Size | 312.0KB |
---|---|
Type | PE32+ executable (GUI) x86-64, for MS Windows |
MD5 | 48886638c327c805fc0b7590b62dc435 |
SHA1 | 49889c9632000ac5beca1d1a4a033f84ca2eb19b |
SHA256 | 2e5b6e4eb26ed7c58d4fcbda320e3416b8a1cdf6de2856b38f90bb0de7fa3e3b |
SHA512 |
f9b746b43343e9c83f249d6aaa3671daa557e39651a4b597e9ea47179e9c1a30c03642f5b90a96f3a539f2452ca2efbcaf434de9c165b7da26b116e7e9b5ce5f
|
CRC32 | AE84DCDC |
ssdeep | None |
Yara |
|
This file is very suspicious, with a score of 9.3 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | Dec. 25, 2024, 6:38 p.m. | Dec. 25, 2024, 6:38 p.m. | 30 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2024-12-25 17:38:24,015 [analyzer] DEBUG: Starting analyzer from: C:\tmp2pjrvv 2024-12-25 17:38:24,030 [analyzer] DEBUG: Pipe server name: \??\PIPE\KTcjebPMauBxAXvFkDzXJgPAQZDyMTRI 2024-12-25 17:38:24,030 [analyzer] DEBUG: Log pipe server name: \??\PIPE\mtJWmfUiuBEFyhLaGZcZxijRsNG 2024-12-25 17:38:24,296 [analyzer] DEBUG: Started auxiliary module Curtain 2024-12-25 17:38:24,296 [analyzer] DEBUG: Started auxiliary module DbgView 2024-12-25 17:38:24,687 [analyzer] DEBUG: Started auxiliary module Disguise 2024-12-25 17:38:24,875 [analyzer] DEBUG: Loaded monitor into process with pid 504 2024-12-25 17:38:24,875 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2024-12-25 17:38:24,875 [analyzer] DEBUG: Started auxiliary module Human 2024-12-25 17:38:24,875 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2024-12-25 17:38:24,890 [analyzer] DEBUG: Started auxiliary module Reboot 2024-12-25 17:38:25,015 [analyzer] DEBUG: Started auxiliary module RecentFiles 2024-12-25 17:38:25,015 [analyzer] DEBUG: Started auxiliary module Screenshots 2024-12-25 17:38:25,015 [analyzer] DEBUG: Started auxiliary module Sysmon 2024-12-25 17:38:25,015 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2024-12-25 17:38:25,125 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\template.exe' with arguments '' and pid 344 2024-12-25 17:38:25,358 [analyzer] DEBUG: Loaded monitor into process with pid 344 2024-12-25 17:38:25,546 [lib.api.process] ERROR: Failed to dump memory of 64-bit process with pid 344. 2024-12-25 17:38:26,155 [analyzer] INFO: Process with pid 344 has terminated 2024-12-25 17:38:26,155 [analyzer] INFO: Process list is empty, terminating analysis. 2024-12-25 17:38:27,375 [analyzer] INFO: Terminating remaining processes before shutdown. 2024-12-25 17:38:27,375 [analyzer] INFO: Analysis completed.
2024-12-25 18:38:28,218 [cuckoo.core.scheduler] INFO: Task #5695833: acquired machine win7x648 (label=win7x648) 2024-12-25 18:38:28,218 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.208 for task #5695833 2024-12-25 18:38:28,468 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 211881 (interface=vboxnet0, host=192.168.168.208) 2024-12-25 18:38:28,635 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x648 2024-12-25 18:38:29,278 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x648 to vmcloak 2024-12-25 18:38:37,099 [cuckoo.core.guest] INFO: Starting analysis #5695833 on guest (id=win7x648, ip=192.168.168.208) 2024-12-25 18:38:38,105 [cuckoo.core.guest] DEBUG: win7x648: not ready yet 2024-12-25 18:38:43,132 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x648, ip=192.168.168.208) 2024-12-25 18:38:43,210 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x648, ip=192.168.168.208, monitor=latest, size=6660546) 2024-12-25 18:38:44,376 [cuckoo.core.resultserver] DEBUG: Task #5695833: live log analysis.log initialized. 2024-12-25 18:38:45,201 [cuckoo.core.resultserver] DEBUG: Task #5695833 is sending a BSON stream 2024-12-25 18:38:45,591 [cuckoo.core.resultserver] DEBUG: Task #5695833 is sending a BSON stream 2024-12-25 18:38:46,554 [cuckoo.core.resultserver] DEBUG: Task #5695833: File upload for 'shots/0001.jpg' 2024-12-25 18:38:46,566 [cuckoo.core.resultserver] DEBUG: Task #5695833 uploaded file length: 133503 2024-12-25 18:38:47,660 [cuckoo.core.resultserver] DEBUG: Task #5695833: File upload for 'curtain/1735144707.27.curtain.log' 2024-12-25 18:38:47,663 [cuckoo.core.resultserver] DEBUG: Task #5695833 uploaded file length: 36 2024-12-25 18:38:47,773 [cuckoo.core.resultserver] DEBUG: Task #5695833: File upload for 'sysmon/1735144707.38.sysmon.xml' 2024-12-25 18:38:47,776 [cuckoo.core.resultserver] DEBUG: Task #5695833 uploaded file length: 38486 2024-12-25 18:38:48,653 [cuckoo.core.resultserver] DEBUG: Task #5695833 had connection reset for <Context for LOG> 2024-12-25 18:38:49,976 [cuckoo.core.guest] INFO: win7x648: analysis completed successfully 2024-12-25 18:38:49,989 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2024-12-25 18:38:50,017 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2024-12-25 18:38:50,733 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x648 to path /srv/cuckoo/cwd/storage/analyses/5695833/memory.dmp 2024-12-25 18:38:50,734 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x648 2024-12-25 18:38:58,102 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.208 for task #5695833 2024-12-25 18:38:58,363 [cuckoo.core.scheduler] DEBUG: Released database task #5695833 2024-12-25 18:38:58,382 [cuckoo.core.scheduler] INFO: Task #5695833: analysis procedure completed
description | (no description) | rule | UPX | ||||||
description | The packer/protector section names/keywords | rule | suspicious_packer_section | ||||||
description | Run a keylogger | rule | keylogger |
section | {u'size_of_data': u'0x0004d800', u'virtual_address': u'0x000a6000', u'entropy': 7.9257010809384685, u'name': u'UPX1', u'virtual_size': u'0x0004e000'} | entropy | 7.92570108094 | description | A section with a high entropy has been found | |||||||||
entropy | 0.996784565916 | description | Overall entropy of this PE file is high |
section | UPX0 | description | Section name indicates UPX | ||||||
section | UPX1 | description | Section name indicates UPX |
G Data Antivirus (Windows) | Virus: Gen:Variant.Tedy.112122 (Engine A) |
Avast Core Security (Linux) | Win64:SpywareX-gen [Trj] |
C4S ClamAV (Linux) | Win.Keylogger.Tedy-10008061-0 |
Windows Defender (Windows) | Trojan:Win64/SnakeKeyLogger.DSP!MTB |
eScan Antivirus (Linux) | Gen:Variant.Tedy.112122(DB) |
ESET Security (Windows) | a variant of Win64/Spy.KeyLogger.AD trojan |
ClamAV (Linux) | Win.Keylogger.Tedy-10008061-0 |
Kaspersky Standard (Windows) | HEUR:Trojan.Win32.Generic |
Emsisoft Commandline Scanner (Windows) | Gen:Variant.Tedy.112122 (B) |