| Size | 1.4MB |
|---|---|
| Type | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5 | 12da3f86fe78aca979456a6c0f76c40c |
| SHA1 | 3f2135cfac2d3fb9c6959f45d828eb5b8d507f02 |
| SHA256 | aa29845a8fd2cc86ed68cacecceef08ade75527e945bc4a5a2b48f9b7cc5cd54 |
| SHA512 |
dc757f1fe5512c832d6f4b655fa8ef666026fe3c3294ba7b198132864014b37e584b0237918ddb01125760f617554596bfd5a367537e8e992ed49ea5fcdcdc17
|
| CRC32 | 3390860D |
| ssdeep | None |
| Yara |
|
This file is very suspicious, with a score of 9.1 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
| Category | Started | Completed | Duration | Routing | Logs |
|---|---|---|---|---|---|
| FILE | Dec. 7, 2025, 2:49 p.m. | Dec. 7, 2025, 2:50 p.m. | 67 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-12-07 13:49:40,015 [analyzer] DEBUG: Starting analyzer from: C:\tmpk4d6bl 2025-12-07 13:49:40,015 [analyzer] DEBUG: Pipe server name: \??\PIPE\obKNELsWysePOypSQDk 2025-12-07 13:49:40,015 [analyzer] DEBUG: Log pipe server name: \??\PIPE\qByoBtFYODVeHmiiAXQNMHifcEtUVQTf 2025-12-07 13:49:40,312 [analyzer] DEBUG: Started auxiliary module Curtain 2025-12-07 13:49:40,312 [analyzer] DEBUG: Started auxiliary module DbgView 2025-12-07 13:49:40,765 [analyzer] DEBUG: Started auxiliary module Disguise 2025-12-07 13:49:40,953 [analyzer] DEBUG: Loaded monitor into process with pid 512 2025-12-07 13:49:40,953 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-12-07 13:49:40,953 [analyzer] DEBUG: Started auxiliary module Human 2025-12-07 13:49:40,953 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-12-07 13:49:40,953 [analyzer] DEBUG: Started auxiliary module Reboot 2025-12-07 13:49:41,030 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-12-07 13:49:41,030 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-12-07 13:49:41,030 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-12-07 13:49:41,030 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-12-07 13:49:41,265 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\AV.scr' with arguments '' and pid 556 2025-12-07 13:49:41,467 [analyzer] DEBUG: Loaded monitor into process with pid 556 2025-12-07 13:50:46,894 [analyzer] INFO: Analysis timeout hit, terminating analysis. 2025-12-07 13:50:47,223 [analyzer] INFO: Terminating remaining processes before shutdown. 2025-12-07 13:50:47,223 [lib.api.process] INFO: Successfully terminated process with pid 556. 2025-12-07 13:50:47,223 [analyzer] INFO: Analysis completed.
2025-12-07 14:49:52,815 [cuckoo.core.scheduler] INFO: Task #7215841: acquired machine win7x6422 (label=win7x6422) 2025-12-07 14:49:52,815 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.222 for task #7215841 2025-12-07 14:49:53,188 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 3689180 (interface=vboxnet0, host=192.168.168.222) 2025-12-07 14:49:53,826 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x6422 2025-12-07 14:49:55,288 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x6422 to vmcloak 2025-12-07 14:50:09,057 [cuckoo.core.guest] INFO: Starting analysis #7215841 on guest (id=win7x6422, ip=192.168.168.222) 2025-12-07 14:50:10,064 [cuckoo.core.guest] DEBUG: win7x6422: not ready yet 2025-12-07 14:50:15,096 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x6422, ip=192.168.168.222) 2025-12-07 14:50:15,164 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x6422, ip=192.168.168.222, monitor=latest, size=6660546) 2025-12-07 14:50:16,579 [cuckoo.core.resultserver] DEBUG: Task #7215841: live log analysis.log initialized. 2025-12-07 14:50:17,508 [cuckoo.core.resultserver] DEBUG: Task #7215841 is sending a BSON stream 2025-12-07 14:50:17,991 [cuckoo.core.resultserver] DEBUG: Task #7215841 is sending a BSON stream 2025-12-07 14:50:18,800 [cuckoo.core.resultserver] DEBUG: Task #7215841: File upload for 'shots/0001.jpg' 2025-12-07 14:50:18,815 [cuckoo.core.resultserver] DEBUG: Task #7215841 uploaded file length: 137942 2025-12-07 14:50:31,032 [cuckoo.core.guest] DEBUG: win7x6422: analysis #7215841 still processing 2025-12-07 14:50:46,118 [cuckoo.core.guest] DEBUG: win7x6422: analysis #7215841 still processing 2025-12-07 14:50:47,108 [cuckoo.core.resultserver] DEBUG: Task #7215841: File upload for 'curtain/1765111847.1.curtain.log' 2025-12-07 14:50:47,112 [cuckoo.core.resultserver] DEBUG: Task #7215841 uploaded file length: 36 2025-12-07 14:50:47,224 [cuckoo.core.resultserver] DEBUG: Task #7215841: File upload for 'sysmon/1765111847.21.sysmon.xml' 2025-12-07 14:50:47,229 [cuckoo.core.resultserver] DEBUG: Task #7215841 uploaded file length: 122972 2025-12-07 14:50:47,756 [cuckoo.core.resultserver] DEBUG: Task #7215841: File upload for 'shots/0002.jpg' 2025-12-07 14:50:47,766 [cuckoo.core.resultserver] DEBUG: Task #7215841 uploaded file length: 133451 2025-12-07 14:50:47,781 [cuckoo.core.resultserver] DEBUG: Task #7215841 had connection reset for <Context for LOG> 2025-12-07 14:50:49,131 [cuckoo.core.guest] INFO: win7x6422: analysis completed successfully 2025-12-07 14:50:49,145 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-12-07 14:50:49,178 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-12-07 14:50:50,629 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x6422 to path /srv/cuckoo/cwd/storage/analyses/7215841/memory.dmp 2025-12-07 14:50:50,633 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x6422 2025-12-07 14:50:59,362 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.222 for task #7215841 2025-12-07 14:50:59,690 [cuckoo.core.scheduler] DEBUG: Released database task #7215841 2025-12-07 14:50:59,711 [cuckoo.core.scheduler] INFO: Task #7215841: analysis procedure completed
| description | (no description) | rule | APT32_KerrDown | ||||||
| description | Detect PE file produced by pyinstaller | rule | PE_File_pyinstaller | ||||||
| description | (no description) | rule | DebuggerException__SetConsoleCtrl | ||||||
| description | Checks if being debugged | rule | anti_dbg | ||||||
| description | Affect private profile | rule | win_files_operation | ||||||
| section | .gfids |
| section | {u'size_of_data': u'0x00010800', u'virtual_address': u'0x0003c000', u'entropy': 7.255045319856109, u'name': u'.rsrc', u'virtual_size': u'0x00010608'} | entropy | 7.25504531986 | description | A section with a high entropy has been found | |||||||||
| entropy | 0.272164948454 | description | Overall entropy of this PE file is high | |||||||||||
| G Data Antivirus (Windows) | Virus: Trojan.GenericKD.77505366 (Engine A), Win32.Trojan.PSE.1STT3VZ (Engine B) |
| Avast Core Security (Linux) | Win32:Malware-gen |
| C4S ClamAV (Linux) | Win.Malware.Ymacco-9950875-0 |
| eScan Antivirus (Linux) | Trojan.GenericKD.77505366(DB) |
| DrWeb Antivirus (Linux) | Trojan.BtcMine.3428 |
| ClamAV (Linux) | Win.Malware.Ymacco-9950875-0 |
| Bitdefender Antivirus (Linux) | Trojan.GenericKD.77505366 |
| Emsisoft Commandline Scanner (Windows) | Trojan.GenericKD.77505366 (B) |