Size | 4.4MB |
---|---|
Type | PE32 executable (GUI) Intel 80386, for MS Windows |
MD5 | 4928a5d5fc922394cd36c17a4cf32c4c |
SHA1 | 7b8df5025e16d0eb4a97b49013e4bdfb0e38e1fa |
SHA256 | 3847fecc10eae7a581cdd98c644dca9293e8dc889e6f42db16972b8598ed7015 |
SHA512 |
e719bc3ce0bb5d3b49c4a6ed06e51da28439c75f2bf313493be4e8559a3e26c12ccd1c5a94c7f0c1c22188d3a7ec5fd4331595b0843e04ffe7006910f3226043
|
CRC32 | CCF0A8E5 |
ssdeep | None |
Yara |
|
This file is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | Feb. 11, 2025, 8:46 p.m. | Feb. 11, 2025, 8:53 p.m. | 452 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-02-10 16:31:26,046 [analyzer] DEBUG: Starting analyzer from: C:\tmp4w2pkt 2025-02-10 16:31:26,108 [analyzer] DEBUG: Pipe server name: \??\PIPE\xPEeNiQJuDNzJAUPplKYaRLYJrmPR 2025-02-10 16:31:26,108 [analyzer] DEBUG: Log pipe server name: \??\PIPE\IGNUerPAKuljpVVMdnzDR 2025-02-10 16:31:26,562 [analyzer] DEBUG: Started auxiliary module Curtain 2025-02-10 16:31:26,562 [analyzer] DEBUG: Started auxiliary module DbgView 2025-02-10 16:31:27,328 [analyzer] DEBUG: Started auxiliary module Disguise 2025-02-10 16:31:27,546 [analyzer] DEBUG: Loaded monitor into process with pid 508 2025-02-10 16:31:27,546 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-02-10 16:31:27,546 [analyzer] DEBUG: Started auxiliary module Human 2025-02-10 16:31:27,546 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-02-10 16:31:27,546 [analyzer] DEBUG: Started auxiliary module Reboot 2025-02-10 16:31:27,640 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-02-10 16:31:27,640 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-02-10 16:31:27,640 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-02-10 16:31:27,640 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-02-10 16:31:27,953 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\3847fecc10eae7a581cdd98c644dca9293e8dc889e6f42db16972b8598ed7015.exe' with arguments '' and pid 1944 2025-02-10 16:31:28,187 [analyzer] DEBUG: Loaded monitor into process with pid 1944 2025-02-10 16:31:56,953 [analyzer] INFO: Analysis timeout hit, terminating analysis. 2025-02-10 16:31:57,405 [analyzer] INFO: Terminating remaining processes before shutdown. 2025-02-10 16:31:57,421 [lib.api.process] INFO: Successfully terminated process with pid 1944. 2025-02-10 16:31:57,421 [analyzer] INFO: Analysis completed.
2025-02-11 20:46:22,478 [cuckoo.core.scheduler] INFO: Task #5923320: acquired machine win7x6423 (label=win7x6423) 2025-02-11 20:46:22,479 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.223 for task #5923320 2025-02-11 20:46:22,850 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 2754476 (interface=vboxnet0, host=192.168.168.223) 2025-02-11 20:46:27,427 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x6423 2025-02-11 20:46:28,092 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x6423 to vmcloak 2025-02-11 20:49:43,328 [cuckoo.core.guest] INFO: Starting analysis #5923320 on guest (id=win7x6423, ip=192.168.168.223) 2025-02-11 20:49:44,338 [cuckoo.core.guest] DEBUG: win7x6423: not ready yet 2025-02-11 20:49:49,370 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x6423, ip=192.168.168.223) 2025-02-11 20:49:49,477 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x6423, ip=192.168.168.223, monitor=latest, size=6660546) 2025-02-11 20:49:51,282 [cuckoo.core.resultserver] DEBUG: Task #5923320: live log analysis.log initialized. 2025-02-11 20:49:52,780 [cuckoo.core.resultserver] DEBUG: Task #5923320 is sending a BSON stream 2025-02-11 20:49:53,389 [cuckoo.core.resultserver] DEBUG: Task #5923320 is sending a BSON stream 2025-02-11 20:49:54,219 [cuckoo.core.resultserver] DEBUG: Task #5923320: File upload for 'shots/0001.jpg' 2025-02-11 20:49:54,290 [cuckoo.core.resultserver] DEBUG: Task #5923320 uploaded file length: 133460 2025-02-11 20:50:06,045 [cuckoo.core.guest] DEBUG: win7x6423: analysis #5923320 still processing 2025-02-11 20:50:21,277 [cuckoo.core.guest] DEBUG: win7x6423: analysis #5923320 still processing 2025-02-11 20:50:22,508 [cuckoo.core.resultserver] DEBUG: Task #5923320: File upload for 'curtain/1739201517.2.curtain.log' 2025-02-11 20:50:22,511 [cuckoo.core.resultserver] DEBUG: Task #5923320 uploaded file length: 36 2025-02-11 20:50:22,703 [cuckoo.core.resultserver] DEBUG: Task #5923320: File upload for 'sysmon/1739201517.41.sysmon.xml' 2025-02-11 20:50:22,714 [cuckoo.core.resultserver] DEBUG: Task #5923320 uploaded file length: 1122692 2025-02-11 20:50:23,152 [cuckoo.core.resultserver] DEBUG: Task #5923320 had connection reset for <Context for LOG> 2025-02-11 20:50:24,288 [cuckoo.core.guest] INFO: win7x6423: analysis completed successfully 2025-02-11 20:50:24,298 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-02-11 20:50:24,441 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-02-11 20:50:25,462 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x6423 to path /srv/cuckoo/cwd/storage/analyses/5923320/memory.dmp 2025-02-11 20:50:25,463 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x6423 2025-02-11 20:53:53,754 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.223 for task #5923320 2025-02-11 20:53:54,460 [cuckoo.core.scheduler] DEBUG: Released database task #5923320 2025-02-11 20:53:54,644 [cuckoo.core.scheduler] INFO: Task #5923320: analysis procedure completed
description | Take screenshot | rule | screenshot | ||||||
description | Run a keylogger | rule | keylogger | ||||||
description | Affect system registries | rule | win_registry | ||||||
description | Affect private profile | rule | win_files_operation | ||||||
description | Affect hook table | rule | win_hook |
section | CODE |
section | DATA |
section | BSS |
packer | BobSoft Mini Delphi -> BoB / BobSoft |
section | {u'size_of_data': u'0x003e0400', u'virtual_address': u'0x00082000', u'entropy': 7.130862252625511, u'name': u'.rsrc', u'virtual_size': u'0x003e02a0'} | entropy | 7.13086225263 | description | A section with a high entropy has been found | |||||||||
entropy | 0.888316920322 | description | Overall entropy of this PE file is high |
G Data Antivirus (Windows) | Virus: Trojan.Agent.CZBR (Engine A) |
Avast Core Security (Linux) | Win32:Malware-gen |
F-Secure Antivirus (Linux) | Heuristic.HEUR/AGEN.1344420 [Aquarius] |
Sophos Anti-Virus (Linux) | Mal/Fareit-Q |
eScan Antivirus (Linux) | Trojan.Agent.CZBR(DB) |
ESET Security (Windows) | a variant of Win32/Injector.DXYN trojan |
McAfee CLI scanner (Linux) | Fareit-FLN |
DrWeb Antivirus (Linux) | Trojan.PWS.Stealer.23830 |
Bitdefender Antivirus (Linux) | Trojan.Agent.CZBR |
Kaspersky Standard (Windows) | HEUR:Trojan.Win32.Generic |
Emsisoft Commandline Scanner (Windows) | Trojan.Agent.CZBR (B) |
Bkav | W32.AIDetectMalware |
Cynet | Malicious (score: 100) |
CAT-QuickHeal | Trojan.GenericPMF.S30340419 |
Skyhigh | BehavesLike.Win32.Fareit.rc |
ALYac | Trojan.Agent.651776 |
Cylance | Unsafe |
VIPRE | Trojan.Agent.CZBR |
CrowdStrike | win/malicious_confidence_100% (D) |
BitDefender | Trojan.Agent.CZBR |
K7GW | Trojan ( 005317791 ) |
K7AntiVirus | Trojan ( 005317791 ) |
Arcabit | Trojan.Agent.CZBR |
Symantec | Packed.Generic.516 |
Elastic | malicious (high confidence) |
ESET-NOD32 | a variant of Win32/Injector.DXYN |
APEX | Malicious |
Avast | Win32:Malware-gen |
Kaspersky | HEUR:Trojan.Win32.Generic |
NANO-Antivirus | Trojan.Win32.Coins.fbxgwc |
MicroWorld-eScan | Trojan.Agent.CZBR |
Rising | Trojan.Injector!1.CB27 (CLASSIC) |
Emsisoft | Trojan.Agent.CZBR (B) |
F-Secure | Heuristic.HEUR/AGEN.1344420 |
DrWeb | Trojan.PWS.Stealer.23830 |
Zillya | Trojan.Chisburg.Win32.3284 |
TrendMicro | TSPY_HPLOKI.SMBD |
McAfeeD | Real Protect-LS!4928A5D5FC92 |
Trapmine | malicious.high.ml.score |
CTX | exe.trojan.czbr |
Sophos | Mal/Fareit-Q |
SentinelOne | Static AI - Malicious PE |
FireEye | Generic.mg.4928a5d5fc922394 |
Jiangmin | TrojanDownloader.Agent.bmrr |
Webroot | W32.Trojan.Gen |
Detected | |
Avira | HEUR/AGEN.1344420 |
Antiy-AVL | Trojan/Win32.Crypt |
Kingsoft | malware.kb.a.1000 |
Gridinsoft | Trojan.Win32.Injector.cc!s1 |
Microsoft | Trojan:Win32/Phonzy.B!ml |
ViRobot | Trojan.Win32.Agent.651776.O |
GData | Trojan.Agent.CZBR |
Varist | W32/Injector.KSWP-5650 |
AhnLab-V3 | Win-Trojan/Delphiless.Exp |
McAfee | Fareit-FLN!4928A5D5FC92 |
DeepInstinct | MALICIOUS |
VBA32 | TScope.Trojan.Delf |
Malwarebytes | Bancteian.Trojan.Dropper.DDS |
Ikarus | Trojan.Win32.Injector |
Panda | Trj/Genetic.gen |