Analysis

Category Package Started Completed Duration Options Log
FILE generic 2019-08-13 17:49:02 2019-08-13 17:49:37 35 seconds Show Options Show Log
route = internet
procdump = 1
2019-08-13 18:49:03,000 [root] INFO: Date set to: 08-13-19, time set to: 17:49:03, timeout set to: 200
2019-08-13 18:49:03,015 [root] DEBUG: Starting analyzer from: C:\wkyeull
2019-08-13 18:49:03,015 [root] DEBUG: Storing results at: C:\LLSMFR
2019-08-13 18:49:03,015 [root] DEBUG: Pipe server name: \\.\PIPE\VxboEZQ
2019-08-13 18:49:03,015 [root] DEBUG: No analysis package specified, trying to detect it automagically.
2019-08-13 18:49:03,015 [root] INFO: Automatically selected analysis package "generic"
2019-08-13 18:49:03,467 [root] DEBUG: Started auxiliary module Browser
2019-08-13 18:49:03,467 [root] DEBUG: Started auxiliary module Curtain
2019-08-13 18:49:03,467 [modules.auxiliary.digisig] DEBUG: Checking for a digitial signature.
2019-08-13 18:49:04,059 [modules.auxiliary.digisig] DEBUG: File format not recognized.
2019-08-13 18:49:04,059 [modules.auxiliary.digisig] INFO: Uploading signature results to aux/DigiSig.json
2019-08-13 18:49:04,059 [root] DEBUG: Started auxiliary module DigiSig
2019-08-13 18:49:04,075 [root] DEBUG: Started auxiliary module Disguise
2019-08-13 18:49:04,075 [root] DEBUG: Started auxiliary module Human
2019-08-13 18:49:04,075 [root] DEBUG: Started auxiliary module Screenshots
2019-08-13 18:49:04,075 [root] DEBUG: Started auxiliary module Sysmon
2019-08-13 18:49:04,075 [root] DEBUG: Started auxiliary module Usage
2019-08-13 18:49:04,075 [root] INFO: Analyzer: Package modules.packages.generic does not specify a DLL option
2019-08-13 18:49:04,075 [root] INFO: Analyzer: Package modules.packages.generic does not specify a DLL_64 option
2019-08-13 18:49:04,075 [lib.api.process] INFO: Successfully executed process from path "C:\Windows\system32\cmd.exe" with arguments "/c start /wait "" "C:\Users\user\AppData\Local\Temp\Advice8132019.zip"" with pid 264
2019-08-13 18:49:04,075 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2019-08-13 18:49:04,075 [lib.api.process] INFO: 32-bit DLL to inject is C:\wkyeull\dll\bcOekjM.dll, loader C:\wkyeull\bin\bBcYsaO.exe
2019-08-13 18:49:04,138 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VxboEZQ.
2019-08-13 18:49:04,138 [root] DEBUG: Loader: Injecting process 264 (thread 1988) with C:\wkyeull\dll\bcOekjM.dll.
2019-08-13 18:49:04,138 [root] DEBUG: Process image base: 0x4A170000
2019-08-13 18:49:04,138 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\wkyeull\dll\bcOekjM.dll.
2019-08-13 18:49:04,138 [root] DEBUG: InjectDllViaIAT: Found a free region from 0x4A1BC000 - 0x77110000
2019-08-13 18:49:04,138 [root] DEBUG: InjectDllViaIAT: Allocated 0x19c bytes for new import table at 0x4A1C0000.
2019-08-13 18:49:04,138 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2019-08-13 18:49:04,138 [root] DEBUG: Successfully injected DLL C:\wkyeull\dll\bcOekjM.dll.
2019-08-13 18:49:04,138 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 264
2019-08-13 18:49:06,151 [lib.api.process] INFO: Successfully resumed process with pid 264
2019-08-13 18:49:06,151 [root] INFO: Added new process to list with pid: 264
2019-08-13 18:49:06,181 [root] DEBUG: Terminate processes on terminate_event enabled.
2019-08-13 18:49:06,181 [root] DEBUG: Process dumps enabled.
2019-08-13 18:49:06,243 [root] INFO: Disabling sleep skipping.
2019-08-13 18:49:06,243 [root] DEBUG: RestoreHeaders: Restored original import table.
2019-08-13 18:49:06,243 [root] INFO: Disabling sleep skipping.
2019-08-13 18:49:06,243 [root] INFO: Disabling sleep skipping.
2019-08-13 18:49:06,243 [root] INFO: Disabling sleep skipping.
2019-08-13 18:49:06,243 [root] DEBUG: CAPE initialised: 32-bit base package loaded in process 264 at 0x747e0000, image base 0x4a170000, stack from 0x233000-0x330000
2019-08-13 18:49:06,259 [root] DEBUG: Commandline: C:\Users\user\AppData\Local\Temp\"C:\Windows\system32\cmd.exe" \c start \wait "" "C:\Users\user\AppData\Local\Temp\Advice8132019.zip".
2019-08-13 18:49:06,259 [root] INFO: Monitor successfully loaded in process with pid 264.
2019-08-13 18:49:06,259 [root] DEBUG: DLL loaded at 0x75E70000: C:\Windows\syswow64\SHELL32 (0xc4a000 bytes).
2019-08-13 18:49:06,276 [root] DEBUG: DLL loaded at 0x743A0000: C:\Windows\WinSxS\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32 (0x19e000 bytes).
2019-08-13 18:49:06,306 [root] DEBUG: DLL loaded at 0x742A0000: C:\Windows\SysWOW64\PROPSYS (0xf5000 bytes).
2019-08-13 18:49:06,306 [root] DEBUG: DLL loaded at 0x75980000: C:\Windows\syswow64\OLEAUT32 (0x8f000 bytes).
2019-08-13 18:49:06,322 [root] DEBUG: DLL loaded at 0x74EB0000: C:\Windows\syswow64\CLBCatQ (0x83000 bytes).
2019-08-13 18:49:06,338 [root] DEBUG: DLL loaded at 0x749D0000: C:\Windows\SysWOW64\ntmarta (0x21000 bytes).
2019-08-13 18:49:06,338 [root] DEBUG: DLL loaded at 0x76EA0000: C:\Windows\syswow64\WLDAP32 (0x45000 bytes).
2019-08-13 18:49:06,354 [root] DEBUG: DLL loaded at 0x749B0000: C:\Windows\SysWOW64\profapi (0xb000 bytes).
2019-08-13 18:49:06,384 [root] DEBUG: DLL loaded at 0x75A70000: C:\Windows\syswow64\SETUPAPI (0x19d000 bytes).
2019-08-13 18:49:06,384 [root] DEBUG: DLL loaded at 0x75A10000: C:\Windows\syswow64\CFGMGR32 (0x27000 bytes).
2019-08-13 18:49:06,384 [root] DEBUG: DLL loaded at 0x75D40000: C:\Windows\syswow64\DEVOBJ (0x12000 bytes).
2019-08-13 18:49:06,400 [root] DEBUG: DLL unloaded from 0x75E70000.
2019-08-13 18:49:06,415 [root] DEBUG: DLL loaded at 0x74AF0000: C:\Windows\SysWOW64\apphelp (0x4c000 bytes).
2019-08-13 18:49:06,650 [root] DEBUG: DLL loaded at 0x74950000: C:\Windows\System32\shdocvw (0x2e000 bytes).
2019-08-13 18:49:06,868 [root] DEBUG: DLL loaded at 0x74130000: C:\Windows\system32\explorerframe (0x16f000 bytes).
2019-08-13 18:49:06,914 [root] DEBUG: DLL loaded at 0x74980000: C:\Windows\system32\DUser (0x2f000 bytes).
2019-08-13 18:49:06,914 [root] DEBUG: DLL loaded at 0x74070000: C:\Windows\system32\DUI70 (0xb2000 bytes).
2019-08-13 18:49:06,977 [root] DEBUG: DLL loaded at 0x74C70000: C:\Windows\SysWOW64\CRYPTSP (0x16000 bytes).
2019-08-13 18:49:06,977 [root] DEBUG: DLL loaded at 0x74C30000: C:\Windows\system32\rsaenh (0x3b000 bytes).
2019-08-13 18:49:06,977 [root] DEBUG: DLL loaded at 0x74940000: C:\Windows\SysWOW64\RpcRtRemote (0xe000 bytes).
2019-08-13 18:49:06,993 [root] DEBUG: DLL loaded at 0x74020000: C:\Windows\SysWOW64\actxprxy (0x4e000 bytes).
2019-08-13 18:49:07,009 [root] DEBUG: DLL loaded at 0x73FC0000: C:\Windows\SysWOW64\SXS (0x5f000 bytes).
2019-08-13 18:49:07,055 [root] DEBUG: NtTerminateProcess hook: Attempting to dump process 264
2019-08-13 18:49:07,055 [root] DEBUG: GetHookCallerBase: thread 1988 (handle 0x0), return address 0x4A177302, allocation base 0x4A170000.
2019-08-13 18:49:07,055 [root] DEBUG: DumpInterestingRegions: Dumping Imagebase at 0x4A170000.
2019-08-13 18:49:07,055 [root] DEBUG: DumpProcess: Instantiating PeParser with address: 0x4A170000.
2019-08-13 18:49:07,055 [root] DEBUG: DumpProcess: Module entry point VA is 0x0000829A.
2019-08-13 18:49:07,071 [root] INFO: Added new CAPE file to list with path: C:\LLSMFR\CAPE\264_8523117205749114382019
2019-08-13 18:49:07,071 [root] DEBUG: DumpProcess: Module image dump success - dump size 0x49e00.
2019-08-13 18:49:07,071 [root] DEBUG: DLL unloaded from 0x742A0000.
2019-08-13 18:49:07,071 [root] DEBUG: DLL unloaded from 0x75140000.
2019-08-13 18:49:07,071 [root] DEBUG: DLL unloaded from 0x749D0000.
2019-08-13 18:49:07,071 [root] INFO: Notified of termination of process with pid 264.
2019-08-13 18:49:07,164 [root] INFO: Process with pid 264 has terminated
2019-08-13 18:49:12,250 [root] INFO: Process list is empty, terminating analysis.
2019-08-13 18:49:13,263 [root] INFO: Created shutdown mutex.
2019-08-13 18:49:14,278 [root] INFO: Shutting down package.
2019-08-13 18:49:14,278 [root] INFO: Stopping auxiliary modules.
2019-08-13 18:49:14,278 [root] INFO: Finishing auxiliary modules.
2019-08-13 18:49:14,278 [root] INFO: Shutting down pipe server and dumping dropped files.
2019-08-13 18:49:14,278 [root] WARNING: File at path "C:\LLSMFR\debugger" does not exist, skip.
2019-08-13 18:49:14,278 [root] INFO: Analysis completed.

MalScore

0.0

Benign

Machine

Name Label Manager Started On Shutdown On
target-01 target-01 ESX 2019-08-13 17:49:02 2019-08-13 17:49:37

File Details

File Name Advice8132019.zip
File Size 3379 bytes
File Type Zip archive data, at least v2.0 to extract
MD5 f320d986bc078dcc9d17f1e02aebf674
SHA1 b04af2d94be6d45602f4dc239008057f1bb0a61c
SHA256 13b9bfaa4848e37f173072ff80c20edd8d234de35096c376ac349192a9a95ddb
SHA512 c421c10f43ad73c0e56a5a8a11b3979eb3e81c4db0345c17e2a1c71b05f6220084e3d710e9320800d3dc0b6c769811c9f9b16f0a1603f853ef9a253713d52e0d
CRC32 FD1792A5
Ssdeep 96:qiLJ3oecpBrgsojclYmHoeVqv7yNs78n3UzN4mN:qwoecjrRoclvoeY+Nsw3MNT
TrID
  • 80.0% (.ZIP) ZIP compressed archive (4000/1)
  • 20.0% (.BIN) PrintFox/Pagefox bitmap (var. P) (1000/1)
ClamAV None matched
Yara None matched
CAPE Yara None matched
Resubmit sample

Signatures

No signatures


Screenshots


Hosts

No hosts contacted.

DNS

No domains contacted.


Summary

No static analysis available.
This file is not on VirusTotal.

Process Tree


cmd.exe, PID: 264, Parent PID: 2480
Full Path: C:\Windows\SysWOW64\cmd.exe
Command Line: "C:\Windows\system32\cmd.exe" /c start /wait "" "C:\Users\user\AppData\Local\Temp\Advice8132019.zip"

Hosts

No hosts contacted.

TCP

No TCP connections recorded.

UDP

No UDP connections recorded.

DNS

No domains contacted.

HTTP Requests

No HTTP requests performed.

SMTP traffic

No SMTP traffic performed.

IRC traffic

No IRC requests performed.

ICMP traffic

No ICMP traffic performed.

CIF Results

No CIF Results

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Suricata HTTP

No Suricata HTTP

Sorry! No dropped Suricata Extracted files.

JA3

No JA3 hashes found.

Sorry! No dropped files.
Sorry! No CAPE files.
Process Name cmd.exe
PID 264
Dump Size 302592 bytes
Module Path C:\Windows\SysWOW64\cmd.exe
Type PE imageexecutable
MD5 1c6f5389ccffd67a28a7088660e13b76
SHA1 85e730d068648cf0eff8958295f84ea631036d78
SHA256 8a8feb71626a78ef22dbc280af003a9af74c0961b4f9af615dd4b7e745219409
CRC32 DB52B47A
Ssdeep 3072:jGO0UJfIzJy/L8Y575V1RElO5LitpcYkHjyGez1c:6O0ofp/Pd38QupcYkHmt+
ClamAV None
Yara None matched
CAPE Yara None matched
Dump Filename 8a8feb71626a78ef22dbc280af003a9af74c0961b4f9af615dd4b7e745219409
Download

Comments



No comments posted

Processing ( 1.215 seconds )

  • 0.343 CAPE
  • 0.325 ProcDump
  • 0.3 Static
  • 0.116 Deduplicate
  • 0.105 TrID
  • 0.012 TargetInfo
  • 0.007 NetworkAnalysis
  • 0.004 AnalysisInfo
  • 0.002 BehaviorAnalysis
  • 0.001 Debug

Signatures ( 0.039 seconds )

  • 0.007 antiav_detectreg
  • 0.004 ransomware_files
  • 0.003 persistence_autorun
  • 0.003 antiav_detectfile
  • 0.003 infostealer_ftp
  • 0.003 ransomware_extensions
  • 0.002 browser_security
  • 0.002 infostealer_bitcoin
  • 0.002 infostealer_im
  • 0.001 tinba_behavior
  • 0.001 rat_nanocore
  • 0.001 cerber_behavior
  • 0.001 antianalysis_detectfile
  • 0.001 antianalysis_detectreg
  • 0.001 antivm_vbox_files
  • 0.001 antivm_vbox_keys
  • 0.001 geodo_banking_trojan
  • 0.001 disables_browser_warn
  • 0.001 infostealer_mail

Reporting ( 0.0 seconds )

Task ID 87739
Mongo ID 5d52f836399c393247a5786f
Cuckoo release 1.3-CAPE
Delete