Size | 19.5KB |
---|---|
Type | PE32+ executable (DLL) (native) x86-64, for MS Windows |
MD5 | 2914300a6e0cdf7ed242505958ac0bb5 |
SHA1 | 684103f5c312ae956e66a02b965d9aad59710745 |
SHA256 | 29ae6f149e581f8dbdc01eed2d5d20b82b597c4b4c7e102cab6d012b168df4d8 |
SHA512 |
6fa6b773275e61596f1d4885fa3089ff24a2f72166dc0a2c40667f0bd03de26b032f2a39aa05e74077ada96bbb6b0785424bfe387b995c147fd74860a11948c9
|
CRC32 | EFDE77F2 |
ssdeep | None |
Yara | None matched |
This file is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | Feb. 11, 2024, 5:55 a.m. | Feb. 11, 2024, 6:48 a.m. | 3180 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2024-02-11 04:50:40,015 [analyzer] DEBUG: Starting analyzer from: C:\tmpl4240h 2024-02-11 04:50:40,015 [analyzer] DEBUG: Pipe server name: \??\PIPE\jsDHJDjOzurOVPMtYODJGdeXEn 2024-02-11 04:50:40,015 [analyzer] DEBUG: Log pipe server name: \??\PIPE\hfelOdKUOBGCjHbmNjyZbQmu 2024-02-11 04:50:40,217 [analyzer] DEBUG: Started auxiliary module Curtain 2024-02-11 04:50:40,217 [analyzer] DEBUG: Started auxiliary module DbgView 2024-02-11 04:50:40,546 [analyzer] DEBUG: Started auxiliary module Disguise 2024-02-11 04:50:40,750 [analyzer] DEBUG: Loaded monitor into process with pid 508 2024-02-11 04:50:40,750 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2024-02-11 04:50:40,750 [analyzer] DEBUG: Started auxiliary module Human 2024-02-11 04:50:40,750 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2024-02-11 04:50:40,750 [analyzer] DEBUG: Started auxiliary module Reboot 2024-02-11 04:50:40,796 [analyzer] DEBUG: Started auxiliary module RecentFiles 2024-02-11 04:50:40,796 [analyzer] DEBUG: Started auxiliary module Screenshots 2024-02-11 04:50:40,796 [analyzer] DEBUG: Started auxiliary module Sysmon 2024-02-11 04:50:40,812 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2024-02-11 04:50:40,842 [lib.api.process] ERROR: Failed to execute process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\x64.dll' with arguments ['bin\\inject-x64.exe', '--app', u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\x64.dll', '--only-start', '--curdir', 'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp'] (Error: Command '['bin\\inject-x64.exe', '--app', u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\x64.dll', '--only-start', '--curdir', 'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp']' returned non-zero exit status 1)
2024-02-11 05:55:41,918 [cuckoo.core.scheduler] INFO: Task #4506864: acquired machine win7x649 (label=win7x649) 2024-02-11 05:55:41,919 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.209 for task #4506864 2024-02-11 05:56:59,830 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 336711 (interface=vboxnet0, host=192.168.168.209) 2024-02-11 05:57:00,137 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x649 2024-02-11 05:58:20,372 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x649 to vmcloak 2024-02-11 06:22:42,957 [cuckoo.core.guest] INFO: Starting analysis #4506864 on guest (id=win7x649, ip=192.168.168.209) 2024-02-11 06:22:42,972 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x649, ip=192.168.168.209) 2024-02-11 06:22:43,031 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x649, ip=192.168.168.209, monitor=latest, size=6660546) 2024-02-11 06:22:43,969 [cuckoo.core.resultserver] DEBUG: Task #4506864: live log analysis.log initialized. 2024-02-11 06:22:44,648 [cuckoo.core.resultserver] DEBUG: Task #4506864 is sending a BSON stream 2024-02-11 06:22:45,859 [cuckoo.core.resultserver] DEBUG: Task #4506864: File upload for 'shots/0001.jpg' 2024-02-11 06:22:45,871 [cuckoo.core.resultserver] DEBUG: Task #4506864 uploaded file length: 133469 2024-02-11 06:22:46,656 [cuckoo.core.guest] WARNING: win7x649: analysis #4506864 caught an exception Traceback (most recent call last): File "C:/tmpl4240h/analyzer.py", line 824, in <module> success = analyzer.run() File "C:/tmpl4240h/analyzer.py", line 673, in run pids = self.package.start(self.target) File "C:\tmpl4240h\modules\packages\exe.py", line 34, in start return self.execute(path, args=shlex.split(args)) File "C:\tmpl4240h\lib\common\abstracts.py", line 205, in execute "Unable to execute the initial process, analysis aborted." CuckooPackageError: Unable to execute the initial process, analysis aborted. 2024-02-11 06:22:46,668 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2024-02-11 06:22:46,720 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2024-02-11 06:25:21,625 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x649 to path /srv/cuckoo/cwd/storage/analyses/4506864/memory.dmp 2024-02-11 06:25:21,628 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x649 2024-02-11 06:41:53,909 [cuckoo.core.resultserver] DEBUG: Task #4506864: File upload for 'shots/0002.jpg' 2024-02-11 06:41:53,933 [cuckoo.core.resultserver] DEBUG: Task #4506864 uploaded file length: 140005 2024-02-11 06:48:41,497 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.209 for task #4506864 2024-02-11 06:48:41,498 [cuckoo.core.resultserver] DEBUG: Cancel <Context for LOG> for task 4506864 2024-02-11 06:48:41,656 [cuckoo.core.scheduler] DEBUG: Released database task #4506864 2024-02-11 06:48:41,671 [cuckoo.core.scheduler] INFO: Task #4506864: analysis procedure completed
G Data Antivirus (Windows) | Virus: Application.Hacktool.BBJ (Engine A) |
Windows Defender (Windows) | HackTool:Win64/AutoKMS!MSR |
Microsoft Defender ATP (Linux) | HackTool:Win64/AutoKms |
eScan Antivirus (Linux) | Application.Hacktool.BBJ(DB) |
Bitdefender Antivirus (Linux) | Application.Hacktool.BBJ |
Kaspersky Standard (Windows) | HackTool.Win64.KMSAuto.ac |
Bkav | W64.AIDetectMalware |
Lionic | Hacktool.Win32.KMSAuto.3!c |
Cynet | Malicious (score: 100) |
CAT-QuickHeal | HackTool.Win64CiR |
Skyhigh | Generic pup.cpe |
ALYac | Application.Hacktool.BBJ |
Cylance | unsafe |
VIPRE | Application.Hacktool.BBJ |
CrowdStrike | win/grayware_confidence_100% (W) |
BitDefender | Application.Hacktool.BBJ |
K7GW | Riskware ( 00584baa1 ) |
K7AntiVirus | Riskware ( 00584baa1 ) |
Arcabit | Application.Hacktool.BBJ |
McAfee | Generic pup.cpe |
Kaspersky | HackTool.Win64.KMSAuto.ac |
Alibaba | HackTool:Win64/KMSAuto.4ecb8b1b |
MicroWorld-eScan | Application.Hacktool.BBJ |
Rising | Hacktool.KMSAuto!8.3AE (CLOUD) |
Emsisoft | Application.Hacktool.BBJ (B) |
Zillya | Tool.KMSAuto.Win64.203 |
TrendMicro | HackTool.Win64.AutoKMS.GAR.component |
FireEye | Application.Hacktool.BBJ |
Sophos | KMS Activator (PUA) |
Ikarus | PUA.Hacktool.KMS |
Jiangmin | HackTool.KMSAuto.agi |
Webroot | W32.Malware.Gen |
Detected | |
Microsoft | HackTool:Win64/AutoKMS!MSR |
ZoneAlarm | HackTool.Win64.KMSAuto.ac |
GData | Application.Hacktool.BBJ |
Varist | W64/ABApplication.PPWM-2423 |
DeepInstinct | MALICIOUS |
Panda | HackingTool/AutoKMS |
TrendMicro-HouseCall | HackTool.Win64.AutoKMS.GAR.component |
MaxSecure | Trojan.Malware.106413943.susgen |