| Category | Package | Started | Completed | Duration | Log(s) |
|---|---|---|---|---|---|
| FILE | python | 2025-11-20 14:25:54 | 2025-11-20 14:26:44 | 50 seconds | Show Analysis Log |
2025-11-20 02:03:38,603 [root] INFO: Date set to: 20251120T14:25:54, timeout set to: 200 2025-11-20 14:25:54,024 [root] DEBUG: Starting analyzer from: C:\8llta4uw 2025-11-20 14:25:54,025 [root] DEBUG: Storing results at: C:\tufUOsbM 2025-11-20 14:25:54,025 [root] DEBUG: Pipe server name: \\.\PIPE\dTDCqcr 2025-11-20 14:25:54,025 [root] DEBUG: Python path: C:\Users\Admin\AppData\Local\Programs\Python\Python313-32 2025-11-20 14:25:54,025 [root] INFO: analysis running as an admin 2025-11-20 14:25:54,026 [root] INFO: analysis package specified: "python" 2025-11-20 14:25:54,026 [root] DEBUG: importing analysis package module: "modules.packages.python"... 2025-11-20 14:25:54,033 [root] DEBUG: imported analysis package "python" 2025-11-20 14:25:54,034 [root] DEBUG: initializing analysis package "python"... 2025-11-20 14:25:54,035 [lib.common.common] INFO: wrapping 2025-11-20 14:25:54,036 [lib.core.compound] INFO: C:\Temp already exists, skipping creation 2025-11-20 14:25:54,036 [root] DEBUG: New location of moved file: C:\Temp\app.py 2025-11-20 14:25:54,037 [root] INFO: Analyzer: Package modules.packages.python does not specify a DLL option 2025-11-20 14:25:54,037 [root] INFO: Analyzer: Package modules.packages.python does not specify a DLL_64 option 2025-11-20 14:25:54,037 [root] INFO: Analyzer: Package modules.packages.python does not specify a loader option 2025-11-20 14:25:54,037 [root] INFO: Analyzer: Package modules.packages.python does not specify a loader_64 option 2025-11-20 14:25:54,073 [root] DEBUG: Imported auxiliary module "modules.auxiliary.browser" 2025-11-20 14:25:54,092 [root] DEBUG: Imported auxiliary module "modules.auxiliary.digisig" 2025-11-20 14:25:54,114 [root] DEBUG: Imported auxiliary module "modules.auxiliary.disguise" 2025-11-20 14:25:54,133 [root] DEBUG: Imported auxiliary module "modules.auxiliary.human" 2025-11-20 14:25:54,140 [lib.api.screenshot] DEBUG: Importing 'PIL.ImageChops' 2025-11-20 14:25:54,207 [lib.api.screenshot] DEBUG: Importing 'PIL.ImageGrab' 2025-11-20 14:25:54,211 [lib.api.screenshot] DEBUG: Importing 'PIL.ImageDraw' 2025-11-20 14:25:54,293 [lib.api.screenshot] INFO: Please upgrade Pillow to >= 5.4.1 for best performance 2025-11-20 14:25:54,294 [root] DEBUG: Imported auxiliary module "modules.auxiliary.screenshots" 2025-11-20 14:25:54,298 [root] DEBUG: Imported auxiliary module "modules.auxiliary.tlsdump" 2025-11-20 14:25:54,298 [root] DEBUG: Initialized auxiliary module "Browser" 2025-11-20 14:25:54,299 [root] DEBUG: attempting to configure 'Browser' from data 2025-11-20 14:25:54,301 [root] DEBUG: module Browser does not support data configuration, ignoring 2025-11-20 14:25:54,301 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.browser"... 2025-11-20 14:25:54,302 [root] DEBUG: Started auxiliary module modules.auxiliary.browser 2025-11-20 14:25:54,302 [root] DEBUG: Initialized auxiliary module "DigiSig" 2025-11-20 14:25:54,302 [root] DEBUG: attempting to configure 'DigiSig' from data 2025-11-20 14:25:54,303 [root] DEBUG: module DigiSig does not support data configuration, ignoring 2025-11-20 14:25:54,303 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.digisig"... 2025-11-20 14:25:54,303 [modules.auxiliary.digisig] DEBUG: Checking for a digital signature 2025-11-20 14:25:54,947 [modules.auxiliary.digisig] DEBUG: File format not recognized 2025-11-20 14:25:54,949 [modules.auxiliary.digisig] INFO: Uploading signature results to aux/DigiSig.json 2025-11-20 14:25:54,961 [root] DEBUG: Started auxiliary module modules.auxiliary.digisig 2025-11-20 14:25:54,962 [root] DEBUG: Initialized auxiliary module "Disguise" 2025-11-20 14:25:54,962 [root] DEBUG: attempting to configure 'Disguise' from data 2025-11-20 14:25:54,962 [root] DEBUG: module Disguise does not support data configuration, ignoring 2025-11-20 14:25:54,962 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.disguise"... 2025-11-20 14:25:54,963 [modules.auxiliary.disguise] INFO: Disguising GUID to 0f4d1863-31f8-4954-b1e3-75f12194b55d 2025-11-20 14:25:54,964 [root] DEBUG: Started auxiliary module modules.auxiliary.disguise 2025-11-20 14:25:54,964 [root] DEBUG: Initialized auxiliary module "Human" 2025-11-20 14:25:54,964 [root] DEBUG: attempting to configure 'Human' from data 2025-11-20 14:25:54,964 [root] DEBUG: module Human does not support data configuration, ignoring 2025-11-20 14:25:54,965 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.human"... 2025-11-20 14:25:54,967 [root] DEBUG: Started auxiliary module modules.auxiliary.human 2025-11-20 14:25:54,968 [root] DEBUG: Initialized auxiliary module "Screenshots" 2025-11-20 14:25:54,969 [root] DEBUG: attempting to configure 'Screenshots' from data 2025-11-20 14:25:54,971 [root] DEBUG: module Screenshots does not support data configuration, ignoring 2025-11-20 14:25:54,971 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.screenshots"... 2025-11-20 14:25:54,979 [root] DEBUG: Started auxiliary module modules.auxiliary.screenshots 2025-11-20 14:25:54,979 [root] DEBUG: Initialized auxiliary module "TLSDumpMasterSecrets" 2025-11-20 14:25:54,982 [root] DEBUG: attempting to configure 'TLSDumpMasterSecrets' from data 2025-11-20 14:25:54,983 [root] DEBUG: module TLSDumpMasterSecrets does not support data configuration, ignoring 2025-11-20 14:25:54,984 [root] DEBUG: Trying to start auxiliary module "modules.auxiliary.tlsdump"... 2025-11-20 14:25:54,988 [modules.auxiliary.tlsdump] INFO: lsass.exe found, pid 608 2025-11-20 14:25:55,169 [lib.api.process] INFO: Monitor config for <Process 608 lsass.exe>: C:\8llta4uw\dll\608.ini 2025-11-20 14:25:55,171 [lib.api.process] INFO: Option 'tlsdump' with value '1' sent to monitor 2025-11-20 14:25:55,181 [lib.api.process] INFO: 64-bit DLL to inject is C:\8llta4uw\dll\OnAKlMw.dll, loader C:\8llta4uw\bin\kcPuBrIv.exe 2025-11-20 14:25:55,206 [root] DEBUG: Loader: Injecting process 608 with C:\8llta4uw\dll\OnAKlMw.dll. 2025-11-20 14:25:55,230 [root] DEBUG: 608: Python path set to 'C:\Users\Admin\AppData\Local\Programs\Python\Python313-32'. 2025-11-20 14:25:55,231 [root] DEBUG: 608: Disabling sleep skipping. 2025-11-20 14:25:55,232 [root] DEBUG: 608: TLS secret dump mode enabled. 2025-11-20 14:25:55,274 [root] DEBUG: 608: RtlInsertInvertedFunctionTable 0x00007FFEE348090E, LdrpInvertedFunctionTableSRWLock 0x00007FFEE35DD4F0 2025-11-20 14:25:55,275 [root] DEBUG: 608: Monitor initialised: 64-bit capemon loaded in process 608 at 0x00007FFEB75E0000, thread 624, image base 0x00007FF60EE30000, stack from 0x000000A5F48F3000-0x000000A5F4900000 2025-11-20 14:25:55,276 [root] DEBUG: 608: Commandline: C:\Windows\system32\lsass.exe 2025-11-20 14:25:55,292 [root] DEBUG: 608: Hooked 5 out of 5 functions 2025-11-20 14:25:55,293 [root] DEBUG: InjectDllViaThread: Successfully injected Dll into process via RtlCreateUserThread. 2025-11-20 14:25:55,294 [root] DEBUG: Successfully injected DLL C:\8llta4uw\dll\OnAKlMw.dll. 2025-11-20 14:25:55,298 [lib.api.process] INFO: Injected into 64-bit <Process 608 lsass.exe> 2025-11-20 14:25:55,298 [root] DEBUG: Started auxiliary module modules.auxiliary.tlsdump 2025-11-20 14:25:55,506 [root] DEBUG: 608: DLL loaded at 0x00007FFEE1420000: C:\Windows\System32\cfgmgr32 (0x4e000 bytes). 2025-11-20 14:25:55,508 [root] DEBUG: 608: DLL loaded at 0x00007FFEE0870000: C:\Windows\system32\DEVOBJ (0x33000 bytes). 2025-11-20 14:25:55,510 [root] DEBUG: 608: DLL loaded at 0x00007FFEC2550000: C:\Windows\System32\ngcpopkeysrv (0x48000 bytes). 2025-11-20 14:25:55,523 [root] DEBUG: 608: DLL loaded at 0x00007FFEB7180000: C:\Windows\system32\PCPKsp (0x118000 bytes). 2025-11-20 14:25:55,531 [root] DEBUG: 608: DLL loaded at 0x00007FFEE2C00000: C:\Windows\System32\imagehlp (0x1d000 bytes). 2025-11-20 14:25:55,533 [root] DEBUG: 608: DLL loaded at 0x00007FFED4740000: C:\Windows\system32\tbs (0x1b000 bytes). 2025-11-20 14:25:55,683 [root] DEBUG: 608: TLS 1.2 secrets logged to: C:\tufUOsbM\tlsdump\tlsdump.log 2025-11-20 14:25:58,506 [root] INFO: Restarting WMI Service 2025-11-20 14:26:00,643 [root] DEBUG: package modules.packages.python does not support configure, ignoring 2025-11-20 14:26:00,644 [root] WARNING: configuration error for package modules.packages.python: error importing data.packages.python: No module named 'data.packages' 2025-11-20 14:26:00,646 [lib.core.compound] INFO: C:\Temp already exists, skipping creation 2025-11-20 14:26:00,663 [lib.api.process] INFO: Successfully executed process from path "C:\Windows\py.exe" with arguments "C:\Temp\app.py " with pid 2316 2025-11-20 14:26:00,664 [lib.api.process] INFO: Monitor config for <Process 2316 py.exe>: C:\8llta4uw\dll\2316.ini 2025-11-20 14:26:00,668 [lib.api.process] INFO: 32-bit DLL to inject is C:\8llta4uw\dll\vlBzeSKF.dll, loader C:\8llta4uw\bin\CJcvrnn.exe 2025-11-20 14:26:00,687 [root] DEBUG: Loader: Injecting process 2316 (thread 2336) with C:\8llta4uw\dll\vlBzeSKF.dll. 2025-11-20 14:26:00,689 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT. 2025-11-20 14:26:00,690 [root] DEBUG: Successfully injected DLL C:\8llta4uw\dll\vlBzeSKF.dll. 2025-11-20 14:26:00,693 [lib.api.process] INFO: Injected into 32-bit <Process 2316 py.exe> 2025-11-20 14:26:02,697 [lib.api.process] INFO: Successfully resumed <Process 2316 py.exe> 2025-11-20 14:26:02,895 [root] DEBUG: 2316: Python path set to 'C:\Users\Admin\AppData\Local\Programs\Python\Python313-32'. 2025-11-20 14:26:02,897 [root] DEBUG: 2316: Disabling sleep skipping. 2025-11-20 14:26:02,898 [root] DEBUG: 2316: Dropped file limit defaulting to 100. 2025-11-20 14:26:02,925 [root] DEBUG: 2316: YaraInit: Compiled 43 rule files 2025-11-20 14:26:02,928 [root] DEBUG: 2316: YaraInit: Compiled rules saved to file C:\8llta4uw\data\yara\capemon.yac 2025-11-20 14:26:02,929 [root] DEBUG: 2316: YaraScan: Scanning 0x00580000, size 0xbf83e 2025-11-20 14:26:02,954 [root] DEBUG: 2316: Monitor initialised: 32-bit capemon loaded in process 2316 at 0x731a0000, thread 2336, image base 0x580000, stack from 0x3b3000-0x3c0000 2025-11-20 14:26:02,955 [root] DEBUG: 2316: Commandline: "C:\Windows\py.exe" C:\Temp\app.py 2025-11-20 14:26:03,016 [root] DEBUG: 2316: hook_api: LdrpCallInitRoutine export address 0x76FC2B50 obtained via GetFunctionAddress 2025-11-20 14:26:03,060 [root] WARNING: b'Unable to place hook on GetCommandLineA' 2025-11-20 14:26:03,061 [root] DEBUG: 2316: set_hooks: Unable to hook GetCommandLineA 2025-11-20 14:26:03,062 [root] WARNING: b'Unable to place hook on GetCommandLineW' 2025-11-20 14:26:03,063 [root] DEBUG: 2316: set_hooks: Unable to hook GetCommandLineW 2025-11-20 14:26:03,074 [root] DEBUG: 2316: Hooked 625 out of 627 functions 2025-11-20 14:26:03,086 [root] DEBUG: 2316: Syscall hook installed, syscall logging level 1 2025-11-20 14:26:03,094 [root] DEBUG: 2316: RestoreHeaders: Restored original import table. 2025-11-20 14:26:03,098 [root] INFO: Loaded monitor into process with pid 2316 2025-11-20 14:26:03,100 [root] DEBUG: 2316: caller_dispatch: Added region at 0x00580000 to tracked regions list (kernel32::LoadLibraryExW returns to 0x00587F36, thread 2336). 2025-11-20 14:26:03,101 [root] DEBUG: 2316: YaraScan: Scanning 0x00580000, size 0xbf83e 2025-11-20 14:26:03,112 [root] DEBUG: 2316: ProcessImageBase: Main module image at 0x00580000 unmodified (entropy change 0.000000e+00) 2025-11-20 14:26:03,126 [root] DEBUG: 2316: DLL loaded at 0x747A0000: C:\Windows\SYSTEM32\Wldp (0x24000 bytes). 2025-11-20 14:26:03,132 [root] DEBUG: 2316: DLL loaded at 0x747D0000: C:\Windows\SYSTEM32\windows.storage (0x613000 bytes). 2025-11-20 14:26:03,134 [root] DEBUG: 2316: DLL loaded at 0x75ED0000: C:\Windows\System32\SHCORE (0x87000 bytes). 2025-11-20 14:26:03,161 [root] DEBUG: 2316: InstrumentationCallback: Added region at 0x75A163AC (base 0x758D0000) to tracked regions list (thread 2336). 2025-11-20 14:26:03,162 [root] DEBUG: 2316: ProcessTrackedRegion: Region at 0x758D0000 mapped as \Device\HarddiskVolume2\Windows\SysWOW64\KernelBase.dll is in known range, skipping 2025-11-20 14:26:03,184 [root] DEBUG: 2316: CreateProcessHandler: Injection info set for new process 3080: C:\Users\Admin\AppData\Local\Programs\Python\Python313-32\python.exe, ImageBase: 0x00CD0000 2025-11-20 14:26:03,185 [root] INFO: Announced 32-bit process name: python.exe pid: 3080 2025-11-20 14:26:03,186 [lib.api.process] INFO: Monitor config for <Process 3080 python.exe>: C:\8llta4uw\dll\3080.ini 2025-11-20 14:26:04,211 [lib.api.process] INFO: 32-bit DLL to inject is C:\8llta4uw\dll\vlBzeSKF.dll, loader C:\8llta4uw\bin\CJcvrnn.exe 2025-11-20 14:26:04,225 [root] DEBUG: Loader: Injecting process 3080 (thread 752) with C:\8llta4uw\dll\vlBzeSKF.dll. 2025-11-20 14:26:04,226 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT. 2025-11-20 14:26:04,227 [root] DEBUG: Successfully injected DLL C:\8llta4uw\dll\vlBzeSKF.dll. 2025-11-20 14:26:04,231 [lib.api.process] INFO: Injected into 32-bit <Process 3080 python.exe> 2025-11-20 14:26:04,247 [root] DEBUG: 2316: ProcessTrackedRegion: Region at 0x758D0000 mapped as \Device\HarddiskVolume2\Windows\SysWOW64\KernelBase.dll is in known range, skipping 2025-11-20 14:26:04,273 [root] DEBUG: 3080: Python path set to 'C:\Users\Admin\AppData\Local\Programs\Python\Python313-32'. 2025-11-20 14:26:04,274 [root] DEBUG: 3080: Disabling sleep skipping. 2025-11-20 14:26:04,275 [root] DEBUG: 3080: Dropped file limit defaulting to 100. 2025-11-20 14:26:04,280 [root] DEBUG: 3080: YaraInit: Compiled rules loaded from existing file C:\8llta4uw\data\yara\capemon.yac 2025-11-20 14:26:04,281 [root] DEBUG: 3080: YaraScan: Scanning 0x00CD0000, size 0x18182 2025-11-20 14:26:04,285 [root] DEBUG: 3080: Monitor initialised: 32-bit capemon loaded in process 3080 at 0x731a0000, thread 752, image base 0xcd0000, stack from 0xa66000-0xa70000 2025-11-20 14:26:04,285 [root] DEBUG: 3080: Commandline: C:\Users\Admin\AppData\Local\Programs\Python\Python313-32\python.exe C:\Temp\app.py 2025-11-20 14:26:04,286 [root] DEBUG: 3080: add_all_dlls_to_dll_ranges: skipping C:\Users\Admin\AppData\Local\Programs\Python\Python313-32\python313.dll 2025-11-20 14:26:04,287 [root] DEBUG: 3080: add_all_dlls_to_dll_ranges: skipping C:\Users\Admin\AppData\Local\Programs\Python\Python313-32\VCRUNTIME140.dll 2025-11-20 14:26:04,317 [root] DEBUG: 3080: hook_api: LdrpCallInitRoutine export address 0x76FC2B50 obtained via GetFunctionAddress 2025-11-20 14:26:04,347 [root] WARNING: b'Unable to place hook on GetCommandLineA' 2025-11-20 14:26:04,348 [root] DEBUG: 3080: set_hooks: Unable to hook GetCommandLineA 2025-11-20 14:26:04,349 [root] WARNING: b'Unable to place hook on GetCommandLineW' 2025-11-20 14:26:04,350 [root] DEBUG: 3080: set_hooks: Unable to hook GetCommandLineW 2025-11-20 14:26:04,358 [root] DEBUG: 3080: Hooked 625 out of 627 functions 2025-11-20 14:26:04,360 [root] DEBUG: 3080: Syscall hook installed, syscall logging level 1 2025-11-20 14:26:04,365 [root] DEBUG: 3080: RestoreHeaders: Restored original import table. 2025-11-20 14:26:04,366 [root] INFO: Loaded monitor into process with pid 3080 2025-11-20 14:26:04,367 [root] DEBUG: 3080: YaraScan: Scanning 0x74200000, size 0x14b1e 2025-11-20 14:26:04,369 [root] DEBUG: 3080: caller_dispatch: Added region at 0x74200000 to tracked regions list (kernel32::LoadLibraryExW returns to 0x74204CB5, thread 752). 2025-11-20 14:26:04,370 [root] DEBUG: 3080: caller_dispatch: Scanning calling region at 0x74200000... 2025-11-20 14:26:04,372 [root] DEBUG: 3080: VerifyHeaders: Entry point does not match, 0x0 of 0x10 matching 2025-11-20 14:26:04,373 [root] DEBUG: 3080: ProcessTrackedRegion: Interesting region at 0x74200000 mapped as \Device\HarddiskVolume2\Users\Admin\AppData\Local\Programs\Python\Python313-32\vcruntime140.dll, dumping 2025-11-20 14:26:04,373 [root] DEBUG: 3080: DumpPEsInRange: Scanning range 0x74200000 - 0x74214B1E. 2025-11-20 14:26:04,374 [root] DEBUG: 3080: ScanForDisguisedPE: PE image located at: 0x74200000 2025-11-20 14:26:04,375 [root] DEBUG: 3080: DumpImageInCurrentProcess: Attempting to dump virtual PE image. 2025-11-20 14:26:04,376 [root] DEBUG: 3080: DumpProcess: Instantiating PeParser with address: 0x74200000. 2025-11-20 14:26:04,376 [root] DEBUG: 3080: DumpProcess: Module entry point VA is 0x0000D960. 2025-11-20 14:26:04,384 [lib.common.results] INFO: Uploading file C:\tufUOsbM\CAPE\3080_897642611204112025 to CAPE\0d73df4622431e5f0f2843ec68cc60a07f38fb8263c4a1e2a1e260a9075f94d1; Size is 70144; Max size: 100000000 2025-11-20 14:26:04,392 [root] DEBUG: 3080: DumpProcess: Module image dump success - dump size 0x11200. 2025-11-20 14:26:04,394 [root] DEBUG: 3080: ScanForDisguisedPE: No PE image located in range 0x74201000-0x74214B1E. 2025-11-20 14:26:04,395 [root] DEBUG: 3080: DumpRegion: Dumped PE image(s) from base address 0x74200000, size 86016 bytes. 2025-11-20 14:26:04,396 [root] DEBUG: 3080: ProcessTrackedRegion: Dumped region at 0x74200000. 2025-11-20 14:26:04,396 [root] DEBUG: 3080: YaraScan: Scanning 0x74200000, size 0x14b1e 2025-11-20 14:26:04,399 [root] DEBUG: 3080: YaraScan: Scanning 0x74220000, size 0x571868 2025-11-20 14:26:04,481 [root] DEBUG: 3080: YaraScan hit: FormhookB 2025-11-20 14:26:04,482 [root] DEBUG: 3080: Config: bp0 set to 0x00051F80. 2025-11-20 14:26:04,483 [root] DEBUG: 3080: Config: bp0 set to 0x00084B80. 2025-11-20 14:26:04,484 [root] DEBUG: 3080: Config: bp0 set to 0x000DF3F0. 2025-11-20 14:26:04,484 [root] DEBUG: 3080: Config: bp0 set to 0x000FBED0. 2025-11-20 14:26:04,485 [root] DEBUG: 3080: Config: bp0 set to 0x00160130. 2025-11-20 14:26:04,486 [root] DEBUG: 3080: Config: bp0 set to 0x0016FCE0. 2025-11-20 14:26:04,487 [root] DEBUG: 3080: Config: bp0 set to 0x001C9F10. 2025-11-20 14:26:04,488 [root] DEBUG: 3080: Config: bp0 set to 0x0020D1A0. 2025-11-20 14:26:04,488 [root] DEBUG: 3080: Config: bp0 set to 0x002447B0. 2025-11-20 14:26:04,489 [root] DEBUG: 3080: Config: Action0 set to scan. 2025-11-20 14:26:04,490 [root] DEBUG: 3080: Config: Hit count for breakpoint 0 set to 1 2025-11-20 14:26:04,491 [root] DEBUG: 3080: Config: bp1 set to 0x00051131. 2025-11-20 14:26:04,492 [root] DEBUG: 3080: Config: bp1 set to 0x0014EAC9. 2025-11-20 14:26:04,492 [root] DEBUG: 3080: Config: bp1 set to 0x00164152. 2025-11-20 14:26:04,493 [root] DEBUG: 3080: Config: Action1 set to setdst:ntdll. 2025-11-20 14:26:04,494 [root] DEBUG: 3080: Config: Count for breakpoint 1 set to 0 2025-11-20 14:26:04,495 [root] DEBUG: 3080: Config: Trace instruction count set to 0x0 2025-11-20 14:26:04,496 [root] DEBUG: 3080: SetInitialBreakpoints: Breakpoint 0 set on address 0x744647B0 (RVA 0x2447b0, type 0, hit count 1, thread 752) 2025-11-20 14:26:04,497 [root] DEBUG: 3080: SetInitialBreakpoints: Breakpoint 1 set on address 0x74384152 (RVA 0x164152, type 0, hit count 0, thread 752) 2025-11-20 14:26:04,504 [root] DEBUG: 3080: caller_dispatch: Added region at 0x74220000 to tracked regions list (ntdll::NtQueryPerformanceCounter returns to 0x74380143, thread 752). 2025-11-20 14:26:04,505 [root] DEBUG: 3080: caller_dispatch: Scanning calling region at 0x74220000... 2025-11-20 14:26:04,507 [root] DEBUG: 3080: VerifyHeaders: Entry point does not match, 0x0 of 0x10 matching 2025-11-20 14:26:04,508 [root] DEBUG: 3080: ProcessTrackedRegion: Interesting region at 0x74220000 mapped as \Device\HarddiskVolume2\Users\Admin\AppData\Local\Programs\Python\Python313-32\python313.dll, dumping 2025-11-20 14:26:04,509 [root] DEBUG: 3080: DumpPEsInRange: Scanning range 0x74220000 - 0x74791868. 2025-11-20 14:26:04,512 [root] DEBUG: 3080: ScanForDisguisedPE: PE image located at: 0x74220000 2025-11-20 14:26:04,513 [root] DEBUG: 3080: DumpImageInCurrentProcess: Attempting to dump virtual PE image. 2025-11-20 14:26:04,514 [root] DEBUG: 3080: DumpProcess: Instantiating PeParser with address: 0x74220000. 2025-11-20 14:26:04,515 [root] DEBUG: 3080: DumpProcess: Module entry point VA is 0x002D9A40. 2025-11-20 14:26:04,581 [lib.common.results] INFO: Uploading file C:\tufUOsbM\CAPE\3080_876272542611204112025 to CAPE\a619a49227347a25716800dfbbea696fab04d6262a1d1d891cb310a13550cf1a; Size is 5697024; Max size: 100000000 2025-11-20 14:26:04,630 [root] DEBUG: 3080: DumpProcess: Module image dump success - dump size 0x56ee00. 2025-11-20 14:26:04,679 [root] DEBUG: 3080: ScanForDisguisedPE: No PE image located in range 0x74221000-0x74791868. 2025-11-20 14:26:04,680 [root] DEBUG: 3080: DumpRegion: Dumped PE image(s) from base address 0x74220000, size 5709824 bytes. 2025-11-20 14:26:04,681 [root] DEBUG: 3080: ProcessTrackedRegion: Dumped region at 0x74220000. 2025-11-20 14:26:04,682 [root] DEBUG: 3080: YaraScan: Scanning 0x74220000, size 0x571868 2025-11-20 14:26:04,755 [root] DEBUG: 3080: YaraScan hit: FormhookB 2025-11-20 14:26:04,756 [root] DEBUG: 3080: Config: bp0 set to 0x00051F80. 2025-11-20 14:26:04,757 [root] DEBUG: 3080: Config: bp0 set to 0x00084B80. 2025-11-20 14:26:04,758 [root] DEBUG: 3080: Config: bp0 set to 0x000DF3F0. 2025-11-20 14:26:04,758 [root] DEBUG: 3080: Config: bp0 set to 0x000FBED0. 2025-11-20 14:26:04,759 [root] DEBUG: 3080: Config: bp0 set to 0x00160130. 2025-11-20 14:26:04,760 [root] DEBUG: 3080: Config: bp0 set to 0x0016FCE0. 2025-11-20 14:26:04,761 [root] DEBUG: 3080: Config: bp0 set to 0x001C9F10. 2025-11-20 14:26:04,762 [root] DEBUG: 3080: Config: bp0 set to 0x0020D1A0. 2025-11-20 14:26:04,762 [root] DEBUG: 3080: Config: bp0 set to 0x002447B0. 2025-11-20 14:26:04,763 [root] DEBUG: 3080: Config: Action0 set to scan. 2025-11-20 14:26:04,764 [root] DEBUG: 3080: Config: Hit count for breakpoint 0 set to 1 2025-11-20 14:26:04,765 [root] DEBUG: 3080: Config: bp1 set to 0x00051131. 2025-11-20 14:26:04,766 [root] DEBUG: 3080: Config: bp1 set to 0x0014EAC9. 2025-11-20 14:26:04,767 [root] DEBUG: 3080: Config: bp1 set to 0x00164152. 2025-11-20 14:26:04,767 [root] DEBUG: 3080: Config: Action1 set to setdst:ntdll. 2025-11-20 14:26:04,768 [root] DEBUG: 3080: Config: Count for breakpoint 1 set to 0 2025-11-20 14:26:04,769 [root] DEBUG: 3080: Config: Trace instruction count set to 0x0 2025-11-20 14:26:04,770 [root] DEBUG: 3080: SetInitialBreakpoints: Breakpoint 0 set on address 0x744647B0 (RVA 0x2447b0, type 0, hit count 1, thread 752) 2025-11-20 14:26:04,770 [root] DEBUG: 3080: SetInitialBreakpoints: Breakpoint 1 set on address 0x74384152 (RVA 0x164152, type 0, hit count 0, thread 752) 2025-11-20 14:26:04,773 [root] DEBUG: 3080: caller_dispatch: Added region at 0x00CD0000 to tracked regions list (ntdll::memcpy returns to 0x00CD1064, thread 752). 2025-11-20 14:26:04,774 [root] DEBUG: 3080: YaraScan: Scanning 0x00CD0000, size 0x18182 2025-11-20 14:26:04,777 [root] DEBUG: 3080: ProcessImageBase: Main module image at 0x00CD0000 unmodified (entropy change 0.000000e+00) 2025-11-20 14:26:04,790 [root] DEBUG: 3080: InstrumentationCallback: Added region at 0x75A163AC (base 0x758D0000) to tracked regions list (thread 752). 2025-11-20 14:26:04,791 [root] DEBUG: 3080: ProcessTrackedRegion: Region at 0x758D0000 mapped as \Device\HarddiskVolume2\Windows\SysWOW64\KernelBase.dll is in known range, skipping 2025-11-20 14:26:04,795 [root] DEBUG: 3080: DLL loaded at 0x75800000: C:\Windows\System32\bcryptprimitives (0x5f000 bytes). 2025-11-20 14:26:04,965 [root] DEBUG: 3080: set_hooks_by_export_directory: Hooked 0 out of 627 functions 2025-11-20 14:26:04,966 [root] DEBUG: 3080: DLL loaded at 0x73B80000: C:\Windows\SYSTEM32\kernel.appcore (0xf000 bytes). 2025-11-20 14:26:04,967 [root] DEBUG: 3080: NtTerminateProcess hook: Attempting to dump process 3080 2025-11-20 14:26:04,968 [root] DEBUG: 3080: DoProcessDump: Skipping process dump as code is identical on disk. 2025-11-20 14:26:04,990 [root] INFO: Process with pid 3080 has terminated 2025-11-20 14:26:04,994 [root] DEBUG: 2316: set_hooks_by_export_directory: Hooked 0 out of 627 functions 2025-11-20 14:26:04,996 [root] DEBUG: 2316: DLL loaded at 0x73B80000: C:\Windows\SYSTEM32\kernel.appcore (0xf000 bytes). 2025-11-20 14:26:04,997 [root] DEBUG: 2316: NtTerminateProcess hook: Attempting to dump process 2316 2025-11-20 14:26:05,010 [root] DEBUG: 2316: DoProcessDump: Skipping process dump as code is identical on disk. 2025-11-20 14:26:05,020 [root] INFO: Process with pid 2316 has terminated 2025-11-20 14:26:24,943 [root] INFO: Process list is empty, terminating analysis 2025-11-20 14:26:25,956 [root] INFO: Created shutdown mutex 2025-11-20 14:26:26,964 [root] INFO: Shutting down package 2025-11-20 14:26:26,964 [root] INFO: Stopping auxiliary modules 2025-11-20 14:26:26,965 [root] INFO: Stopping auxiliary module: Browser 2025-11-20 14:26:26,965 [root] INFO: Stopping auxiliary module: Human 2025-11-20 14:26:31,980 [root] INFO: Stopping auxiliary module: Screenshots 2025-11-20 14:26:31,990 [root] INFO: Finishing auxiliary modules 2025-11-20 14:26:31,990 [root] INFO: Shutting down pipe server and dumping dropped files 2025-11-20 14:26:31,991 [root] WARNING: Folder at path "C:\tufUOsbM\debugger" does not exist, skipping 2025-11-20 14:26:31,991 [root] INFO: Uploading files at path "C:\tufUOsbM\tlsdump" 2025-11-20 14:26:31,992 [lib.common.results] INFO: Uploading file C:\tufUOsbM\tlsdump\tlsdump.log to tlsdump\tlsdump.log; Size is 1096; Max size: 100000000 2025-11-20 14:26:32,003 [root] INFO: Analysis completed
| Name | Label | Manager | Started On | Shutdown On | Route |
|---|---|---|---|---|---|
| MalwareGuest | MalwareGuest | Proxmox | 2025-11-20 14:25:54 | 2025-11-20 14:26:43 | none |
| File Name |
app.py
|
|---|---|
| File Type | Python script, Unicode text, UTF-8 text executable, with CRLF line terminators |
| File Size | 2628 bytes |
| MD5 | 641f1f56eeaea93c37c3205502efed82 |
| SHA1 | c7682b021add97299066aeed96e9f7a5e4aebd58 |
| SHA256 | 9c7ed8833a268d5e94baa236806e1fb6054e8bde045033cd6ff258de600db6e9 [VT] [MWDB] [Bazaar] |
| SHA3-384 | e3fbc8d114eeb0210a2b8d06b5465013865345fae801c6296a338cec31dfb6407598ce2a152888aa698cd6f36cce55a3 |
| CRC32 | A6DD38A3 |
| TLSH | T1F95197D35C1264969932646FD4155D00E85B9237BA1A3A2771BC464C6FF2106C774C7A |
| Ssdeep | 48:5DGkZv+LAMqGfRsdaxhhB3KMaF20pROyRvDKYnU0s3A5ghIa5:5D9wLADGZsdEhL3Y40pVR7/U0UA5ghI0 |
| File BinGraph Vba2Graph Text |
import requests
import time
GITEA_URL = 'http://10.0.36.206:3000/-/admin/users/new'
HEADERS = {
'Accept': 'text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7',
'Accept-Language': 'ru,en;q=0.9,en-GB;q=0.8,en-US;q=0.7',
'Cache-Control': 'no-cache',
'Connection': 'keep-alive',
'Content-Type': 'application/x-www-form-urlencoded',
'DNT': '1',
'Origin': 'null',
'Pragma': 'no-cache',
'Upgrade-Insecure-Requests': '1',
'User-Agent': 'Mozilla/5.0 (Linux; Android 6.0; Nexus 5 Build/MRA58N) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/137.0.0.0 Mobile Safari/537.36 Edg/137.0.0.0',
}
COOKIES = {
'i_like_gitea': '3ccabf46b88ddeb3',
'lang': 'ru-RU',
'_csrf': 'pBlRJDfD_oAdow5KnNViuGp86I86MTc1MDExMjQ2NDQ3MzAyMDY4OQ',
}
PAYLOAD_TEMPLATE = {
'_autofill_dummy_username': '',
'_autofill_dummy_password': '',
'_csrf': 'r9jIGwqIwCiycDd8u184hKTuzYs6MTc1MDExMTEwNzYyMTU0OTkxNw',
'login_type': '0-0',
'visibility': '2',
'login_name': '',
'password': 'password',
}
def create_gitea_user(user_number):
user_id = f"{user_number:02d}"
username = f"user{user_id}"
email = f"{username}@demo.exam"
payload = PAYLOAD_TEMPLATE.copy()
payload['user_name'] = username
payload['email'] = email
print(f"ÐопÑÑка ÑоздаÑÑ Ð¿Ð¾Ð»ÑзоваÑелÑ: {username} ({email})...")
try:
requests.packages.urllib3.disable_warnings(requests.packages.urllib3.exceptions.InsecureRequestWarning)
response = requests.post(
GITEA_URL,
headers=HEADERS,
cookies=COOKIES,
data=payload,
verify=False,
allow_redirects=False
)
if response.status_code == 303:
print(f"ÐолÑзоваÑÐµÐ»Ñ {username} ÑÑпеÑно Ñоздан. СÑаÑÑÑ: {response.status_code}")
else:
print(f"оÑибка не ÑдалоÑÑ ÑоздаÑÑ Ð¿Ð¾Ð»ÑзоваÑÐµÐ»Ñ {username}. СÑаÑÑÑ: {response.status_code}")
except requests.exceptions.RequestException as e:
print(f"оÑибка пÑи Ñоздании полÑзоваÑÐµÐ»Ñ {username}: {e}")
if __name__ == "__main__":
print("--- ÐаÑало ÑÐ¾Ð·Ð´Ð°Ð½Ð¸Ñ Ð¿Ð¾Ð»ÑзоваÑелей в Gitea ---")
for i in range(1, 76):
create_gitea_user(i)
time.sleep(0.5)
print("--- РабоÑа ÑкÑипÑа завеÑÑена ---")
No hosts contacted.
No domains contacted.
No hosts contacted.
No TCP connections recorded.
No UDP connections recorded.
No domains contacted.
No HTTP(s) requests performed.
No SMTP traffic performed.
No IRC requests performed.
No ICMP traffic performed.
No CIF Results
No Suricata Alerts
No Suricata TLS
No Suricata HTTP