Size | 74.5KB |
---|---|
Type | PE32 executable (GUI) Intel 80386, for MS Windows |
MD5 | ed69d9bb9335abe981caa682262b20e1 |
SHA1 | 51c0e64511317c87d32cfb58a8c12ebf16a27521 |
SHA256 | a66004cf8bde5bf53dc67389023b59a97e32f5c50c8820921bb179cf05e1a94c |
SHA512 |
df51e0d3b1bf24857bc3cc77159f766fbda7c5fa849e939034f942617a1242b412b63a791bab4d0ac386ed79de7c662a8d08400663915829304f34aa04a5141a
|
CRC32 | AB73E6EA |
ssdeep | None |
Yara |
|
This archive is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
ARCHIVE | April 18, 2025, 5:17 a.m. | April 18, 2025, 5:18 a.m. | 65 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-04-18 05:17:09,030 [analyzer] DEBUG: Starting analyzer from: C:\tmpj6atou 2025-04-18 05:17:09,046 [analyzer] DEBUG: Pipe server name: \??\PIPE\jCuHoLzTPShdJrIlL 2025-04-18 05:17:09,046 [analyzer] DEBUG: Log pipe server name: \??\PIPE\kzneCJcaPymiRuONPpom 2025-04-18 05:17:09,342 [analyzer] DEBUG: Started auxiliary module Curtain 2025-04-18 05:17:09,342 [analyzer] DEBUG: Started auxiliary module DbgView 2025-04-18 05:17:09,875 [analyzer] DEBUG: Started auxiliary module Disguise 2025-04-18 05:17:10,092 [analyzer] DEBUG: Loaded monitor into process with pid 504 2025-04-18 05:17:10,092 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-04-18 05:17:10,092 [analyzer] DEBUG: Started auxiliary module Human 2025-04-18 05:17:10,092 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-04-18 05:17:10,092 [analyzer] DEBUG: Started auxiliary module Reboot 2025-04-18 05:17:10,171 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-04-18 05:17:10,171 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-04-18 05:17:10,187 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-04-18 05:17:10,187 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-04-18 05:17:10,358 [lib.api.process] INFO: Successfully executed process from path 'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\a66004cf8bde5bf53dc67389023b59a97e32f5c50c8820921bb179cf05e1a94c.exe' with arguments '' and pid 1764 2025-04-18 05:17:10,546 [analyzer] DEBUG: Loaded monitor into process with pid 1764 2025-04-18 04:18:05,707 [analyzer] INFO: Analysis timeout hit, terminating analysis. 2025-04-18 04:18:05,927 [lib.api.process] ERROR: Failed to dump memory of 32-bit process with pid 1764. 2025-04-18 04:18:06,240 [analyzer] INFO: Terminating remaining processes before shutdown. 2025-04-18 04:18:06,240 [lib.api.process] INFO: Successfully terminated process with pid 1764. 2025-04-18 04:18:06,240 [analyzer] INFO: Analysis completed.
2025-04-18 05:17:12,285 [cuckoo.core.scheduler] INFO: Task #6297999: acquired machine win7x6416 (label=win7x6416) 2025-04-18 05:17:12,285 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.216 for task #6297999 2025-04-18 05:17:12,694 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 2969719 (interface=vboxnet0, host=192.168.168.216) 2025-04-18 05:17:12,717 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x6416 2025-04-18 05:17:13,410 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x6416 to vmcloak 2025-04-18 05:17:27,844 [cuckoo.core.guest] INFO: Starting analysis #6297999 on guest (id=win7x6416, ip=192.168.168.216) 2025-04-18 05:17:28,850 [cuckoo.core.guest] DEBUG: win7x6416: not ready yet 2025-04-18 05:17:33,879 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x6416, ip=192.168.168.216) 2025-04-18 05:17:33,958 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x6416, ip=192.168.168.216, monitor=latest, size=6660546) 2025-04-18 05:17:35,390 [cuckoo.core.resultserver] DEBUG: Task #6297999: live log analysis.log initialized. 2025-04-18 05:17:36,433 [cuckoo.core.resultserver] DEBUG: Task #6297999 is sending a BSON stream 2025-04-18 05:17:36,870 [cuckoo.core.resultserver] DEBUG: Task #6297999 is sending a BSON stream 2025-04-18 05:17:37,709 [cuckoo.core.resultserver] DEBUG: Task #6297999: File upload for 'shots/0001.jpg' 2025-04-18 05:17:37,721 [cuckoo.core.resultserver] DEBUG: Task #6297999 uploaded file length: 133569 2025-04-18 05:17:49,889 [cuckoo.core.guest] DEBUG: win7x6416: analysis #6297999 still processing 2025-04-18 05:18:04,978 [cuckoo.core.guest] DEBUG: win7x6416: analysis #6297999 still processing 2025-04-18 05:18:06,160 [cuckoo.core.resultserver] DEBUG: Task #6297999: File upload for 'curtain/1744942686.1.curtain.log' 2025-04-18 05:18:06,164 [cuckoo.core.resultserver] DEBUG: Task #6297999 uploaded file length: 36 2025-04-18 05:18:06,288 [cuckoo.core.resultserver] DEBUG: Task #6297999: File upload for 'sysmon/1744942686.22.sysmon.xml' 2025-04-18 05:18:06,292 [cuckoo.core.resultserver] DEBUG: Task #6297999 uploaded file length: 136186 2025-04-18 05:18:06,618 [cuckoo.core.resultserver] DEBUG: Task #6297999 had connection reset for <Context for LOG> 2025-04-18 05:18:07,991 [cuckoo.core.guest] INFO: win7x6416: analysis completed successfully 2025-04-18 05:18:08,011 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-04-18 05:18:08,032 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-04-18 05:18:09,093 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x6416 to path /srv/cuckoo/cwd/storage/analyses/6297999/memory.dmp 2025-04-18 05:18:09,095 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x6416 2025-04-18 05:18:16,812 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.216 for task #6297999 2025-04-18 05:18:17,105 [cuckoo.core.scheduler] DEBUG: Released database task #6297999 2025-04-18 05:18:17,124 [cuckoo.core.scheduler] INFO: Task #6297999: analysis procedure completed
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | Code injection with CreateRemoteThread in a remote process | rule | inject_thread | ||||||
description | Communications over UDP network | rule | network_udp_sock | ||||||
description | Listen for incoming communication | rule | network_tcp_listen | ||||||
description | Communications over HTTP | rule | network_http | ||||||
description | Communications over RAW socket | rule | network_tcp_socket | ||||||
description | Communications use DNS | rule | network_dns | ||||||
description | Escalade priviledges | rule | escalate_priv | ||||||
description | Run a keylogger | rule | keylogger |
section | .data1 |
reg_key | HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit | reg_value | userinit.exe,C:\Windows\system32\msdols32.exe, |
mutex | _AVIRA_21099 |
G Data Antivirus (Windows) | Virus: Gen:Trojan.UserStartup.euW@aScKw7l (Engine A) |
Avast Core Security (Linux) | Sf:Zbot-CQ [Trj] |
C4S ClamAV (Linux) | Win.Trojan.Zbot-9789488-0 |
Trellix (Linux) | GenericRXMP-LB |
WithSecure (Linux) | Trojan.TR/Crypt.XPACK.Gen |
eScan Antivirus (Linux) | Gen:Trojan.UserStartup.euW@aScKw7l(DB) |
ESET Security (Windows) | Win32/Spy.Zbot.JF trojan |
Sophos Anti-Virus (Linux) | Mal/Generic-S |
DrWeb Antivirus (Linux) | Trojan.Webmoner.61071 |
ClamAV (Linux) | Win.Trojan.Zbot-9789488-0 |
Bitdefender Antivirus (Linux) | Gen:Trojan.UserStartup.euW@aScKw7l |
Kaspersky Standard (Windows) | Trojan-Spy.Win32.Zbot.adwr |
Emsisoft Commandline Scanner (Windows) | Gen:Trojan.UserStartup.euW@aScKw7l (B) |
Bkav | W32.AIDetectMalware |
Lionic | Trojan.Win32.Zbot.kZzj |
Cynet | Malicious (score: 100) |
CAT-QuickHeal | Trojan.Mauvaise.SL1 |
Skyhigh | BehavesLike.Win32.Generic.lh |
ALYac | Gen:Trojan.UserStartup.euW@aScKw7l |
Cylance | Unsafe |
VIPRE | Gen:Trojan.UserStartup.euW@aScKw7l |
Sangfor | Suspicious.Win32.Save.a |
CrowdStrike | win/malicious_confidence_100% (W) |
BitDefender | Gen:Trojan.UserStartup.euW@aScKw7l |
Arcabit | Trojan.UserStartup.E8C776 |
VirIT | Trojan.Win32.Zbot.ADLM |
Symantec | ML.Attribute.HighConfidence |
Elastic | malicious (high confidence) |
ESET-NOD32 | Win32/Spy.Zbot.JF |
APEX | Malicious |
Avast | Sf:Zbot-CQ [Trj] |
ClamAV | Win.Trojan.Zbot-9789488-0 |
Kaspersky | Trojan-Spy.Win32.Zbot.adwr |
Alibaba | Trojan:Win32/Starter.ali2000005 |
NANO-Antivirus | Virus.Win32.Gen.ccmw |
MicroWorld-eScan | Gen:Trojan.UserStartup.euW@aScKw7l |
Rising | Spyware.Zbot!8.16B (TFE:1:T0ftm5gnxaN) |
Emsisoft | Gen:Trojan.UserStartup.euW@aScKw7l (B) |
F-Secure | Trojan.TR/Crypt.XPACK.Gen |
DrWeb | Trojan.Webmoner.61071 |
Zillya | Trojan.Zbot.Win32.1241 |
TrendMicro | TSPY_ZBOT.SMRL |
McAfeeD | Real Protect-LS!ED69D9BB9335 |
Trapmine | suspicious.low.ml.score |
CTX | exe.trojan.generic |
Sophos | Mal/Generic-S |
SentinelOne | Static AI - Malicious PE |
FireEye | Generic.mg.ed69d9bb9335abe9 |
Jiangmin | TrojanSpy.Zbot.xcj |
Detected | |
Avira | TR/Crypt.XPACK.Gen |
Antiy-AVL | Trojan[Spy]/Win32.Zbot |
Kingsoft | malware.kb.a.998 |
Gridinsoft | Spy.Win32.Keylogger.oa!s1 |
Xcitium | TrojWare.Win32.TrojanSpy.Zbot.Gen@1gso1k |
Microsoft | Trojan:Win32/Zbot.RI!MTB |
GData | Gen:Trojan.UserStartup.euW@aScKw7l |
Varist | W32/Zbot.ABT.gen!Eldorado |
AhnLab-V3 | Worm/Win32.IRCBot.R8249 |
McAfee | GenericRXMP-LB!ED69D9BB9335 |
TACHYON | Trojan-Spy/W32.ZBot.76288.AK |
DeepInstinct | MALICIOUS |
VBA32 | SScope.Trojan.Bofa |