Size | 52.1KB |
---|---|
Type | MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS |
MD5 | e9f7de00ec9450bde3ec3153ef4503b8 |
SHA1 | 758c00398b7d704928d1f985d04a261305f49a6b |
SHA256 | f335f936e403d368d8d8807de5f9f413fd348c67e53f6253a080beef74558f64 |
SHA512 |
655cd0f16170068bd2de27e6a7dcb63920577eb6af52d40274fe70474202e9e41c421da0fefdb820aeec9782d81bfa69ec5fb2df95a4655ef297b0597267803e
|
CRC32 | 2D960A83 |
ssdeep | None |
Yara |
|
This file is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | June 28, 2025, 4:22 p.m. | June 28, 2025, 4:30 p.m. | 446 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-06-22 14:22:03,015 [analyzer] DEBUG: Starting analyzer from: C:\tmpwoh6zt 2025-06-22 14:22:03,015 [analyzer] DEBUG: Pipe server name: \??\PIPE\GwAKGddvRNfPYixvkBNL 2025-06-22 14:22:03,015 [analyzer] DEBUG: Log pipe server name: \??\PIPE\UvhYVEbYAnVQFyPXKXFdGK 2025-06-22 14:22:03,328 [analyzer] DEBUG: Started auxiliary module Curtain 2025-06-22 14:22:03,342 [analyzer] DEBUG: Started auxiliary module DbgView 2025-06-22 14:22:03,842 [analyzer] DEBUG: Started auxiliary module Disguise 2025-06-22 14:22:04,062 [analyzer] DEBUG: Loaded monitor into process with pid 500 2025-06-22 14:22:04,062 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-06-22 14:22:04,062 [analyzer] DEBUG: Started auxiliary module Human 2025-06-22 14:22:04,062 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-06-22 14:22:04,078 [analyzer] DEBUG: Started auxiliary module Reboot 2025-06-22 14:22:04,203 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-06-22 14:22:04,217 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-06-22 14:22:04,217 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-06-22 14:22:04,217 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-06-22 14:22:04,375 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\f335f936e403d368d8d8807de5f9f413fd348c67e53f6253a080beef74558f64.exe' with arguments '' and pid 2748 2025-06-22 14:22:04,592 [analyzer] DEBUG: Loaded monitor into process with pid 2748 2025-06-22 14:22:04,608 [analyzer] INFO: Added new file to list with pid 2748 and path C:\Windows\microsofthelp.exe 2025-06-22 14:22:04,703 [analyzer] INFO: Injected into process with pid 1796 and name u'microsofthelp.exe' 2025-06-22 14:22:04,890 [analyzer] DEBUG: Loaded monitor into process with pid 1796 2025-06-22 14:22:05,375 [analyzer] INFO: Process with pid 2748 has terminated 2025-06-22 14:22:33,375 [analyzer] INFO: Analysis timeout hit, terminating analysis. 2025-06-22 14:22:34,140 [analyzer] INFO: Terminating remaining processes before shutdown. 2025-06-22 14:22:34,140 [lib.api.process] INFO: Successfully terminated process with pid 1796. 2025-06-22 14:22:34,155 [analyzer] INFO: Analysis completed.
2025-06-28 16:22:49,245 [cuckoo.core.scheduler] DEBUG: Task #6607273: no machine available yet 2025-06-28 16:22:50,265 [cuckoo.core.scheduler] DEBUG: Task #6607273: no machine available yet 2025-06-28 16:22:51,555 [cuckoo.core.scheduler] DEBUG: Task #6607273: no machine available yet 2025-06-28 16:22:52,688 [cuckoo.core.scheduler] DEBUG: Task #6607273: no machine available yet 2025-06-28 16:22:53,830 [cuckoo.core.scheduler] DEBUG: Task #6607273: no machine available yet 2025-06-28 16:22:55,094 [cuckoo.core.scheduler] INFO: Task #6607273: acquired machine win7x643 (label=win7x643) 2025-06-28 16:22:55,099 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.203 for task #6607273 2025-06-28 16:22:55,485 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 2693410 (interface=vboxnet0, host=192.168.168.203) 2025-06-28 16:22:55,659 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x643 2025-06-28 16:23:03,088 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x643 to vmcloak 2025-06-28 16:26:13,512 [cuckoo.core.guest] INFO: Starting analysis #6607273 on guest (id=win7x643, ip=192.168.168.203) 2025-06-28 16:26:14,520 [cuckoo.core.guest] DEBUG: win7x643: not ready yet 2025-06-28 16:26:19,569 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x643, ip=192.168.168.203) 2025-06-28 16:26:19,789 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x643, ip=192.168.168.203, monitor=latest, size=6660546) 2025-06-28 16:26:21,606 [cuckoo.core.resultserver] DEBUG: Task #6607273: live log analysis.log initialized. 2025-06-28 16:26:22,672 [cuckoo.core.resultserver] DEBUG: Task #6607273 is sending a BSON stream 2025-06-28 16:26:23,176 [cuckoo.core.resultserver] DEBUG: Task #6607273 is sending a BSON stream 2025-06-28 16:26:23,489 [cuckoo.core.resultserver] DEBUG: Task #6607273 is sending a BSON stream 2025-06-28 16:26:24,017 [cuckoo.core.resultserver] DEBUG: Task #6607273: File upload for 'shots/0001.jpg' 2025-06-28 16:26:24,035 [cuckoo.core.resultserver] DEBUG: Task #6607273 uploaded file length: 133471 2025-06-28 16:26:25,567 [cuckoo.core.resultserver] DEBUG: Task #6607273: File upload for 'files/f335f936e403d368_f335f936e403d368d8d8807de5f9f413fd348c67e53f6253a080beef74558f64.exe' 2025-06-28 16:26:25,570 [cuckoo.core.resultserver] DEBUG: Task #6607273 uploaded file length: 53389 2025-06-28 16:26:36,216 [cuckoo.core.guest] DEBUG: win7x643: analysis #6607273 still processing 2025-06-28 16:26:51,343 [cuckoo.core.guest] DEBUG: win7x643: analysis #6607273 still processing 2025-06-28 16:26:52,333 [cuckoo.core.resultserver] DEBUG: Task #6607273: File upload for 'curtain/1750594953.66.curtain.log' 2025-06-28 16:26:52,336 [cuckoo.core.resultserver] DEBUG: Task #6607273 uploaded file length: 36 2025-06-28 16:26:52,688 [cuckoo.core.resultserver] DEBUG: Task #6607273: File upload for 'sysmon/1750594954.0.sysmon.xml' 2025-06-28 16:26:52,839 [cuckoo.core.resultserver] DEBUG: Task #6607273 uploaded file length: 1807384 2025-06-28 16:26:52,850 [cuckoo.core.resultserver] DEBUG: Task #6607273: File upload for 'files/d207ddf7683a0c75_microsofthelp.exe' 2025-06-28 16:26:52,853 [cuckoo.core.resultserver] DEBUG: Task #6607273 uploaded file length: 53649 2025-06-28 16:26:52,991 [cuckoo.core.resultserver] DEBUG: Task #6607273 had connection reset for <Context for LOG> 2025-06-28 16:26:54,388 [cuckoo.core.guest] INFO: win7x643: analysis completed successfully 2025-06-28 16:26:54,438 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-06-28 16:26:54,485 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-06-28 16:26:55,301 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x643 to path /srv/cuckoo/cwd/storage/analyses/6607273/memory.dmp 2025-06-28 16:26:55,304 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x643 2025-06-28 16:30:02,810 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.203 for task #6607273 2025-06-28 16:30:04,611 [cuckoo.core.scheduler] DEBUG: Released database task #6607273 2025-06-28 16:30:04,966 [cuckoo.core.scheduler] INFO: Task #6607273: analysis procedure completed
description | The packer/protector section names/keywords | rule | suspicious_packer_section |
section | .MPRESS1 |
section | .MPRESS2 |
file | C:\Windows\microsofthelp.exe |
file | C:\Windows\microsofthelp.exe |
section | {u'size_of_data': u'0x00005400', u'virtual_address': u'0x00001000', u'entropy': 7.840274488890553, u'name': u'.MPRESS1', u'virtual_size': u'0x0000b600'} | entropy | 7.84027448889 | description | A section with a high entropy has been found | |||||||||
entropy | 0.954545454545 | description | Overall entropy of this PE file is high |
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp | reg_value | C:\Windows\microsofthelp.exe |
file | C:\Users\Administrator\AppData\Local\Temp\f335f936e403d368d8d8807de5f9f413fd348c67e53f6253a080beef74558f64.exe |
G Data Antivirus (Windows) | Virus: GenPack:Generic.Malware.SF!dld!.3154F137 (Engine A) |
Avast Core Security (Linux) | Win32:Dh-A [Heur] |
C4S ClamAV (Linux) | Win.Malware.Genpack-10033129-0 |
WithSecure (Linux) | Trojan.TR/Downloader.Gen |
eScan Antivirus (Linux) | GenPack:Generic.Malware.SF!dld!.3154F137(DB) |
ESET Security (Windows) | a variant of Win32/Agent.TLD trojan |
Sophos Anti-Virus (Linux) | Troj/Blihan-Gen |
DrWeb Antivirus (Linux) | Trojan.Siggen7.56291 |
ClamAV (Linux) | Win.Malware.Genpack-10033129-0 |
Bitdefender Antivirus (Linux) | GenPack:Generic.Malware.SF!dld!.3154F137 |
Emsisoft Commandline Scanner (Windows) | GenPack:Generic.Malware.SF!dld!.3154F137 (B) |
Bkav | W32.AIDetectMalware |
tehtris | Generic.Malware |
MicroWorld-eScan | GenPack:Generic.Malware.SF!dld!.3154F137 |
CAT-QuickHeal | Trojan.Msposer.7372 |
Skyhigh | BehavesLike.Win32.Generic.qt |
ALYac | GenPack:Generic.Malware.SF!dld!.3154F137 |
Cylance | Unsafe |
VIPRE | GenPack:Generic.Malware.SF!dld!.3154F137 |
Sangfor | Suspicious.Win32.Save.a |
CrowdStrike | win/malicious_confidence_100% (D) |
BitDefender | GenPack:Generic.Malware.SF!dld!.3154F137 |
K7GW | Trojan ( 0047372f1 ) |
K7AntiVirus | Trojan ( 0047372f1 ) |
Arcabit | GenPack:Generic.Malware.SF!dld!.3154F137 |
Baidu | Win32.Trojan.Agent.el |
VirIT | Trojan.Win32.Genus.WKV |
Symantec | Backdoor.Trojan |
Elastic | malicious (high confidence) |
ESET-NOD32 | a variant of Win32/Agent.TLD |
APEX | Malicious |
Avast | Win32:Dh-A [Heur] |
Cynet | Malicious (score: 100) |
Kaspersky | HEUR:Trojan-Dropper.Win32.Daws.gen |
NANO-Antivirus | Virus.Win32.Gen-Crypt.ccnc |
Rising | Downloader.Agent!8.B23 (TFE:5:QYwiwkqUWRV) |
Emsisoft | GenPack:Generic.Malware.SF!dld!.3154F137 (B) |
F-Secure | Trojan.TR/Downloader.Gen |
DrWeb | Trojan.Siggen7.56291 |
Zillya | Dropper.Daws.Win32.32058 |
McAfeeD | Real Protect-LS!E9F7DE00EC94 |
Trapmine | malicious.high.ml.score |
CTX | exe.unknown.genpack |
Sophos | Troj/Blihan-Gen |
SentinelOne | Static AI - Malicious PE |
Jiangmin | TrojanDropper.Daws.kbg |
Detected | |
Avira | TR/Downloader.Gen |
Antiy-AVL | Trojan/Win32.Blihan |
Kingsoft | malware.kb.b.998 |
Gridinsoft | Trojan.Win32.Agent.oa!s1 |
Microsoft | Trojan:Win32/Blihan!pz |
ZoneAlarm | Troj/Blihan-Gen |
GData | GenPack:Generic.Malware.SF!dld!.3154F137 |
Varist | W32/Agent.BRN.gen!Eldorado |
AhnLab-V3 | Trojan/Win.Generic.R656602 |
Acronis | suspicious |
VBA32 | Trojan.Blihan |
DeepInstinct | MALICIOUS |
Malwarebytes | Generic.Malware.AI.DDS |
Ikarus | Trojan.Win32.Blihan |