| Size | 13.1MB |
|---|---|
| Type | PE32+ executable (DLL) (GUI) x86-64, for MS Windows |
| MD5 | 6a0ab7d49ddba5bb6fc6ef06b466afbd |
| SHA1 | 1c4d421b11dcbe628a72b65b4091e035a664192f |
| SHA256 | 247bc25eeb95a19a64a26b9a82073e21fc6691806e0fcd9f663460ee778c58cc |
| SHA512 |
4f5cf34b6760afc586b2d247793b828f3cec209dca474ed48b385734efab94c714fc1617ba25c8ac39dc3079542c27e0b86e79f01c0205c5d2caec16fde33d6e
|
| CRC32 | A4B1B194 |
| ssdeep | None |
| Yara |
|
This file is very suspicious, with a score of 9.1 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
| Category | Started | Completed | Duration | Routing | Logs |
|---|---|---|---|---|---|
| FILE | Dec. 11, 2025, 5:33 a.m. | Dec. 11, 2025, 5:34 a.m. | 38 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-12-11 04:33:24,015 [analyzer] DEBUG: Starting analyzer from: C:\tmpf7a_02 2025-12-11 04:33:24,015 [analyzer] DEBUG: Pipe server name: \??\PIPE\gkgJrkPwCvJEmjncgNCKtnQNqkmIHn 2025-12-11 04:33:24,030 [analyzer] DEBUG: Log pipe server name: \??\PIPE\OhayqFmIcszlaVtVTGSZIGLeZ 2025-12-11 04:33:24,312 [analyzer] DEBUG: Started auxiliary module Curtain 2025-12-11 04:33:24,312 [analyzer] DEBUG: Started auxiliary module DbgView 2025-12-11 04:33:24,687 [analyzer] DEBUG: Started auxiliary module Disguise 2025-12-11 04:33:24,967 [analyzer] DEBUG: Loaded monitor into process with pid 504 2025-12-11 04:33:24,967 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-12-11 04:33:24,967 [analyzer] DEBUG: Started auxiliary module Human 2025-12-11 04:33:24,967 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-12-11 04:33:24,983 [analyzer] DEBUG: Started auxiliary module Reboot 2025-12-11 04:33:25,092 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-12-11 04:33:25,092 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-12-11 04:33:25,092 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-12-11 04:33:25,092 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-12-11 04:33:25,233 [lib.api.process] ERROR: Failed to execute process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\EMP.dll' with arguments ['bin\\inject-x64.exe', '--app', u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\EMP.dll', '--only-start', '--curdir', 'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp'] (Error: Command '['bin\\inject-x64.exe', '--app', u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\EMP.dll', '--only-start', '--curdir', 'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp']' returned non-zero exit status 1)
2025-12-11 05:33:30,096 [cuckoo.core.scheduler] INFO: Task #7220250: acquired machine win7x6427 (label=win7x6427)
2025-12-11 05:33:30,097 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.227 for task #7220250
2025-12-11 05:33:30,528 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 3169620 (interface=vboxnet0, host=192.168.168.227)
2025-12-11 05:33:33,753 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x6427
2025-12-11 05:33:35,251 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x6427 to vmcloak
2025-12-11 05:33:46,311 [cuckoo.core.guest] INFO: Starting analysis #7220250 on guest (id=win7x6427, ip=192.168.168.227)
2025-12-11 05:33:47,316 [cuckoo.core.guest] DEBUG: win7x6427: not ready yet
2025-12-11 05:33:52,343 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x6427, ip=192.168.168.227)
2025-12-11 05:33:52,426 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x6427, ip=192.168.168.227, monitor=latest, size=6660546)
2025-12-11 05:33:54,668 [cuckoo.core.resultserver] DEBUG: Task #7220250: live log analysis.log initialized.
2025-12-11 05:33:55,582 [cuckoo.core.resultserver] DEBUG: Task #7220250 is sending a BSON stream
2025-12-11 05:33:56,899 [cuckoo.core.resultserver] DEBUG: Task #7220250: File upload for 'shots/0001.jpg'
2025-12-11 05:33:56,910 [cuckoo.core.resultserver] DEBUG: Task #7220250 uploaded file length: 133504
2025-12-11 05:33:57,115 [cuckoo.core.guest] WARNING: win7x6427: analysis #7220250 caught an exception
Traceback (most recent call last):
File "C:/tmpf7a_02/analyzer.py", line 824, in <module>
success = analyzer.run()
File "C:/tmpf7a_02/analyzer.py", line 673, in run
pids = self.package.start(self.target)
File "C:\tmpf7a_02\modules\packages\exe.py", line 34, in start
return self.execute(path, args=shlex.split(args))
File "C:\tmpf7a_02\lib\common\abstracts.py", line 205, in execute
"Unable to execute the initial process, analysis aborted."
CuckooPackageError: Unable to execute the initial process, analysis aborted.
2025-12-11 05:33:57,128 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks
2025-12-11 05:33:57,161 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer
2025-12-11 05:33:58,696 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x6427 to path /srv/cuckoo/cwd/storage/analyses/7220250/memory.dmp
2025-12-11 05:33:58,698 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x6427
2025-12-11 05:34:07,529 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.227 for task #7220250
2025-12-11 05:34:07,529 [cuckoo.core.resultserver] DEBUG: Cancel <Context for LOG> for task 7220250
2025-12-11 05:34:07,870 [cuckoo.core.scheduler] DEBUG: Released database task #7220250
2025-12-11 05:34:07,888 [cuckoo.core.scheduler] INFO: Task #7220250: analysis procedure completed
| description | Checks if being debugged | rule | anti_dbg | ||||||
| section | EMP0 |
| section | EMP1 |
| section | {u'size_of_data': u'0x00d22400', u'virtual_address': u'0x007b9000', u'entropy': 7.908959866868739, u'name': u'EMP1', u'virtual_size': u'0x00d23000'} | entropy | 7.90895986687 | description | A section with a high entropy has been found | |||||||||
| entropy | 0.999962823897 | description | Overall entropy of this PE file is high | |||||||||||
| Lionic | Hacktool.Win32.Crack.3!c |
| Cynet | Malicious (score: 100) |
| Skyhigh | BehavesLike.Win64.Trojan.tc |
| ALYac | Application.Generic.4452162 |
| VIPRE | Application.Generic.4452162 |
| Sangfor | Trojan.Win32.Agent.Vnwr |
| CrowdStrike | win/grayware_confidence_100% (W) |
| BitDefender | Application.Generic.4452162 |
| Arcabit | Application.Generic.D43EF42 |
| ESET-NOD32 | Win64/HackTool.Crack.DC potentially unsafe application |
| MicroWorld-eScan | Application.Generic.4452162 |
| Emsisoft | Application.Generic.4452162 (B) |
| Zillya | Tool.Crack.Win64.625 |
| CTX | dll.hacktool.crack |
| Sophos | Generic Reputation PUA (PUA) |
| Webroot | Win.Malware.Gen |
| Detected | |
| Gridinsoft | Trojan.Heur!.032120E2 |
| GData | Application.Generic.4452162 |
| Varist | W64/ABApplication.HNIO-1260 |
| DeepInstinct | MALICIOUS |
| Malwarebytes | RiskWare.Crack |
| Ikarus | PUA.HackTool.Crack |
| TrellixENS | Artemis!6A0AB7D49DDB |
| alibabacloud | HackTool:Win/Crack.DW |