Size | 83.1KB |
---|---|
Type | PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed |
MD5 | f18d4715650f4df13b614b93ca2eb2ca |
SHA1 | fb6cce38f3146a97b3cb6d7701fbf87561a4f3ca |
SHA256 | 6d03711ae5ac67e2015d2525fea3ccf80b6bc42a238a0179dc25c78d745912dc |
SHA512 |
1ce7f7d54573d43869ad78b6cf61dd4d559044c1e659ee726cc64559687dc76288c22445e1b2112fc12b4cea4fede6c3a84ab5521a235b6abea809b659e01da2
|
CRC32 | FDE3D658 |
ssdeep | None |
Yara |
|
This file is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | Jan. 13, 2025, 9:06 a.m. | Jan. 13, 2025, 9:13 a.m. | 380 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-01-09 11:14:09,000 [analyzer] DEBUG: Starting analyzer from: C:\tmpj6atou 2025-01-09 11:14:09,015 [analyzer] DEBUG: Pipe server name: \??\PIPE\brLDpsHrxypkHzepTXa 2025-01-09 11:14:09,015 [analyzer] DEBUG: Log pipe server name: \??\PIPE\dTOuBNZPzSgBdtOqdHjO 2025-01-09 11:14:09,312 [analyzer] DEBUG: Started auxiliary module Curtain 2025-01-09 11:14:09,328 [analyzer] DEBUG: Started auxiliary module DbgView 2025-01-09 11:14:09,812 [analyzer] DEBUG: Started auxiliary module Disguise 2025-01-09 11:14:10,030 [analyzer] DEBUG: Loaded monitor into process with pid 504 2025-01-09 11:14:10,030 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-01-09 11:14:10,030 [analyzer] DEBUG: Started auxiliary module Human 2025-01-09 11:14:10,030 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-01-09 11:14:10,030 [analyzer] DEBUG: Started auxiliary module Reboot 2025-01-09 11:14:10,125 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-01-09 11:14:10,125 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-01-09 11:14:10,125 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-01-09 11:14:10,140 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-01-09 11:14:10,296 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\6d03711ae5ac67e2015d2525fea3ccf80b6bc42a238a0179dc25c78d745912dc.exe' with arguments '' and pid 2180 2025-01-09 11:14:10,592 [analyzer] DEBUG: Loaded monitor into process with pid 2180 2025-01-09 11:14:10,625 [analyzer] INFO: Added new file to list with pid 2180 and path C:\Users\Administrator\AppData\Local\Temp\rifaien2-6GaomstaRV2SNTZY.exe 2025-01-09 11:14:39,312 [analyzer] INFO: Analysis timeout hit, terminating analysis. 2025-01-09 11:14:39,750 [analyzer] INFO: Terminating remaining processes before shutdown. 2025-01-09 11:14:39,750 [lib.api.process] INFO: Successfully terminated process with pid 2180. 2025-01-09 11:14:39,750 [analyzer] INFO: Analysis completed.
2025-01-13 09:07:00,066 [cuckoo.core.scheduler] DEBUG: Task #5741761: no machine available yet 2025-01-13 09:07:01,424 [cuckoo.core.scheduler] DEBUG: Task #5741761: no machine available yet 2025-01-13 09:07:02,636 [cuckoo.core.scheduler] DEBUG: Task #5741761: no machine available yet 2025-01-13 09:07:03,661 [cuckoo.core.scheduler] DEBUG: Task #5741761: no machine available yet 2025-01-13 09:07:04,694 [cuckoo.core.scheduler] DEBUG: Task #5741761: no machine available yet 2025-01-13 09:07:05,724 [cuckoo.core.scheduler] DEBUG: Task #5741761: no machine available yet 2025-01-13 09:07:06,750 [cuckoo.core.scheduler] DEBUG: Task #5741761: no machine available yet 2025-01-13 09:07:07,773 [cuckoo.core.scheduler] DEBUG: Task #5741761: no machine available yet 2025-01-13 09:07:08,794 [cuckoo.core.scheduler] DEBUG: Task #5741761: no machine available yet 2025-01-13 09:07:09,814 [cuckoo.core.scheduler] DEBUG: Task #5741761: no machine available yet 2025-01-13 09:07:10,847 [cuckoo.core.scheduler] DEBUG: Task #5741761: no machine available yet 2025-01-13 09:07:11,889 [cuckoo.core.scheduler] DEBUG: Task #5741761: no machine available yet 2025-01-13 09:07:12,918 [cuckoo.core.scheduler] DEBUG: Task #5741761: no machine available yet 2025-01-13 09:07:13,951 [cuckoo.core.scheduler] DEBUG: Task #5741761: no machine available yet 2025-01-13 09:07:14,996 [cuckoo.core.scheduler] DEBUG: Task #5741761: no machine available yet 2025-01-13 09:07:16,040 [cuckoo.core.scheduler] DEBUG: Task #5741761: no machine available yet 2025-01-13 09:07:17,186 [cuckoo.core.scheduler] DEBUG: Task #5741761: no machine available yet 2025-01-13 09:07:18,288 [cuckoo.core.scheduler] DEBUG: Task #5741761: no machine available yet 2025-01-13 09:07:19,343 [cuckoo.core.scheduler] DEBUG: Task #5741761: no machine available yet 2025-01-13 09:07:20,426 [cuckoo.core.scheduler] DEBUG: Task #5741761: no machine available yet 2025-01-13 09:07:21,513 [cuckoo.core.scheduler] DEBUG: Task #5741761: no machine available yet 2025-01-13 09:07:22,618 [cuckoo.core.scheduler] DEBUG: Task #5741761: no machine available yet 2025-01-13 09:07:23,828 [cuckoo.core.scheduler] DEBUG: Task #5741761: no machine available yet 2025-01-13 09:07:24,876 [cuckoo.core.scheduler] INFO: Task #5741761: acquired machine win7x6416 (label=win7x6416) 2025-01-13 09:07:24,877 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.216 for task #5741761 2025-01-13 09:07:25,421 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 3124869 (interface=vboxnet0, host=192.168.168.216) 2025-01-13 09:07:26,007 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x6416 2025-01-13 09:07:27,249 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x6416 to vmcloak 2025-01-13 09:10:57,353 [cuckoo.core.guest] INFO: Starting analysis #5741761 on guest (id=win7x6416, ip=192.168.168.216) 2025-01-13 09:10:58,359 [cuckoo.core.guest] DEBUG: win7x6416: not ready yet 2025-01-13 09:11:03,381 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x6416, ip=192.168.168.216) 2025-01-13 09:11:03,472 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x6416, ip=192.168.168.216, monitor=latest, size=6660546) 2025-01-13 09:11:04,683 [cuckoo.core.resultserver] DEBUG: Task #5741761: live log analysis.log initialized. 2025-01-13 09:11:05,694 [cuckoo.core.resultserver] DEBUG: Task #5741761 is sending a BSON stream 2025-01-13 09:11:06,200 [cuckoo.core.resultserver] DEBUG: Task #5741761 is sending a BSON stream 2025-01-13 09:11:06,612 [cuckoo.core.resultserver] DEBUG: Task #5741761: File upload for 'files/3b2d94c9d490d015_rifaien2-6GaomstaRV2SNTZY.exe' 2025-01-13 09:11:06,621 [cuckoo.core.resultserver] DEBUG: Task #5741761 uploaded file length: 85069 2025-01-13 09:11:06,969 [cuckoo.core.resultserver] DEBUG: Task #5741761: File upload for 'shots/0001.jpg' 2025-01-13 09:11:07,251 [cuckoo.core.resultserver] DEBUG: Task #5741761 uploaded file length: 156195 2025-01-13 09:11:19,491 [cuckoo.core.guest] DEBUG: win7x6416: analysis #5741761 still processing 2025-01-13 09:11:34,583 [cuckoo.core.guest] DEBUG: win7x6416: analysis #5741761 still processing 2025-01-13 09:11:35,248 [cuckoo.core.resultserver] DEBUG: Task #5741761: File upload for 'curtain/1736417679.5.curtain.log' 2025-01-13 09:11:35,250 [cuckoo.core.resultserver] DEBUG: Task #5741761 uploaded file length: 36 2025-01-13 09:11:35,462 [cuckoo.core.resultserver] DEBUG: Task #5741761: File upload for 'sysmon/1736417679.72.sysmon.xml' 2025-01-13 09:11:35,498 [cuckoo.core.resultserver] DEBUG: Task #5741761 uploaded file length: 2100058 2025-01-13 09:11:35,965 [cuckoo.core.resultserver] DEBUG: Task #5741761: File upload for 'shots/0002.jpg' 2025-01-13 09:11:35,974 [cuckoo.core.resultserver] DEBUG: Task #5741761 uploaded file length: 133587 2025-01-13 09:11:35,986 [cuckoo.core.resultserver] DEBUG: Task #5741761 had connection reset for <Context for LOG> 2025-01-13 09:11:37,707 [cuckoo.core.guest] INFO: win7x6416: analysis completed successfully 2025-01-13 09:11:37,737 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-01-13 09:11:37,968 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-01-13 09:11:39,486 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x6416 to path /srv/cuckoo/cwd/storage/analyses/5741761/memory.dmp 2025-01-13 09:11:39,488 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x6416 2025-01-13 09:13:19,186 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.216 for task #5741761 2025-01-13 09:13:19,590 [cuckoo.core.scheduler] DEBUG: Released database task #5741761 2025-01-13 09:13:19,907 [cuckoo.core.scheduler] INFO: Task #5741761: analysis procedure completed
description | (no description) | rule | UPX | ||||||
description | The packer/protector section names/keywords | rule | suspicious_packer_section | ||||||
description | Communications over RAW socket | rule | network_tcp_socket |
packer | UPX 2.90 [LZMA] -> Markus Oberhumer, Laszlo Molnar & John Reiser |
file | C:\Users\Administrator\AppData\Local\Temp\rifaien2-6GaomstaRV2SNTZY.exe |
file | C:\Users\Administrator\AppData\Local\Temp\rifaien2-6GaomstaRV2SNTZY.exe |
section | {u'size_of_data': u'0x00014800', u'virtual_address': u'0x00014000', u'entropy': 7.711143991343587, u'name': u'UPX1', u'virtual_size': u'0x00015000'} | entropy | 7.71114399134 | description | A section with a high entropy has been found | |||||||||
entropy | 0.993939393939 | description | Overall entropy of this PE file is high |
section | UPX0 | description | Section name indicates UPX | ||||||
section | UPX1 | description | Section name indicates UPX | ||||||
section | UPX2 | description | Section name indicates UPX |
buffer | Buffer with sha1: 97653fe98384b5bef285a95b60548b73adae825a |
suricata | ETPRO MALWARE Win32/Snojan Variant Uploading EXE |
suricata | ET INFO Generic HTTP EXE Upload Outbound |
G Data Antivirus (Windows) | Virus: Trojan.Agent.CYZT (Engine A), Win32.Application.Snojan.A (Engine B) |
Avast Core Security (Linux) | Win32:TrojanX-gen [Trj] |
C4S ClamAV (Linux) | YARA.UPX.UNOFFICIAL |
F-Secure Antivirus (Linux) | Trojan.TR/Crypt.ULPM.Gen2 [Aquarius] |
Windows Defender (Windows) | Trojan:Win32/CoreWarrior.DA!MTB |
Forticlient (Linux) | W32/Agent.CYMT!tr |
Sophos Anti-Virus (Linux) | Troj/Bdoor-BHD |
eScan Antivirus (Linux) | Trojan.Agent.CYZT(DB) |
ESET Security (Windows) | a variant of Win32/Agent.AAEF trojan |
ClamAV (Linux) | Win.Malware.Cymt-10023133-0 |
Bitdefender Antivirus (Linux) | Trojan.Agent.CYZT |
Kaspersky Standard (Windows) | HEUR:Flooder.Win32.CoreWarrior.a |
Emsisoft Commandline Scanner (Windows) | Trojan.Agent.CYZT (B) |
Bkav | W32.AIDetectMalware |
Cynet | Malicious (score: 100) |
CAT-QuickHeal | Trojan.AgentbPMF.S33725804 |
Skyhigh | BehavesLike.Win32.ToolSnojan.mc |
ALYac | Trojan.Agent.CYZT |
Cylance | Unsafe |
VIPRE | Trojan.Agent.CYZT |
CrowdStrike | win/malicious_confidence_70% (D) |
BitDefender | Trojan.Agent.CYZT |
K7GW | Trojan ( 005464da1 ) |
K7AntiVirus | Trojan ( 00575d031 ) |
Arcabit | Trojan.Agent.CYZT |
VirIT | Trojan.Win32.AgentT.DYK |
Symantec | Hacktool.Flooder |
Elastic | malicious (moderate confidence) |
ESET-NOD32 | a variant of Win32/Agent.AAEF |
Avast | Win32:TrojanX-gen [Trj] |
ClamAV | Win.Malware.Cymt-10023133-0 |
Kaspersky | HEUR:Flooder.Win32.CoreWarrior.a |
NANO-Antivirus | Trojan.Win32.Snojan.jqzopm |
MicroWorld-eScan | Trojan.Agent.CYZT |
Rising | Downloader.Snojan!8.ECDD (TFE:5:V47YrAkOYKG) |
Emsisoft | Trojan.Agent.CYZT (B) |
F-Secure | Trojan.TR/Crypt.ULPM.Gen2 |
DrWeb | Tool.Snojan.1 |
Zillya | Tool.CoreWarrior.Win32.18 |
McAfeeD | Real Protect-LS!F18D4715650F |
Trapmine | suspicious.low.ml.score |
CTX | exe.trojan.cyzt |
Sophos | Troj/Bdoor-BHD |
SentinelOne | Static AI - Suspicious PE |
FireEye | Generic.mg.f18d4715650f4df1 |
Jiangmin | Downloader.Snojan.adp |
Detected | |
Avira | TR/Crypt.ULPM.Gen2 |
Antiy-AVL | Trojan/Win32.Phonzy |
Xcitium | TrojWare.Win32.Snojan.B@7h1cjp |
Microsoft | Trojan:Win32/CoreWarrior.DA!MTB |
GData | Win32.Application.Snojan.A |
Varist | W32/Agent.FBOO-5422 |
AhnLab-V3 | Downloader/Win.Generic.R665906 |
Acronis | suspicious |
McAfee | GenericRXWO-RA!125859CCAC60 |
DeepInstinct | MALICIOUS |
VBA32 | Flooder.CoreWarrior |
Malwarebytes | Malware.AI.1754406724 |
Ikarus | Trojan.Agent |
Panda | Trj/Genetic.gen |
Tencent | Trojan.Win32.Corewarrior.ca |
Yandex | Riskware.Flooder!j7BYbbJGLUM |