Size | 11.8MB |
---|---|
Type | PE32+ executable (DLL) (console) x86-64, for MS Windows |
MD5 | b78a80052c26c584ecc15a7d0cf88628 |
SHA1 | af4a832422bcfe458b7066c0f002aae2094fa91f |
SHA256 | 039a45e9592e85f5150943f10ea3c75a008297268df591ad61907019d34e82de |
SHA512 |
2bb66dfd8d4935cd287660f4d0c9098761b85c08aab213348af0bc4cc0f79a55a6fcd09d3ad0654019be55905ab306b87781d6d93fcbec08ae9af4a025e7eb83
|
CRC32 | F324F272 |
ssdeep | None |
Yara | None matched |
This archive is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
ARCHIVE | Dec. 25, 2024, 9:20 p.m. | Dec. 25, 2024, 9:21 p.m. | 48 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2024-12-25 20:20:24,155 [analyzer] DEBUG: Starting analyzer from: C:\tmpl4240h 2024-12-25 20:20:24,171 [analyzer] DEBUG: Pipe server name: \??\PIPE\AVjmUGGuGHttnEhWmQXQZZpRXNl 2024-12-25 20:20:24,171 [analyzer] DEBUG: Log pipe server name: \??\PIPE\VyNwkpxRqVqpJyZtgvZFKFJ 2024-12-25 20:20:24,390 [analyzer] DEBUG: Started auxiliary module Curtain 2024-12-25 20:20:24,390 [analyzer] DEBUG: Started auxiliary module DbgView 2024-12-25 20:20:24,780 [analyzer] DEBUG: Started auxiliary module Disguise 2024-12-25 20:20:24,983 [analyzer] DEBUG: Loaded monitor into process with pid 508 2024-12-25 20:20:24,983 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2024-12-25 20:20:24,983 [analyzer] DEBUG: Started auxiliary module Human 2024-12-25 20:20:24,983 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2024-12-25 20:20:24,983 [analyzer] DEBUG: Started auxiliary module Reboot 2024-12-25 20:20:25,092 [analyzer] DEBUG: Started auxiliary module RecentFiles 2024-12-25 20:20:25,092 [analyzer] DEBUG: Started auxiliary module Screenshots 2024-12-25 20:20:25,092 [analyzer] DEBUG: Started auxiliary module Sysmon 2024-12-25 20:20:25,092 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2024-12-25 20:20:25,265 [lib.api.process] ERROR: Failed to execute process from path 'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\2501_r/0/01/xzlib0.dll' with arguments ['bin\\inject-x64.exe', '--app', 'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\2501_r/0/01/xzlib0.dll', '--only-start', '--curdir', 'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp'] (Error: Command '['bin\\inject-x64.exe', '--app', 'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\2501_r/0/01/xzlib0.dll', '--only-start', '--curdir', 'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp']' returned non-zero exit status 1)
2024-12-25 21:20:28,040 [cuckoo.core.scheduler] INFO: Task #5695891: acquired machine win7x649 (label=win7x649) 2024-12-25 21:20:28,041 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.209 for task #5695891 2024-12-25 21:20:28,335 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 303545 (interface=vboxnet0, host=192.168.168.209) 2024-12-25 21:20:28,356 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x649 2024-12-25 21:20:28,950 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x649 to vmcloak 2024-12-25 21:20:55,531 [cuckoo.core.guest] INFO: Starting analysis #5695891 on guest (id=win7x649, ip=192.168.168.209) 2024-12-25 21:20:56,552 [cuckoo.core.guest] DEBUG: win7x649: not ready yet 2024-12-25 21:21:01,584 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x649, ip=192.168.168.209) 2024-12-25 21:21:01,671 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x649, ip=192.168.168.209, monitor=latest, size=6660546) 2024-12-25 21:21:04,185 [cuckoo.core.resultserver] DEBUG: Task #5695891: live log analysis.log initialized. 2024-12-25 21:21:05,113 [cuckoo.core.resultserver] DEBUG: Task #5695891 is sending a BSON stream 2024-12-25 21:21:06,405 [cuckoo.core.resultserver] DEBUG: Task #5695891: File upload for 'shots/0001.jpg' 2024-12-25 21:21:06,424 [cuckoo.core.resultserver] DEBUG: Task #5695891 uploaded file length: 133500 2024-12-25 21:21:06,657 [cuckoo.core.guest] WARNING: win7x649: analysis #5695891 caught an exception Traceback (most recent call last): File "C:/tmpl4240h/analyzer.py", line 824, in <module> success = analyzer.run() File "C:/tmpl4240h/analyzer.py", line 673, in run pids = self.package.start(self.target) File "C:\tmpl4240h\modules\packages\exe.py", line 34, in start return self.execute(path, args=shlex.split(args)) File "C:\tmpl4240h\lib\common\abstracts.py", line 205, in execute "Unable to execute the initial process, analysis aborted." CuckooPackageError: Unable to execute the initial process, analysis aborted. 2024-12-25 21:21:06,676 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2024-12-25 21:21:06,708 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2024-12-25 21:21:07,441 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x649 to path /srv/cuckoo/cwd/storage/analyses/5695891/memory.dmp 2024-12-25 21:21:07,443 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x649 2024-12-25 21:21:14,651 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.209 for task #5695891 2024-12-25 21:21:14,654 [cuckoo.core.resultserver] DEBUG: Cancel <Context for LOG> for task 5695891 2024-12-25 21:21:15,200 [cuckoo.core.scheduler] DEBUG: Released database task #5695891 2024-12-25 21:21:15,219 [cuckoo.core.scheduler] INFO: Task #5695891: analysis procedure completed
section | .aspr0 |
section | .aspr1 |
section | .aspr2 |
section | {u'size_of_data': u'0x00bca600', u'virtual_address': u'0x00740000', u'entropy': 7.8481202563434564, u'name': u'.aspr2', u'virtual_size': u'0x00bca494'} | entropy | 7.84812025634 | description | A section with a high entropy has been found | |||||||||
entropy | 0.99966880563 | description | Overall entropy of this PE file is high |
G Data Antivirus (Windows) | Virus: Trojan.GenericKD.74826203 (Engine A) |
Avast Core Security (Linux) | Win64:MalwareX-gen [Trj] |
Windows Defender (Windows) | HackTool:Win32/Crack!MTB |
Forticlient (Linux) | PossibleThreat.PALLAS.H |
Sophos Anti-Virus (Linux) | Mal/Generic-S |
eScan Antivirus (Linux) | Trojan.GenericKD.74826203(DB) |
ESET Security (Windows) | a variant of Win64/Packed.VMProtect.AA suspicious application |
Bitdefender Antivirus (Linux) | Trojan.GenericKD.74826203 |
Emsisoft Commandline Scanner (Windows) | Trojan.GenericKD.74826203 (B) |
Bkav | W64.AIDetectMalware |
Lionic | Trojan.Win32.VMProtect.4!c |
Cynet | Malicious (score: 100) |
Skyhigh | BehavesLike.Win64.Generic.wc |
Cylance | Unsafe |
CrowdStrike | win/malicious_confidence_90% (D) |
K7GW | Trojan ( 005a7c0f1 ) |
K7AntiVirus | Trojan ( 005a7c0f1 ) |
Symantec | Trojan.Gen.MBT |
Elastic | malicious (high confidence) |
ESET-NOD32 | a variant of Win64/Packed.VMProtect.AA suspicious |
APEX | Malicious |
Avast | Win64:MalwareX-gen [Trj] |
McAfeeD | Real Protect-LS!B78A80052C26 |
CTX | dll.trojan.vmprotect |
Sophos | Mal/Generic-S |
SentinelOne | Static AI - Suspicious PE |
FireEye | Generic.mg.b78a80052c26c584 |
Detected | |
Antiy-AVL | GrayWare/Win32.Puwaders |
Gridinsoft | Trojan.Heur!.02212022 |
Microsoft | HackTool:Win32/Crack!MTB |
Varist | W64/ABApplication.UMPB-5977 |
AhnLab-V3 | Malware/Win.Generic.R669253 |
McAfee | Artemis!B78A80052C26 |
DeepInstinct | MALICIOUS |
Malwarebytes | Malware.AI.1443392206 |
Ikarus | PUA.VMProtect |
MaxSecure | Trojan.Malware.300983.susgen |
Fortinet | PossibleThreat.PALLAS.H |
AVG | Win64:MalwareX-gen [Trj] |
Paloalto | generic.ml |