| Category | Package | Started | Completed | Duration | Log(s) |
|---|---|---|---|---|---|
| FILE | 2025-11-20 07:38:02 | 2025-11-20 07:38:31 | 29 seconds | Show Analysis Log |
2025-11-20 02:01:42,109 [root] INFO: Date set to: 20251120T07:38:01, timeout set to: 200 2025-11-20 07:38:01,017 [root] DEBUG: Starting analyzer from: C:\g4ngb5il 2025-11-20 07:38:01,018 [root] DEBUG: Storing results at: C:\KeQEql 2025-11-20 07:38:01,018 [root] DEBUG: Pipe server name: \\.\PIPE\QkdMLo 2025-11-20 07:38:01,019 [root] DEBUG: Python path: C:\Users\Admin\AppData\Local\Programs\Python\Python313-32 2025-11-20 07:38:01,019 [root] INFO: analysis running as an admin 2025-11-20 07:38:01,020 [root] DEBUG: no analysis package configured, picking one for you 2025-11-20 07:38:01,021 [root] INFO: analysis package selected: "generic" 2025-11-20 07:38:01,021 [root] DEBUG: importing analysis package module: "modules.packages.generic"... 2025-11-20 07:38:01,060 [root] DEBUG: imported analysis package "generic" 2025-11-20 07:38:01,060 [root] DEBUG: initializing analysis package "generic"... 2025-11-20 07:38:01,060 [lib.common.common] INFO: wrapping 2025-11-20 07:38:01,061 [lib.core.compound] INFO: C:\Temp already exists, skipping creation 2025-11-20 07:38:01,061 [root] DEBUG: New location of moved file: C:\Temp\eicar.com 2025-11-20 07:38:01,061 [root] INFO: Analyzer: Package modules.packages.generic does not specify a DLL option 2025-11-20 07:38:01,061 [root] INFO: Analyzer: Package modules.packages.generic does not specify a DLL_64 option 2025-11-20 07:38:01,062 [root] INFO: Analyzer: Package modules.packages.generic does not specify a loader option 2025-11-20 07:38:01,062 [root] INFO: Analyzer: Package modules.packages.generic does not specify a loader_64 option 2025-11-20 07:38:01,107 [root] DEBUG: Imported auxiliary module "modules.auxiliary.browser" 2025-11-20 07:38:01,168 [root] DEBUG: Imported auxiliary module "modules.auxiliary.digisig" 2025-11-20 07:38:01,193 [root] DEBUG: Imported auxiliary module "modules.auxiliary.disguise" 2025-11-20 07:38:01,219 [root] DEBUG: Imported auxiliary module "modules.auxiliary.human" 2025-11-20 07:38:01,229 [lib.api.screenshot] DEBUG: Importing 'PIL.ImageChops' 2025-11-20 07:38:01,297 [lib.api.screenshot] DEBUG: Importing 'PIL.ImageGrab' 2025-11-20 07:38:01,357 [lib.api.screenshot] DEBUG: Importing 'PIL.ImageDraw' 2025-11-20 07:38:01,643 [lib.api.screenshot] INFO: Please upgrade Pillow to >= 5.4.1 for best performance 2025-11-20 07:38:01,644 [root] DEBUG: Imported auxiliary module "modules.auxiliary.screenshots" 2025-11-20 07:38:01,648 [root] DEBUG: Imported auxiliary module "modules.auxiliary.tlsdump" 2025-11-20 07:38:01,649 [root] DEBUG: Initialized auxiliary module "Browser" 2025-11-20 07:38:01,649 [root] DEBUG: attempting to configure 'Browser' from data 2025-11-20 07:38:01,651 [root] DEBUG: module Browser does not support data configuration, ignoring 2025-11-20 07:38:01,651 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.browser"... 2025-11-20 07:38:01,652 [root] DEBUG: Started auxiliary module modules.auxiliary.browser 2025-11-20 07:38:01,652 [root] DEBUG: Initialized auxiliary module "DigiSig" 2025-11-20 07:38:01,653 [root] DEBUG: attempting to configure 'DigiSig' from data 2025-11-20 07:38:01,653 [root] DEBUG: module DigiSig does not support data configuration, ignoring 2025-11-20 07:38:01,653 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.digisig"... 2025-11-20 07:38:01,653 [modules.auxiliary.digisig] DEBUG: Checking for a digital signature 2025-11-20 07:38:02,585 [modules.auxiliary.digisig] DEBUG: File format not recognized 2025-11-20 07:38:02,585 [modules.auxiliary.digisig] INFO: Uploading signature results to aux/DigiSig.json 2025-11-20 07:38:02,587 [root] DEBUG: Started auxiliary module modules.auxiliary.digisig 2025-11-20 07:38:02,587 [root] DEBUG: Initialized auxiliary module "Disguise" 2025-11-20 07:38:02,587 [root] DEBUG: attempting to configure 'Disguise' from data 2025-11-20 07:38:02,588 [root] DEBUG: module Disguise does not support data configuration, ignoring 2025-11-20 07:38:02,588 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.disguise"... 2025-11-20 07:38:02,589 [modules.auxiliary.disguise] INFO: Disguising GUID to 9c410b02-8e97-47d5-b0f6-efc962d118f5 2025-11-20 07:38:02,589 [root] DEBUG: Started auxiliary module modules.auxiliary.disguise 2025-11-20 07:38:02,590 [root] DEBUG: Initialized auxiliary module "Human" 2025-11-20 07:38:02,590 [root] DEBUG: attempting to configure 'Human' from data 2025-11-20 07:38:02,590 [root] DEBUG: module Human does not support data configuration, ignoring 2025-11-20 07:38:02,590 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.human"... 2025-11-20 07:38:02,591 [root] DEBUG: Started auxiliary module modules.auxiliary.human 2025-11-20 07:38:02,592 [root] DEBUG: Initialized auxiliary module "Screenshots" 2025-11-20 07:38:02,592 [root] DEBUG: attempting to configure 'Screenshots' from data 2025-11-20 07:38:02,593 [root] DEBUG: module Screenshots does not support data configuration, ignoring 2025-11-20 07:38:02,593 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.screenshots"... 2025-11-20 07:38:02,594 [root] DEBUG: Started auxiliary module modules.auxiliary.screenshots 2025-11-20 07:38:02,594 [root] DEBUG: Initialized auxiliary module "TLSDumpMasterSecrets" 2025-11-20 07:38:02,595 [root] DEBUG: attempting to configure 'TLSDumpMasterSecrets' from data 2025-11-20 07:38:02,595 [root] DEBUG: module TLSDumpMasterSecrets does not support data configuration, ignoring 2025-11-20 07:38:02,595 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.tlsdump"... 2025-11-20 07:38:02,598 [modules.auxiliary.tlsdump] INFO: lsass.exe found, pid 608 2025-11-20 07:38:02,767 [lib.api.process] INFO: Monitor config for <Process 608 lsass.exe>: C:\g4ngb5il\dll\608.ini 2025-11-20 07:38:02,769 [lib.api.process] INFO: Option 'tlsdump' with value '1' sent to monitor 2025-11-20 07:38:02,777 [lib.api.process] INFO: 64-bit DLL to inject is C:\g4ngb5il\dll\CEqvWzbT.dll, loader C:\g4ngb5il\bin\VUAoKDbg.exe 2025-11-20 07:38:02,796 [root] DEBUG: Loader: Injecting process 608 with C:\g4ngb5il\dll\CEqvWzbT.dll. 2025-11-20 07:38:02,814 [root] DEBUG: 608: Python path set to 'C:\Users\Admin\AppData\Local\Programs\Python\Python313-32'. 2025-11-20 07:38:02,815 [root] DEBUG: 608: Disabling sleep skipping. 2025-11-20 07:38:02,816 [root] DEBUG: 608: TLS secret dump mode enabled. 2025-11-20 07:38:02,851 [root] DEBUG: 608: RtlInsertInvertedFunctionTable 0x00007FFEE348090E, LdrpInvertedFunctionTableSRWLock 0x00007FFEE35DD4F0 2025-11-20 07:38:02,853 [root] DEBUG: 608: Monitor initialised: 64-bit capemon loaded in process 608 at 0x00007FFEB9770000, thread 1616, image base 0x00007FF60EE30000, stack from 0x000000A5F4C72000-0x000000A5F4C80000 2025-11-20 07:38:02,853 [root] DEBUG: 608: Commandline: C:\Windows\system32\lsass.exe 2025-11-20 07:38:02,866 [root] DEBUG: 608: Hooked 5 out of 5 functions 2025-11-20 07:38:02,868 [root] DEBUG: InjectDllViaThread: Successfully injected Dll into process via RtlCreateUserThread. 2025-11-20 07:38:02,869 [root] DEBUG: Successfully injected DLL C:\g4ngb5il\dll\CEqvWzbT.dll. 2025-11-20 07:38:02,873 [lib.api.process] INFO: Injected into 64-bit <Process 608 lsass.exe> 2025-11-20 07:38:02,873 [root] DEBUG: Started auxiliary module modules.auxiliary.tlsdump 2025-11-20 07:38:06,063 [root] INFO: Restarting WMI Service 2025-11-20 07:38:08,208 [root] DEBUG: package modules.packages.generic does not support configure, ignoring 2025-11-20 07:38:08,209 [root] WARNING: configuration error for package modules.packages.generic: error importing data.packages.generic: No module named 'data.packages' 2025-11-20 07:38:08,210 [lib.core.compound] INFO: C:\Temp already exists, skipping creation 2025-11-20 07:38:08,212 [lib.api.process] INFO: Successfully executed process from path "C:\Windows\system32\cmd.exe" with arguments "/c start /wait "" "C:\Temp\eicar.com"" with pid 1984 2025-11-20 07:38:08,212 [lib.api.process] INFO: Monitor config for <Process 1984 cmd.exe>: C:\g4ngb5il\dll\1984.ini 2025-11-20 07:38:08,216 [lib.api.process] INFO: 32-bit DLL to inject is C:\g4ngb5il\dll\SEXkwiMD.dll, loader C:\g4ngb5il\bin\guTaJgS.exe 2025-11-20 07:38:08,265 [root] DEBUG: Loader: Injecting process 1984 (thread 992) with C:\g4ngb5il\dll\SEXkwiMD.dll. 2025-11-20 07:38:08,268 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT. 2025-11-20 07:38:08,269 [root] DEBUG: Successfully injected DLL C:\g4ngb5il\dll\SEXkwiMD.dll. 2025-11-20 07:38:08,272 [lib.api.process] INFO: Injected into 32-bit <Process 1984 cmd.exe> 2025-11-20 07:38:10,283 [lib.api.process] INFO: Successfully resumed <Process 1984 cmd.exe> 2025-11-20 07:38:10,459 [root] DEBUG: 1984: Python path set to 'C:\Users\Admin\AppData\Local\Programs\Python\Python313-32'. 2025-11-20 07:38:10,461 [root] DEBUG: 1984: Disabling sleep skipping. 2025-11-20 07:38:10,462 [root] DEBUG: 1984: Dropped file limit defaulting to 100. 2025-11-20 07:38:10,485 [root] DEBUG: 1984: YaraInit: Compiled 43 rule files 2025-11-20 07:38:10,489 [root] DEBUG: 1984: YaraInit: Compiled rules saved to file C:\g4ngb5il\data\yara\capemon.yac 2025-11-20 07:38:10,491 [root] DEBUG: 1984: YaraScan: Scanning 0x00610000, size 0x595ee 2025-11-20 07:38:10,496 [root] DEBUG: 1984: YaraScan hit: FindFixAndRun 2025-11-20 07:38:10,497 [root] DEBUG: 1984: Monitor initialised: 32-bit capemon loaded in process 1984 at 0x731a0000, thread 992, image base 0x610000, stack from 0x2673000-0x2770000 2025-11-20 07:38:10,498 [root] DEBUG: 1984: Commandline: "C:\Windows\system32\cmd.exe" /c start /wait "" "C:\Temp\eicar.com" 2025-11-20 07:38:10,558 [root] DEBUG: 1984: hook_api: LdrpCallInitRoutine export address 0x76FC2B50 obtained via GetFunctionAddress 2025-11-20 07:38:10,605 [root] WARNING: b'Unable to place hook on GetCommandLineA' 2025-11-20 07:38:10,606 [root] DEBUG: 1984: set_hooks: Unable to hook GetCommandLineA 2025-11-20 07:38:10,607 [root] WARNING: b'Unable to place hook on GetCommandLineW' 2025-11-20 07:38:10,608 [root] DEBUG: 1984: set_hooks: Unable to hook GetCommandLineW 2025-11-20 07:38:10,623 [root] DEBUG: 1984: Hooked 625 out of 627 functions 2025-11-20 07:38:10,628 [root] DEBUG: 1984: set_hooks_exe: Hooked FindFixAndRun at 0x0061AD60 2025-11-20 07:38:10,632 [root] DEBUG: 1984: Syscall hook installed, syscall logging level 1 2025-11-20 07:38:10,641 [root] DEBUG: 1984: RestoreHeaders: Restored original import table. 2025-11-20 07:38:10,642 [root] INFO: Loaded monitor into process with pid 1984 2025-11-20 07:38:10,644 [root] DEBUG: 1984: caller_dispatch: Added region at 0x00610000 to tracked regions list (ntdll::memcpy returns to 0x006268FA, thread 992). 2025-11-20 07:38:10,645 [root] DEBUG: 1984: YaraScan: Scanning 0x00610000, size 0x595ee 2025-11-20 07:38:10,650 [root] DEBUG: 1984: ProcessImageBase: Main module image at 0x00610000 unmodified (entropy change 0.000000e+00) 2025-11-20 07:38:10,698 [root] DEBUG: 1984: InstrumentationCallback: Added region at 0x75A163AC (base 0x758D0000) to tracked regions list (thread 992). 2025-11-20 07:38:10,699 [root] DEBUG: 1984: ProcessTrackedRegion: Region at 0x758D0000 mapped as \Device\HarddiskVolume2\Windows\SysWOW64\KernelBase.dll is in known range, skipping 2025-11-20 07:38:10,715 [root] DEBUG: 1984: DLL loaded at 0x741F0000: C:\Windows\SYSTEM32\VERSION (0x8000 bytes). 2025-11-20 07:38:10,716 [root] DEBUG: 1984: DLL loaded at 0x73540000: C:\Windows\SYSTEM32\NtVdm64 (0x9000 bytes). 2025-11-20 07:38:10,739 [root] DEBUG: 1984: NtTerminateProcess hook: Attempting to dump process 1984 2025-11-20 07:38:10,741 [root] DEBUG: 1984: VerifyCodeSection: Executable code does not match, 0x9d62 of 0x2bfcb matching 2025-11-20 07:38:10,742 [root] DEBUG: 1984: DoProcessDump: Code modification detected, dumping Imagebase at 0x00610000. 2025-11-20 07:38:10,743 [root] DEBUG: 1984: DumpImageInCurrentProcess: Attempting to dump virtual PE image. 2025-11-20 07:38:10,743 [root] DEBUG: 1984: DumpProcess: Instantiating PeParser with address: 0x00610000. 2025-11-20 07:38:10,744 [root] DEBUG: 1984: DumpProcess: Module entry point VA is 0x00016B20. 2025-11-20 07:38:10,753 [lib.common.results] INFO: Uploading file C:\KeQEql\CAPE\1984_424325410384204112025 to procdump\fb5ba2cbe8fe7e1424289757374950772da9dd0957f9f5a3de5bd3c285fb5dc6; Size is 346624; Max size: 100000000 2025-11-20 07:38:10,768 [root] DEBUG: 1984: DumpProcess: Module image dump success - dump size 0x54a00. 2025-11-20 07:38:10,777 [root] INFO: Process with pid 1984 has terminated 2025-11-20 07:38:16,351 [root] INFO: Process list is empty, terminating analysis 2025-11-20 07:38:17,363 [root] INFO: Created shutdown mutex 2025-11-20 07:38:18,377 [root] INFO: Shutting down package 2025-11-20 07:38:18,378 [root] INFO: Stopping auxiliary modules 2025-11-20 07:38:18,378 [root] INFO: Stopping auxiliary module: Browser 2025-11-20 07:38:18,378 [root] INFO: Stopping auxiliary module: Human 2025-11-20 07:38:18,394 [root] INFO: Stopping auxiliary module: Screenshots 2025-11-20 07:38:19,114 [root] INFO: Finishing auxiliary modules 2025-11-20 07:38:19,114 [root] INFO: Shutting down pipe server and dumping dropped files 2025-11-20 07:38:19,115 [root] WARNING: Folder at path "C:\KeQEql\debugger" does not exist, skipping 2025-11-20 07:38:19,115 [root] WARNING: Folder at path "C:\KeQEql\tlsdump" does not exist, skipping 2025-11-20 07:38:19,122 [root] INFO: Analysis completed
| Name | Label | Manager | Started On | Shutdown On | Route |
|---|---|---|---|---|---|
| MalwareGuest | MalwareGuest | Proxmox | 2025-11-20 07:38:02 | 2025-11-20 07:38:30 | internet |
No hosts contacted.
| Name | Response | Post-Analysis Lookup |
|---|---|---|
| mozilla.map.fastly.net [VT] |
A 151.101.65.91
[VT]
A 151.101.129.91 [VT] A 151.101.193.91 [VT] A 151.101.1.91 [VT] |
151.101.1.91 [VT] |
| mozilla.map.fastly.net [VT] |
AAAA 2a04:4e42::347
[VT]
AAAA 2a04:4e42:200::347 [VT] AAAA 2a04:4e42:600::347 [VT] AAAA 2a04:4e42:400::347 [VT] |
151.101.1.91 [VT] |
No hosts contacted.
No TCP connections recorded.
No UDP connections recorded.
No domains contacted.
No HTTP(s) requests performed.
No SMTP traffic performed.
No IRC requests performed.
No ICMP traffic performed.
No CIF Results
No Suricata Alerts
No Suricata TLS
No Suricata HTTP