Size | 896.0KB |
---|---|
Type | PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows |
MD5 | 54dbb363d7e70f3038d72587e2a928f7 |
SHA1 | 74f67a4c281ef4907572ea2f170008360fdf6239 |
SHA256 | 4b29efdb0430148595fa48a7180b555505999f32c80e617690bf8fcfdf25cff4 |
SHA512 |
340297a438c8440fda1819ab00a7293f4aed06c50c3042d6dc2e4e77c72fb9ca8439c3e9e39dc8191bf3cf7e79beacbdf2d49c3d771985d59fc025923564281e
|
CRC32 | 7C991311 |
ssdeep | None |
Yara |
|
This file is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | Feb. 11, 2025, 9:03 p.m. | Feb. 11, 2025, 9:09 p.m. | 384 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-02-10 16:31:58,015 [analyzer] DEBUG: Starting analyzer from: C:\tmp1xmcit 2025-02-10 16:31:58,030 [analyzer] DEBUG: Pipe server name: \??\PIPE\fsMrqvgUpsusXhmyTb 2025-02-10 16:31:58,030 [analyzer] DEBUG: Log pipe server name: \??\PIPE\eKdpsCYDlPZKYaUnENYZnCMIxd 2025-02-10 16:31:58,312 [analyzer] DEBUG: Started auxiliary module Curtain 2025-02-10 16:31:58,312 [analyzer] DEBUG: Started auxiliary module DbgView 2025-02-10 16:31:58,858 [analyzer] DEBUG: Started auxiliary module Disguise 2025-02-10 16:31:59,078 [analyzer] DEBUG: Loaded monitor into process with pid 508 2025-02-10 16:31:59,078 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-02-10 16:31:59,078 [analyzer] DEBUG: Started auxiliary module Human 2025-02-10 16:31:59,078 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-02-10 16:31:59,092 [analyzer] DEBUG: Started auxiliary module Reboot 2025-02-10 16:31:59,171 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-02-10 16:31:59,171 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-02-10 16:31:59,171 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-02-10 16:31:59,187 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-02-10 16:31:59,296 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\4b29efdb0430148595fa48a7180b555505999f32c80e617690bf8fcfdf25cff4.exe' with arguments '' and pid 592 2025-02-10 16:32:00,328 [analyzer] INFO: Process with pid 592 has terminated 2025-02-10 16:32:00,328 [analyzer] INFO: Process list is empty, terminating analysis. 2025-02-10 16:32:01,592 [analyzer] INFO: Terminating remaining processes before shutdown. 2025-02-10 16:32:01,592 [analyzer] INFO: Analysis completed.
2025-02-11 21:03:29,025 [cuckoo.core.scheduler] INFO: Task #5923389: acquired machine win7x6414 (label=win7x6414) 2025-02-11 21:03:29,026 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.214 for task #5923389 2025-02-11 21:03:29,419 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 2790057 (interface=vboxnet0, host=192.168.168.214) 2025-02-11 21:03:30,320 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x6414 2025-02-11 21:03:30,941 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x6414 to vmcloak 2025-02-11 21:06:31,267 [cuckoo.core.guest] INFO: Starting analysis #5923389 on guest (id=win7x6414, ip=192.168.168.214) 2025-02-11 21:06:32,272 [cuckoo.core.guest] DEBUG: win7x6414: not ready yet 2025-02-11 21:06:37,296 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x6414, ip=192.168.168.214) 2025-02-11 21:06:37,386 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x6414, ip=192.168.168.214, monitor=latest, size=6660546) 2025-02-11 21:06:38,607 [cuckoo.core.resultserver] DEBUG: Task #5923389: live log analysis.log initialized. 2025-02-11 21:06:39,626 [cuckoo.core.resultserver] DEBUG: Task #5923389 is sending a BSON stream 2025-02-11 21:06:40,947 [cuckoo.core.resultserver] DEBUG: Task #5923389: File upload for 'shots/0001.jpg' 2025-02-11 21:06:40,966 [cuckoo.core.resultserver] DEBUG: Task #5923389 uploaded file length: 133471 2025-02-11 21:06:42,073 [cuckoo.core.resultserver] DEBUG: Task #5923389: File upload for 'curtain/1739201521.45.curtain.log' 2025-02-11 21:06:42,105 [cuckoo.core.resultserver] DEBUG: Task #5923389 uploaded file length: 36 2025-02-11 21:06:42,274 [cuckoo.core.resultserver] DEBUG: Task #5923389: File upload for 'sysmon/1739201521.59.sysmon.xml' 2025-02-11 21:06:42,285 [cuckoo.core.resultserver] DEBUG: Task #5923389 uploaded file length: 394898 2025-02-11 21:06:43,083 [cuckoo.core.resultserver] DEBUG: Task #5923389 had connection reset for <Context for LOG> 2025-02-11 21:06:44,348 [cuckoo.core.guest] INFO: win7x6414: analysis completed successfully 2025-02-11 21:06:44,374 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-02-11 21:06:44,411 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-02-11 21:06:45,607 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x6414 to path /srv/cuckoo/cwd/storage/analyses/5923389/memory.dmp 2025-02-11 21:06:45,610 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x6414 2025-02-11 21:09:53,289 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.214 for task #5923389 2025-02-11 21:09:53,699 [cuckoo.core.scheduler] DEBUG: Released database task #5923389 2025-02-11 21:09:53,713 [cuckoo.core.scheduler] INFO: Task #5923389: analysis procedure completed
description | (no description) | rule | SEH__vectored | ||||||
description | Communications over UDP network | rule | network_udp_sock | ||||||
description | Listen for incoming communication | rule | network_tcp_listen | ||||||
description | Communications over RAW socket | rule | network_tcp_socket | ||||||
description | Communications use DNS | rule | network_dns | ||||||
description | Affect private profile | rule | win_files_operation |
Avast Core Security (Linux) | Win64:MalwareX-gen [Trj] |
CrowdStrike | win/malicious_confidence_90% (D) |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of Win64/Agent_AGen.CWC |
Avast | Win64:MalwareX-gen [Trj] |
Rising | Trojan.Agent!8.B1E (CLOUD) |
McAfeeD | ti!4B29EFDB0430 |
Detected | |
Microsoft | Trojan:Win32/Wacatac.B!ml |
Varist | W64/Agent.JKL.gen!Eldorado |
McAfee | Artemis!54DBB363D7E7 |
Ikarus | Win32.Outbreak |
Fortinet | W64/Agent_AGen.CWC!tr |
AVG | Win64:MalwareX-gen [Trj] |