2018-07-11 15:57:12,016 [cuckoo.core.scheduler] INFO: Using "virtualbox" as machine manager
2018-07-11 15:57:12,601 [cuckoo.core.scheduler] INFO: Loaded 1 machine/s
2018-07-11 15:57:12,617 [cuckoo.core.scheduler] INFO: Waiting for analysis tasks.
2018-07-11 15:57:38,395 [cuckoo.core.scheduler] INFO: Starting analysis of FILE "Windows 7 Loader.exe" (task #6, options "procmemdump=yes,route=none")
2018-07-11 15:57:38,526 [cuckoo.core.scheduler] INFO: Task #6: acquired machine cuckoo1 (label=win7_1)
2018-07-11 15:57:38,533 [cuckoo.auxiliary.mitm] INFO: Started mitm interception with PID 19622 (ip=192.168.56.1, port=50000).
2018-07-11 15:57:38,540 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 19623 (interface=vboxnet0, host=192.168.56.101)
2018-07-11 15:57:47,152 [cuckoo.core.guest] INFO: Starting analysis on guest (id=cuckoo1, ip=192.168.56.101)
2018-07-11 15:57:51,258 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.8 (id=cuckoo1, ip=192.168.56.101)
2018-07-11 15:57:54,951 [cuckoo.core.guest] WARNING: cuckoo1: analysis caught an exception
Traceback (most recent call last):
File "C:/tmpqfzws8/analyzer.py", line 800, in
success = analyzer.run()
File "C:/tmpqfzws8/analyzer.py", line 652, in run
pids = self.package.start(self.target)
File "C:\tmpqfzws8\modules\packages\exe.py", line 23, in start
return self.execute(path, args=shlex.split(args))
File "C:\tmpqfzws8\lib\common\abstracts.py", line 166, in execute
"Unable to execute the initial process, analysis aborted."
CuckooPackageError: Unable to execute the initial process, analysis aborted.
2018-07-11 15:57:56,794 [cuckoo.processing.behavior] WARNING: Analysis results folder does not contain any behavior log files.
2018-07-11 15:57:56,801 [cuckoo.processing.memory] ERROR: Cannot run volatility module: the volatility library is not available. Please install it according to their documentation.
Error opening file /var/log/suricata/suricata.log
11/7/2018 -- 15:57:58 - - This is Suricata version 4.0.4 RELEASE
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/botcc.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/ciarmy.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/compromised.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/drop.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/dshield.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/emerging-attack_response.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/emerging-chat.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/emerging-current_events.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/emerging-dns.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/emerging-dos.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/emerging-exploit.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/emerging-ftp.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/emerging-imap.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/emerging-malware.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/emerging-misc.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/emerging-mobile_malware.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/emerging-netbios.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/emerging-p2p.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/emerging-policy.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/emerging-pop3.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/emerging-rpc.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/emerging-scan.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/emerging-smtp.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/emerging-snmp.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/emerging-sql.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/emerging-telnet.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/emerging-tftp.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/emerging-trojan.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/emerging-user_agents.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/emerging-voip.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/emerging-web_client.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/emerging-web_server.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/emerging-worm.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/tor.rules
11/7/2018 -- 15:57:59 - - [ERRCODE: SC_ERR_INITIALIZATION(45)] - Unix socket: UNIX socket bind(/var/run/suricata-command.socket) error: Permission denied
11/7/2018 -- 15:57:59 - - [ERRCODE: SC_ERR_INITIALIZATION(45)] - Unable to create unix command socket
11/7/2018 -- 15:57:59 - - all 41 packet processing threads, 4 management threads initialized, engine started.
11/7/2018 -- 15:57:59 - - Signal Received. Stopping engine.
11/7/2018 -- 15:57:59 - - Pcap-file module read 80 packets, 17060 bytes
2018-07-11 15:57:59,212 [cuckoo.processing.suricata] WARNING: Unable to find the files-json.log log file
2018-07-11 15:58:01,312 [cuckoo.core.scheduler] INFO: Task #6: reports generation completed
2018-07-11 15:58:01,322 [cuckoo.core.scheduler] INFO: Task #6: analysis procedure completed
i got error like this
WARNING: cuckoo1: analysis caught an exception
[cuckoo.processing.memory] ERROR: Cannot run volatility module: the volatility library is not available. Please install it according to their documentation.
[ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern
(cuckoo-env) cuckoo@cuckoo-lab:~$ cuckoo
.----..--.--..----.| |--..-----..-----. | || | || || < | || | ||||||||||||_____|
Cuckoo Sandbox 2.0.6 www.cuckoosandbox.org Copyright (c) 2010-2018
Checking for updates... You're good to go!
Our latest blogposts:
Cuckoo Sandbox 2.0.6, June 07, 2018. Interim release awaiting the big release. More at https://cuckoosandbox.org/blog/206-interim-release
Cuckoo Sandbox 2.0.5: Office DDE, December 03, 2017. Brand new release based on a DDE case study. More at https://cuckoosandbox.org/blog/205-office-dde
Cuckoo Sandbox 2.0.4, September 06, 2017. Introducing Malware Configuration Extraction. More at https://cuckoosandbox.org/blog/cuckoo-sandbox-204
2018-07-11 15:57:12,016 [cuckoo.core.scheduler] INFO: Using "virtualbox" as machine manager 2018-07-11 15:57:12,601 [cuckoo.core.scheduler] INFO: Loaded 1 machine/s 2018-07-11 15:57:12,617 [cuckoo.core.scheduler] INFO: Waiting for analysis tasks. 2018-07-11 15:57:38,395 [cuckoo.core.scheduler] INFO: Starting analysis of FILE "Windows 7 Loader.exe" (task #6, options "procmemdump=yes,route=none") 2018-07-11 15:57:38,526 [cuckoo.core.scheduler] INFO: Task #6: acquired machine cuckoo1 (label=win7_1) 2018-07-11 15:57:38,533 [cuckoo.auxiliary.mitm] INFO: Started mitm interception with PID 19622 (ip=192.168.56.1, port=50000). 2018-07-11 15:57:38,540 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 19623 (interface=vboxnet0, host=192.168.56.101) 2018-07-11 15:57:47,152 [cuckoo.core.guest] INFO: Starting analysis on guest (id=cuckoo1, ip=192.168.56.101) 2018-07-11 15:57:51,258 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.8 (id=cuckoo1, ip=192.168.56.101) 2018-07-11 15:57:54,951 [cuckoo.core.guest] WARNING: cuckoo1: analysis caught an exception Traceback (most recent call last): File "C:/tmpqfzws8/analyzer.py", line 800, in
success = analyzer.run()
File "C:/tmpqfzws8/analyzer.py", line 652, in run
pids = self.package.start(self.target)
File "C:\tmpqfzws8\modules\packages\exe.py", line 23, in start
return self.execute(path, args=shlex.split(args))
File "C:\tmpqfzws8\lib\common\abstracts.py", line 166, in execute
"Unable to execute the initial process, analysis aborted."
CuckooPackageError: Unable to execute the initial process, analysis aborted.
2018-07-11 15:57:56,794 [cuckoo.processing.behavior] WARNING: Analysis results folder does not contain any behavior log files. 2018-07-11 15:57:56,801 [cuckoo.processing.memory] ERROR: Cannot run volatility module: the volatility library is not available. Please install it according to their documentation. Error opening file /var/log/suricata/suricata.log 11/7/2018 -- 15:57:58 - - This is Suricata version 4.0.4 RELEASE
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/botcc.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/ciarmy.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/compromised.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/drop.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/dshield.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/emerging-attack_response.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/emerging-chat.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/emerging-current_events.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/emerging-dns.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/emerging-dos.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/emerging-exploit.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/emerging-ftp.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/emerging-imap.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/emerging-malware.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/emerging-misc.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/emerging-mobile_malware.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/emerging-netbios.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/emerging-p2p.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/emerging-policy.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/emerging-pop3.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/emerging-rpc.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/emerging-scan.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/emerging-smtp.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/emerging-snmp.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/emerging-sql.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/emerging-telnet.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/emerging-tftp.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/emerging-trojan.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/emerging-user_agents.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/emerging-voip.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/emerging-web_client.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/emerging-web_server.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/emerging-worm.rules
11/7/2018 -- 15:57:58 - - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /etc/suricata/rules/tor.rules
11/7/2018 -- 15:57:59 - - [ERRCODE: SC_ERR_INITIALIZATION(45)] - Unix socket: UNIX socket bind(/var/run/suricata-command.socket) error: Permission denied
11/7/2018 -- 15:57:59 - - [ERRCODE: SC_ERR_INITIALIZATION(45)] - Unable to create unix command socket
11/7/2018 -- 15:57:59 - - all 41 packet processing threads, 4 management threads initialized, engine started.
11/7/2018 -- 15:57:59 - - Signal Received. Stopping engine.
11/7/2018 -- 15:57:59 - - Pcap-file module read 80 packets, 17060 bytes
2018-07-11 15:57:59,212 [cuckoo.processing.suricata] WARNING: Unable to find the files-json.log log file
2018-07-11 15:58:01,312 [cuckoo.core.scheduler] INFO: Task #6: reports generation completed
2018-07-11 15:58:01,322 [cuckoo.core.scheduler] INFO: Task #6: analysis procedure completed
i got error like this
Can you help me please?