File EMP.dll

Size 13.1MB
Type PE32+ executable (DLL) (GUI) x86-64, for MS Windows
MD5 6a0ab7d49ddba5bb6fc6ef06b466afbd
SHA1 1c4d421b11dcbe628a72b65b4091e035a664192f
SHA256 247bc25eeb95a19a64a26b9a82073e21fc6691806e0fcd9f663460ee778c58cc
SHA512
4f5cf34b6760afc586b2d247793b828f3cec209dca474ed48b385734efab94c714fc1617ba25c8ac39dc3079542c27e0b86e79f01c0205c5d2caec16fde33d6e
CRC32 A4B1B194
ssdeep None
Yara
  • anti_dbg - Checks if being debugged

Score

This file is very suspicious, with a score of 9.1 out of 10!

Please notice: The scoring system is currently still in development and should be considered an alpha feature.


Feedback

Expecting different results? Send us this analysis and we will inspect it. Click here

Information on Execution

Analysis
Category Started Completed Duration Routing Logs
FILE Dec. 11, 2025, 5:33 a.m. Dec. 11, 2025, 5:34 a.m. 38 seconds internet Show Analyzer Log
Show Cuckoo Log

Analyzer Log

2025-12-11 04:33:24,015 [analyzer] DEBUG: Starting analyzer from: C:\tmpf7a_02
2025-12-11 04:33:24,015 [analyzer] DEBUG: Pipe server name: \??\PIPE\gkgJrkPwCvJEmjncgNCKtnQNqkmIHn
2025-12-11 04:33:24,030 [analyzer] DEBUG: Log pipe server name: \??\PIPE\OhayqFmIcszlaVtVTGSZIGLeZ
2025-12-11 04:33:24,312 [analyzer] DEBUG: Started auxiliary module Curtain
2025-12-11 04:33:24,312 [analyzer] DEBUG: Started auxiliary module DbgView
2025-12-11 04:33:24,687 [analyzer] DEBUG: Started auxiliary module Disguise
2025-12-11 04:33:24,967 [analyzer] DEBUG: Loaded monitor into process with pid 504
2025-12-11 04:33:24,967 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets
2025-12-11 04:33:24,967 [analyzer] DEBUG: Started auxiliary module Human
2025-12-11 04:33:24,967 [analyzer] DEBUG: Started auxiliary module InstallCertificate
2025-12-11 04:33:24,983 [analyzer] DEBUG: Started auxiliary module Reboot
2025-12-11 04:33:25,092 [analyzer] DEBUG: Started auxiliary module RecentFiles
2025-12-11 04:33:25,092 [analyzer] DEBUG: Started auxiliary module Screenshots
2025-12-11 04:33:25,092 [analyzer] DEBUG: Started auxiliary module Sysmon
2025-12-11 04:33:25,092 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n
2025-12-11 04:33:25,233 [lib.api.process] ERROR: Failed to execute process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\EMP.dll' with arguments ['bin\\inject-x64.exe', '--app', u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\EMP.dll', '--only-start', '--curdir', 'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp'] (Error: Command '['bin\\inject-x64.exe', '--app', u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\EMP.dll', '--only-start', '--curdir', 'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp']' returned non-zero exit status 1)

Cuckoo Log

2025-12-11 05:33:30,096 [cuckoo.core.scheduler] INFO: Task #7220250: acquired machine win7x6427 (label=win7x6427)
2025-12-11 05:33:30,097 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.227 for task #7220250
2025-12-11 05:33:30,528 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 3169620 (interface=vboxnet0, host=192.168.168.227)
2025-12-11 05:33:33,753 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x6427
2025-12-11 05:33:35,251 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x6427 to vmcloak
2025-12-11 05:33:46,311 [cuckoo.core.guest] INFO: Starting analysis #7220250 on guest (id=win7x6427, ip=192.168.168.227)
2025-12-11 05:33:47,316 [cuckoo.core.guest] DEBUG: win7x6427: not ready yet
2025-12-11 05:33:52,343 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x6427, ip=192.168.168.227)
2025-12-11 05:33:52,426 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x6427, ip=192.168.168.227, monitor=latest, size=6660546)
2025-12-11 05:33:54,668 [cuckoo.core.resultserver] DEBUG: Task #7220250: live log analysis.log initialized.
2025-12-11 05:33:55,582 [cuckoo.core.resultserver] DEBUG: Task #7220250 is sending a BSON stream
2025-12-11 05:33:56,899 [cuckoo.core.resultserver] DEBUG: Task #7220250: File upload for 'shots/0001.jpg'
2025-12-11 05:33:56,910 [cuckoo.core.resultserver] DEBUG: Task #7220250 uploaded file length: 133504
2025-12-11 05:33:57,115 [cuckoo.core.guest] WARNING: win7x6427: analysis #7220250 caught an exception
Traceback (most recent call last):
  File "C:/tmpf7a_02/analyzer.py", line 824, in <module>
    success = analyzer.run()
  File "C:/tmpf7a_02/analyzer.py", line 673, in run
    pids = self.package.start(self.target)
  File "C:\tmpf7a_02\modules\packages\exe.py", line 34, in start
    return self.execute(path, args=shlex.split(args))
  File "C:\tmpf7a_02\lib\common\abstracts.py", line 205, in execute
    "Unable to execute the initial process, analysis aborted."
CuckooPackageError: Unable to execute the initial process, analysis aborted.

2025-12-11 05:33:57,128 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks
2025-12-11 05:33:57,161 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer
2025-12-11 05:33:58,696 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x6427 to path /srv/cuckoo/cwd/storage/analyses/7220250/memory.dmp
2025-12-11 05:33:58,698 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x6427
2025-12-11 05:34:07,529 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.227 for task #7220250
2025-12-11 05:34:07,529 [cuckoo.core.resultserver] DEBUG: Cancel <Context for LOG> for task 7220250
2025-12-11 05:34:07,870 [cuckoo.core.scheduler] DEBUG: Released database task #7220250
2025-12-11 05:34:07,888 [cuckoo.core.scheduler] INFO: Task #7220250: analysis procedure completed

Signatures

Yara rule detected for file (1 event)
description Checks if being debugged rule anti_dbg
The executable contains unknown PE section names indicative of a packer (could be a false positive) (2 events)
section EMP0
section EMP1
The binary likely contains encrypted or compressed data indicative of a packer (2 events)
section {u'size_of_data': u'0x00d22400', u'virtual_address': u'0x007b9000', u'entropy': 7.908959866868739, u'name': u'EMP1', u'virtual_size': u'0x00d23000'} entropy 7.90895986687 description A section with a high entropy has been found
entropy 0.999962823897 description Overall entropy of this PE file is high
File has been identified by 25 AntiVirus engines on VirusTotal as malicious (25 events)
Lionic Hacktool.Win32.Crack.3!c
Cynet Malicious (score: 100)
Skyhigh BehavesLike.Win64.Trojan.tc
ALYac Application.Generic.4452162
VIPRE Application.Generic.4452162
Sangfor Trojan.Win32.Agent.Vnwr
CrowdStrike win/grayware_confidence_100% (W)
BitDefender Application.Generic.4452162
Arcabit Application.Generic.D43EF42
ESET-NOD32 Win64/HackTool.Crack.DC potentially unsafe application
MicroWorld-eScan Application.Generic.4452162
Emsisoft Application.Generic.4452162 (B)
Zillya Tool.Crack.Win64.625
CTX dll.hacktool.crack
Sophos Generic Reputation PUA (PUA)
Webroot Win.Malware.Gen
Google Detected
Gridinsoft Trojan.Heur!.032120E2
GData Application.Generic.4452162
Varist W64/ABApplication.HNIO-1260
DeepInstinct MALICIOUS
Malwarebytes RiskWare.Crack
Ikarus PUA.HackTool.Crack
TrellixENS Artemis!6A0AB7D49DDB
alibabacloud HackTool:Win/Crack.DW
Screenshots
Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action VT Location
No hosts contacted.
Cuckoo

We're processing your submission... This could take a few seconds.