Size | 83.1KB |
---|---|
Type | PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed |
MD5 | 8de1b06b72cadcab439117f7e03b7692 |
SHA1 | 84656a27606c778f84d98cf42ab6535a1bc61155 |
SHA256 | 15a64268adcdef9868e7ee0099fdf3561e5f759d39779f1bbe8b2b585a9ec253 |
SHA512 |
5c079303630d6ea2f5d4e7773b4ae018c85fcef3951e459b92db7fb62b241e35dbec69ca0e4d4bd25e124fe16459377f6656b3d9056154630608d9f17b88ab2b
|
CRC32 | F187993F |
ssdeep | None |
Yara |
|
This file is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | May 18, 2025, 10:47 a.m. | May 18, 2025, 10:48 a.m. | 68 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-05-18 10:26:12,000 [analyzer] DEBUG: Starting analyzer from: C:\tmpdrdvpd 2025-05-18 10:26:12,000 [analyzer] DEBUG: Pipe server name: \??\PIPE\tNYGOknluPEfGpepQccwzd 2025-05-18 10:26:12,000 [analyzer] DEBUG: Log pipe server name: \??\PIPE\josAoNFmEFtMjASeiZuiaj 2025-05-18 10:26:12,233 [analyzer] DEBUG: Started auxiliary module Curtain 2025-05-18 10:26:12,233 [analyzer] DEBUG: Started auxiliary module DbgView 2025-05-18 10:26:12,717 [analyzer] DEBUG: Started auxiliary module Disguise 2025-05-18 10:26:12,921 [analyzer] DEBUG: Loaded monitor into process with pid 508 2025-05-18 10:26:12,921 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-05-18 10:26:12,921 [analyzer] DEBUG: Started auxiliary module Human 2025-05-18 10:26:12,921 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-05-18 10:26:12,921 [analyzer] DEBUG: Started auxiliary module Reboot 2025-05-18 10:26:13,015 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-05-18 10:26:13,015 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-05-18 10:26:13,015 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-05-18 10:26:13,015 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-05-18 10:26:13,171 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\15a64268adcdef9868e7ee0099fdf3561e5f759d39779f1bbe8b2b585a9ec253.exe' with arguments '' and pid 2948 2025-05-18 10:26:13,405 [analyzer] DEBUG: Loaded monitor into process with pid 2948 2025-05-18 10:26:13,421 [analyzer] INFO: Added new file to list with pid 2948 and path C:\Users\Administrator\AppData\Local\Temp\rifaien2-jVjCCey0MJF6cpYv.exe 2025-05-18 10:26:42,171 [analyzer] INFO: Analysis timeout hit, terminating analysis. 2025-05-18 10:26:42,625 [analyzer] INFO: Terminating remaining processes before shutdown. 2025-05-18 10:26:42,640 [lib.api.process] INFO: Successfully terminated process with pid 2948. 2025-05-18 10:26:42,640 [analyzer] INFO: Analysis completed.
2025-05-18 10:47:21,586 [cuckoo.core.scheduler] INFO: Task #6483274: acquired machine win7x6412 (label=win7x6412) 2025-05-18 10:47:21,586 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.212 for task #6483274 2025-05-18 10:47:21,689 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 929603 (interface=vboxnet0, host=192.168.168.212) 2025-05-18 10:47:21,743 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x6412 2025-05-18 10:47:21,980 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x6412 to vmcloak 2025-05-18 10:47:30,354 [cuckoo.core.guest] INFO: Starting analysis #6483274 on guest (id=win7x6412, ip=192.168.168.212) 2025-05-18 10:47:31,359 [cuckoo.core.guest] DEBUG: win7x6412: not ready yet 2025-05-18 10:47:36,387 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x6412, ip=192.168.168.212) 2025-05-18 10:47:36,452 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x6412, ip=192.168.168.212, monitor=latest, size=6660546) 2025-05-18 10:47:37,729 [cuckoo.core.resultserver] DEBUG: Task #6483274: live log analysis.log initialized. 2025-05-18 10:47:38,601 [cuckoo.core.resultserver] DEBUG: Task #6483274 is sending a BSON stream 2025-05-18 10:47:39,071 [cuckoo.core.resultserver] DEBUG: Task #6483274 is sending a BSON stream 2025-05-18 10:47:39,640 [cuckoo.core.resultserver] DEBUG: Task #6483274: File upload for 'files/22fdb4382d83052a_rifaien2-jVjCCey0MJF6cpYv.exe' 2025-05-18 10:47:39,645 [cuckoo.core.resultserver] DEBUG: Task #6483274 uploaded file length: 85057 2025-05-18 10:47:39,882 [cuckoo.core.resultserver] DEBUG: Task #6483274: File upload for 'shots/0001.jpg' 2025-05-18 10:47:39,895 [cuckoo.core.resultserver] DEBUG: Task #6483274 uploaded file length: 171723 2025-05-18 10:47:52,362 [cuckoo.core.guest] DEBUG: win7x6412: analysis #6483274 still processing 2025-05-18 10:48:07,447 [cuckoo.core.guest] DEBUG: win7x6412: analysis #6483274 still processing 2025-05-18 10:48:08,205 [cuckoo.core.resultserver] DEBUG: Task #6483274: File upload for 'curtain/1747556802.45.curtain.log' 2025-05-18 10:48:08,208 [cuckoo.core.resultserver] DEBUG: Task #6483274 uploaded file length: 36 2025-05-18 10:48:08,377 [cuckoo.core.resultserver] DEBUG: Task #6483274: File upload for 'sysmon/1747556802.62.sysmon.xml' 2025-05-18 10:48:08,385 [cuckoo.core.resultserver] DEBUG: Task #6483274 uploaded file length: 594766 2025-05-18 10:48:08,852 [cuckoo.core.resultserver] DEBUG: Task #6483274: File upload for 'shots/0002.jpg' 2025-05-18 10:48:08,861 [cuckoo.core.resultserver] DEBUG: Task #6483274 uploaded file length: 133526 2025-05-18 10:48:08,877 [cuckoo.core.resultserver] DEBUG: Task #6483274 had connection reset for <Context for LOG> 2025-05-18 10:48:10,464 [cuckoo.core.guest] INFO: win7x6412: analysis completed successfully 2025-05-18 10:48:10,482 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-05-18 10:48:10,516 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-05-18 10:48:10,872 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x6412 to path /srv/cuckoo/cwd/storage/analyses/6483274/memory.dmp 2025-05-18 10:48:10,874 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x6412 2025-05-18 10:48:29,351 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.212 for task #6483274 2025-05-18 10:48:30,081 [cuckoo.core.scheduler] DEBUG: Released database task #6483274 2025-05-18 10:48:30,107 [cuckoo.core.scheduler] INFO: Task #6483274: analysis procedure completed
description | (no description) | rule | UPX | ||||||
description | The packer/protector section names/keywords | rule | suspicious_packer_section | ||||||
description | Communications over RAW socket | rule | network_tcp_socket |
packer | UPX 2.90 [LZMA] -> Markus Oberhumer, Laszlo Molnar & John Reiser |
suspicious_features | POST method with no referer header, POST method with no useragent header | suspicious_request | POST http://wecan.hasthe.technology/upload |
request | POST http://wecan.hasthe.technology/upload |
request | POST http://wecan.hasthe.technology/upload |
file | C:\Users\Administrator\AppData\Local\Temp\rifaien2-jVjCCey0MJF6cpYv.exe |
file | C:\Users\Administrator\AppData\Local\Temp\rifaien2-jVjCCey0MJF6cpYv.exe |
section | {u'size_of_data': u'0x00014800', u'virtual_address': u'0x00014000', u'entropy': 7.7111178711986135, u'name': u'UPX1', u'virtual_size': u'0x00015000'} | entropy | 7.7111178712 | description | A section with a high entropy has been found | |||||||||
entropy | 0.993939393939 | description | Overall entropy of this PE file is high |
section | UPX0 | description | Section name indicates UPX | ||||||
section | UPX1 | description | Section name indicates UPX | ||||||
section | UPX2 | description | Section name indicates UPX |
buffer | Buffer with sha1: 97653fe98384b5bef285a95b60548b73adae825a |
suricata | ETPRO MALWARE Win32/Snojan Variant Uploading EXE |
suricata | ET INFO Generic HTTP EXE Upload Outbound |
G Data Antivirus (Windows) | Virus: Trojan.Agent.CYZT (Engine A), Win32.Application.Snojan.A (Engine B) |
Avast Core Security (Linux) | Win32:MalwareX-gen [Trj] |
C4S ClamAV (Linux) | YARA.UPX.UNOFFICIAL |
WithSecure (Linux) | Trojan.TR/Crypt.ULPM.Gen2 |
ESET Security (Windows) | a variant of Win32/Agent.AAEF trojan |
Sophos Anti-Virus (Linux) | Troj/Bdoor-BHD |
ClamAV (Linux) | Win.Malware.Cymt-10023133-0 |
Bitdefender Antivirus (Linux) | Trojan.Agent.CYZT |
Kaspersky Standard (Windows) | HEUR:Flooder.Win32.CoreWarrior.a |
Emsisoft Commandline Scanner (Windows) | Trojan.Agent.CYZT (B) |
Bkav | W32.AIDetectMalware |
Cynet | Malicious (score: 100) |
CAT-QuickHeal | Trojan.AgentbPMF.S33725804 |
Skyhigh | BehavesLike.Win32.ToolSnojan.mc |
ALYac | Trojan.Agent.CYZT |
Cylance | Unsafe |
VIPRE | Trojan.Agent.CYZT |
Sangfor | Trojan.Win32.Save.a |
CrowdStrike | win/malicious_confidence_70% (D) |
BitDefender | Trojan.Agent.CYZT |
K7GW | Trojan ( 005464da1 ) |
K7AntiVirus | Trojan ( 00575d031 ) |
Arcabit | Trojan.Agent.CYZT |
VirIT | Trojan.Win32.AgentT.DYK |
Symantec | Hacktool.Flooder |
Elastic | malicious (moderate confidence) |
ESET-NOD32 | a variant of Win32/Agent.AAEF |
Avast | Win32:MalwareX-gen [Trj] |
ClamAV | Win.Malware.Cymt-10023133-0 |
Kaspersky | HEUR:Flooder.Win32.CoreWarrior.a |
NANO-Antivirus | Trojan.Win32.Snojan.jqzopm |
MicroWorld-eScan | Trojan.Agent.CYZT |
Rising | Downloader.Snojan!8.ECDD (TFE:5:V47YrAkOYKG) |
Emsisoft | Trojan.Agent.CYZT (B) |
F-Secure | Trojan.TR/Crypt.ULPM.Gen2 |
DrWeb | Tool.Snojan.1 |
Zillya | Tool.CoreWarrior.Win32.18 |
McAfeeD | Real Protect-LS!8DE1B06B72CA |
Trapmine | suspicious.low.ml.score |
CTX | exe.trojan.cyzt |
Sophos | Troj/Bdoor-BHD |
SentinelOne | Static AI - Suspicious PE |
Jiangmin | Downloader.Snojan.adp |
Webroot | Win.Trojan.Cyzt |
Detected | |
Avira | TR/Crypt.ULPM.Gen2 |
Antiy-AVL | Trojan/Win32.Phonzy |
Xcitium | TrojWare.Win32.Snojan.B@7h1cjp |
Microsoft | Trojan:Win32/CoreWarrior.DA!MTB |
ZoneAlarm | Troj/Bdoor-BHD |
GData | Win32.Application.Snojan.A |
Varist | W32/Agent.FBOO-5422 |
AhnLab-V3 | Downloader/Win.Generic.R665906 |
Acronis | suspicious |
McAfee | GenericRXWO-RA!739F51453955 |
DeepInstinct | MALICIOUS |
VBA32 | Flooder.CoreWarrior |
Malwarebytes | Malware.AI.3504857405 |
Ikarus | Trojan.Agent |
Panda | Trj/Genetic.gen |