| Size | 879.9KB |
|---|---|
| Type | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5 | c4c2d0125bbc6569994eae6ae8e43c97 |
| SHA1 | 73f2c308438a37e65e055a190f5ef588f7de88ae |
| SHA256 | 8315631b3565adff22c7f1420e7b708ba5cca6ce5844ddc707016ec4b10deed7 |
| SHA512 |
d670f1fff57fe50c4a88f8b00d14bdfb613906db1d91cd1a61591bc756a06c4e7962ac242dbba1cbde98d6c358d85e17c806f637d5d85e9ccefb074ad311980c
|
| CRC32 | 1D201D0C |
| ssdeep | None |
| Yara |
|
This file is very suspicious, with a score of 9.1 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
| Category | Started | Completed | Duration | Routing | Logs |
|---|---|---|---|---|---|
| FILE | Dec. 7, 2025, 2:18 p.m. | Dec. 7, 2025, 2:19 p.m. | 66 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-12-07 13:18:40,015 [analyzer] DEBUG: Starting analyzer from: C:\tmp2zg5xi 2025-12-07 13:18:40,030 [analyzer] DEBUG: Pipe server name: \??\PIPE\rlQsZmPdtBdbXyyBaS 2025-12-07 13:18:40,030 [analyzer] DEBUG: Log pipe server name: \??\PIPE\DbeFVKmguCOCtptgrbtsKaJQcXzybR 2025-12-07 13:18:40,405 [analyzer] DEBUG: Started auxiliary module Curtain 2025-12-07 13:18:40,405 [analyzer] DEBUG: Started auxiliary module DbgView 2025-12-07 13:18:40,858 [analyzer] DEBUG: Started auxiliary module Disguise 2025-12-07 13:18:41,078 [analyzer] DEBUG: Loaded monitor into process with pid 512 2025-12-07 13:18:41,078 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-12-07 13:18:41,078 [analyzer] DEBUG: Started auxiliary module Human 2025-12-07 13:18:41,078 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-12-07 13:18:41,078 [analyzer] DEBUG: Started auxiliary module Reboot 2025-12-07 13:18:41,155 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-12-07 13:18:41,155 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-12-07 13:18:41,155 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-12-07 13:18:41,171 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-12-07 13:18:41,312 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\AV.scr' with arguments '' and pid 2936 2025-12-07 13:18:41,483 [analyzer] DEBUG: Loaded monitor into process with pid 2936 2025-12-07 13:19:44,713 [analyzer] INFO: Analysis timeout hit, terminating analysis. 2025-12-07 13:19:45,104 [analyzer] INFO: Terminating remaining processes before shutdown. 2025-12-07 13:19:45,104 [lib.api.process] INFO: Successfully terminated process with pid 2936. 2025-12-07 13:19:45,104 [analyzer] INFO: Analysis completed.
2025-12-07 14:18:51,516 [cuckoo.core.scheduler] INFO: Task #7215821: acquired machine win7x6410 (label=win7x6410) 2025-12-07 14:18:51,517 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.210 for task #7215821 2025-12-07 14:18:51,958 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 3662385 (interface=vboxnet0, host=192.168.168.210) 2025-12-07 14:18:54,048 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x6410 2025-12-07 14:18:55,591 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x6410 to vmcloak 2025-12-07 14:19:06,755 [cuckoo.core.guest] INFO: Starting analysis #7215821 on guest (id=win7x6410, ip=192.168.168.210) 2025-12-07 14:19:07,764 [cuckoo.core.guest] DEBUG: win7x6410: not ready yet 2025-12-07 14:19:12,801 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x6410, ip=192.168.168.210) 2025-12-07 14:19:12,875 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x6410, ip=192.168.168.210, monitor=latest, size=6660546) 2025-12-07 14:19:14,361 [cuckoo.core.resultserver] DEBUG: Task #7215821: live log analysis.log initialized. 2025-12-07 14:19:15,413 [cuckoo.core.resultserver] DEBUG: Task #7215821 is sending a BSON stream 2025-12-07 14:19:15,802 [cuckoo.core.resultserver] DEBUG: Task #7215821 is sending a BSON stream 2025-12-07 14:19:16,679 [cuckoo.core.resultserver] DEBUG: Task #7215821: File upload for 'shots/0001.jpg' 2025-12-07 14:19:16,695 [cuckoo.core.resultserver] DEBUG: Task #7215821 uploaded file length: 137956 2025-12-07 14:19:28,932 [cuckoo.core.guest] DEBUG: win7x6410: analysis #7215821 still processing 2025-12-07 14:19:44,972 [cuckoo.core.resultserver] DEBUG: Task #7215821: File upload for 'curtain/1765109984.96.curtain.log' 2025-12-07 14:19:44,975 [cuckoo.core.resultserver] DEBUG: Task #7215821 uploaded file length: 36 2025-12-07 14:19:45,096 [cuckoo.core.resultserver] DEBUG: Task #7215821: File upload for 'sysmon/1765109985.09.sysmon.xml' 2025-12-07 14:19:45,101 [cuckoo.core.resultserver] DEBUG: Task #7215821 uploaded file length: 176114 2025-12-07 14:19:45,709 [cuckoo.core.resultserver] DEBUG: Task #7215821: File upload for 'shots/0002.jpg' 2025-12-07 14:19:45,720 [cuckoo.core.resultserver] DEBUG: Task #7215821 uploaded file length: 133459 2025-12-07 14:19:45,737 [cuckoo.core.resultserver] DEBUG: Task #7215821 had connection reset for <Context for LOG> 2025-12-07 14:19:46,708 [cuckoo.core.guest] INFO: win7x6410: analysis completed successfully 2025-12-07 14:19:46,723 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-12-07 14:19:46,744 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-12-07 14:19:47,945 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x6410 to path /srv/cuckoo/cwd/storage/analyses/7215821/memory.dmp 2025-12-07 14:19:47,948 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x6410 2025-12-07 14:19:57,832 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.210 for task #7215821 2025-12-07 14:19:58,206 [cuckoo.core.scheduler] DEBUG: Released database task #7215821 2025-12-07 14:19:58,231 [cuckoo.core.scheduler] INFO: Task #7215821: analysis procedure completed
| description | (no description) | rule | APT32_KerrDown | ||||||
| description | Detect PE file produced by pyinstaller | rule | PE_File_pyinstaller | ||||||
| description | (no description) | rule | DebuggerException__SetConsoleCtrl | ||||||
| description | Checks if being debugged | rule | anti_dbg | ||||||
| description | Affect private profile | rule | win_files_operation | ||||||
| section | .gfids |
| section | {u'size_of_data': u'0x00010800', u'virtual_address': u'0x0003c000', u'entropy': 7.255045319856109, u'name': u'.rsrc', u'virtual_size': u'0x00010608'} | entropy | 7.25504531986 | description | A section with a high entropy has been found | |||||||||
| entropy | 0.272164948454 | description | Overall entropy of this PE file is high | |||||||||||
| G Data Antivirus (Windows) | Virus: Trojan.GenericKD.77505366 (Engine A), Win32.Trojan.PSE.1STT3VZ (Engine B) |
| Avast Core Security (Linux) | Win32:Malware-gen |
| C4S ClamAV (Linux) | Win.Malware.Ymacco-9950875-0 |
| eScan Antivirus (Linux) | Trojan.GenericKD.77505366(DB) |
| DrWeb Antivirus (Linux) | Trojan.BtcMine.3428 |
| ClamAV (Linux) | Win.Malware.Ymacco-9950875-0 |
| Bitdefender Antivirus (Linux) | Trojan.GenericKD.77505366 |
| Emsisoft Commandline Scanner (Windows) | Trojan.GenericKD.77505366 (B) |