:12:32,521 [cuckoo.core.guest] INFO: win7x6418: analysis completed successfully 2025-09-21 10:12:32,535 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-09-21 10:12:32,576 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-09-21 10:12:34,606 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x6418 to path /srv/cuckoo/cwd/storage/analyses/6977316/memory.dmp 2025-09-21 10:12:34,608 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x6418 2025-09-21 10:12:44,353 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.218 for task #6977316 2025-09-21 10:12:45,059 [cuckoo.core.scheduler] DEBUG: Released database task #6977316 2025-09-21 10:12:45,086 [cuckoo.core.scheduler] INFO: Task #6977316: analysis procedure completed
cmdline | "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2112 CREDAT:275457 /prefetch:2 |
count | 6952 | name | heapspray | process | iexplore.exe | total_mb | 434 | length | 65536 | protection | PAGE_READWRITE | ||||||||||||||||||
count | 4825 | name | heapspray | process | iexplore.exe | total_mb | 1206 | length | 262144 | protection | PAGE_READWRITE | ||||||||||||||||||
count | 2995 | name | heapspray | process | iexplore.exe | total_mb | 93 | length | 32768 | protection | PAGE_READWRITE |