Size | 361.0KB |
---|---|
Type | PE32 executable (GUI) Intel 80386, for MS Windows |
MD5 | 85e6359049f6e8abd6b5e5b32c6dd1bc |
SHA1 | 3c486e5782d9d03322bb2625194b38ac67502e3c |
SHA256 | 117129b392103a0950a732622117f8968bd7728cb2e56972605573319640077d |
SHA512 |
bebeccf3b8cdd02617b9b85233ae57d061d11e390f5e14a63c574e6ebe3a067d944f14dd81b7908a44a281273af2f9375034f7f904bf0cddc4c264964c91e14b
|
CRC32 | A4D939F9 |
ssdeep | None |
PDB Path | f:\软件工ç¨\驱å¨ç¼ç¨\OK\KernelYK\bin\InstallSYS.pdb |
Yara |
|
This file is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | June 21, 2025, 12:30 p.m. | June 21, 2025, 12:36 p.m. | 365 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-06-20 15:40:52,015 [analyzer] DEBUG: Starting analyzer from: C:\tmp2pjrvv 2025-06-20 15:40:52,030 [analyzer] DEBUG: Pipe server name: \??\PIPE\ZbRVqXPcFwwuGeqTmf 2025-06-20 15:40:52,030 [analyzer] DEBUG: Log pipe server name: \??\PIPE\SrvgIXPnqbneAAYvBsWWklZSxtbnFXN 2025-06-20 15:40:52,312 [analyzer] DEBUG: Started auxiliary module Curtain 2025-06-20 15:40:52,328 [analyzer] DEBUG: Started auxiliary module DbgView 2025-06-20 15:40:52,780 [analyzer] DEBUG: Started auxiliary module Disguise 2025-06-20 15:40:52,983 [analyzer] DEBUG: Loaded monitor into process with pid 504 2025-06-20 15:40:52,983 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-06-20 15:40:52,983 [analyzer] DEBUG: Started auxiliary module Human 2025-06-20 15:40:52,983 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-06-20 15:40:52,983 [analyzer] DEBUG: Started auxiliary module Reboot 2025-06-20 15:40:53,062 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-06-20 15:40:53,062 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-06-20 15:40:53,062 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-06-20 15:40:53,062 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-06-20 15:40:53,203 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\117129b392103a0950a732622117f8968bd7728cb2e56972605573319640077d.exe' with arguments '' and pid 2824 2025-06-20 15:40:53,390 [analyzer] DEBUG: Loaded monitor into process with pid 2824 2025-06-20 15:40:53,921 [analyzer] INFO: Added new file to list with pid 2824 and path C:\Temp\CreateProcess.exe 2025-06-20 15:40:54,921 [analyzer] INFO: Added new file to list with pid 2824 and path C:\Temp\wuomgezwrpjhbztr.exe 2025-06-20 15:40:55,015 [analyzer] INFO: Injected into process with pid 1072 and name u'wuomgezwrpjhbztr.exe' 2025-06-20 15:40:55,155 [analyzer] INFO: Injected into process with pid 1792 and name u'iexplore.exe' 2025-06-20 15:40:55,203 [analyzer] DEBUG: Loaded monitor into process with pid 1072 2025-06-20 15:40:55,250 [analyzer] INFO: Added new file to list with pid 1072 and path \Device\NamedPipe\lsass 2025-06-20 15:40:55,375 [analyzer] DEBUG: Loaded monitor into process with pid 1792 2025-06-20 15:40:57,155 [analyzer] INFO: Added new file to list with pid 2824 and path C:\Temp\wuomgezwrpjhbztr.sys 2025-06-20 15:40:57,921 [analyzer] INFO: Added new file to list with pid 1072 and path C:\Temp\pnhfaxsqki.exe 2025-06-20 15:40:58,000 [analyzer] INFO: Injected into process with pid 2472 and name u'CreateProcess.exe' 2025-06-20 15:40:58,140 [analyzer] DEBUG: Loaded monitor into process with pid 2472 2025-06-20 15:40:58,203 [analyzer] INFO: Process with pid 2824 has terminated 2025-06-20 15:40:59,203 [analyzer] INFO: Process with pid 2472 has terminated 2025-06-20 15:41:00,500 [analyzer] INFO: Added new file to list with pid 1072 and path C:\Temp\i_pnhfaxsqki.exe 2025-06-20 15:41:05,842 [analyzer] INFO: Added new file to list with pid 1072 and path C:\Temp\pkhcausmke.exe 2025-06-20 15:41:22,203 [analyzer] INFO: Analysis timeout hit, terminating analysis. 2025-06-20 15:41:22,640 [analyzer] INFO: Terminating remaining processes before shutdown. 2025-06-20 15:41:22,640 [lib.api.process] INFO: Successfully terminated process with pid 1072. 2025-06-20 15:41:22,640 [lib.api.process] INFO: Successfully terminated process with pid 1792. 2025-06-20 15:41:22,655 [analyzer] WARNING: File at path u'\\device\\namedpipe\\lsass' does not exist, skip. 2025-06-20 15:41:22,687 [analyzer] INFO: Analysis completed.
2025-06-21 12:30:36,299 [cuckoo.core.scheduler] DEBUG: Task #6570717: no machine available yet 2025-06-21 12:30:37,518 [cuckoo.core.scheduler] DEBUG: Task #6570717: no machine available yet 2025-06-21 12:30:38,582 [cuckoo.core.scheduler] DEBUG: Task #6570717: no machine available yet 2025-06-21 12:30:39,652 [cuckoo.core.scheduler] DEBUG: Task #6570717: no machine available yet 2025-06-21 12:30:40,728 [cuckoo.core.scheduler] DEBUG: Task #6570717: no machine available yet 2025-06-21 12:30:42,049 [cuckoo.core.scheduler] DEBUG: Task #6570717: no machine available yet 2025-06-21 12:30:43,146 [cuckoo.core.scheduler] DEBUG: Task #6570717: no machine available yet 2025-06-21 12:30:44,251 [cuckoo.core.scheduler] INFO: Task #6570717: acquired machine win7x648 (label=win7x648) 2025-06-21 12:30:44,254 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.208 for task #6570717 2025-06-21 12:30:44,798 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 276512 (interface=vboxnet0, host=192.168.168.208) 2025-06-21 12:30:45,113 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x648 2025-06-21 12:30:46,168 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x648 to vmcloak 2025-06-21 12:33:16,908 [cuckoo.core.guest] INFO: Starting analysis #6570717 on guest (id=win7x648, ip=192.168.168.208) 2025-06-21 12:33:17,914 [cuckoo.core.guest] DEBUG: win7x648: not ready yet 2025-06-21 12:33:22,940 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x648, ip=192.168.168.208) 2025-06-21 12:33:23,017 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x648, ip=192.168.168.208, monitor=latest, size=6660546) 2025-06-21 12:33:24,359 [cuckoo.core.resultserver] DEBUG: Task #6570717: live log analysis.log initialized. 2025-06-21 12:33:25,289 [cuckoo.core.resultserver] DEBUG: Task #6570717 is sending a BSON stream 2025-06-21 12:33:25,680 [cuckoo.core.resultserver] DEBUG: Task #6570717 is sending a BSON stream 2025-06-21 12:33:26,528 [cuckoo.core.resultserver] DEBUG: Task #6570717: File upload for 'shots/0001.jpg' 2025-06-21 12:33:26,555 [cuckoo.core.resultserver] DEBUG: Task #6570717 uploaded file length: 133465 2025-06-21 12:33:27,493 [cuckoo.core.resultserver] DEBUG: Task #6570717 is sending a BSON stream 2025-06-21 12:33:27,605 [cuckoo.core.resultserver] DEBUG: Task #6570717 is sending a BSON stream 2025-06-21 12:33:30,639 [cuckoo.core.resultserver] DEBUG: Task #6570717 is sending a BSON stream 2025-06-21 12:33:30,873 [cuckoo.core.resultserver] DEBUG: Task #6570717: File upload for 'files/e804eb3a8618c3a1_pnhfaxsqki.exe' 2025-06-21 12:33:30,877 [cuckoo.core.resultserver] DEBUG: Task #6570717 uploaded file length: 369664 2025-06-21 12:33:35,572 [cuckoo.core.resultserver] DEBUG: Task #6570717: File upload for 'files/3a193231bf5d75e4_i_pnhfaxsqki.exe' 2025-06-21 12:33:35,577 [cuckoo.core.resultserver] DEBUG: Task #6570717 uploaded file length: 369664 2025-06-21 12:33:39,043 [cuckoo.core.guest] DEBUG: win7x648: analysis #6570717 still processing 2025-06-21 12:33:54,430 [cuckoo.core.guest] DEBUG: win7x648: analysis #6570717 still processing 2025-06-21 12:33:54,735 [cuckoo.core.resultserver] DEBUG: Task #6570717: File upload for 'curtain/1750426882.36.curtain.log' 2025-06-21 12:33:54,738 [cuckoo.core.resultserver] DEBUG: Task #6570717 uploaded file length: 36 2025-06-21 12:33:54,988 [cuckoo.core.resultserver] DEBUG: Task #6570717: File upload for 'sysmon/1750426882.61.sysmon.xml' 2025-06-21 12:33:55,019 [cuckoo.core.resultserver] DEBUG: Task #6570717 uploaded file length: 2020718 2025-06-21 12:33:55,031 [cuckoo.core.resultserver] DEBUG: Task #6570717: File upload for 'files/eb7400a6b0f2b5e3_wuomgezwrpjhbztr.exe' 2025-06-21 12:33:55,035 [cuckoo.core.resultserver] DEBUG: Task #6570717 uploaded file length: 369664 2025-06-21 12:33:55,038 [cuckoo.core.resultserver] DEBUG: Task #6570717: File upload for 'files/9ad64b6a542e12dd_createprocess.exe' 2025-06-21 12:33:55,040 [cuckoo.core.resultserver] DEBUG: Task #6570717 uploaded file length: 3584 2025-06-21 12:33:55,044 [cuckoo.core.resultserver] DEBUG: Task #6570717: File upload for 'files/36c43f5069351d1f_wuomgezwrpjhbztr.sys' 2025-06-21 12:33:55,047 [cuckoo.core.resultserver] DEBUG: Task #6570717 uploaded file length: 300544 2025-06-21 12:33:55,052 [cuckoo.core.resultserver] DEBUG: Task #6570717: File upload for 'files/e96383a3c8f190a4_pkhcausmke.exe' 2025-06-21 12:33:55,060 [cuckoo.core.resultserver] DEBUG: Task #6570717 uploaded file length: 369664 2025-06-21 12:33:55,238 [cuckoo.core.resultserver] DEBUG: Task #6570717 had connection reset for <Context for LOG> 2025-06-21 12:33:57,443 [cuckoo.core.guest] INFO: win7x648: analysis completed successfully 2025-06-21 12:33:57,453 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-06-21 12:33:57,484 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-06-21 12:33:58,984 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x648 to path /srv/cuckoo/cwd/storage/analyses/6570717/memory.dmp 2025-06-21 12:33:58,985 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x648 2025-06-21 12:36:28,793 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.208 for task #6570717 2025-06-21 12:36:29,547 [cuckoo.core.scheduler] DEBUG: Released database task #6570717 2025-06-21 12:36:29,866 [cuckoo.core.scheduler] INFO: Task #6570717: analysis procedure completed
description | Possibly employs anti-virtualization techniques | rule | vmdetect | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Code injection with CreateRemoteThread in a remote process | rule | inject_thread | ||||||
description | Create a windows service | rule | create_service | ||||||
description | Communications over HTTP | rule | network_http | ||||||
description | File downloader/dropper | rule | network_dropper | ||||||
description | Communications over RAW socket | rule | network_tcp_socket | ||||||
description | Escalade priviledges | rule | escalate_priv | ||||||
description | Take screenshot | rule | screenshot | ||||||
description | Run a keylogger | rule | keylogger |
pdb_path | f:\软件工ç¨\驱å¨ç¼ç¨\OK\KernelYK\bin\InstallSYS.pdb |
name | RT_ICON | language | LANG_CHINESE | filetype | Device independent bitmap graphic, 13 x 26 x 8, image size 208, 256 important colors | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0005bec0 | size | 0x0000052c | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | Device independent bitmap graphic, 13 x 26 x 8, image size 208, 256 important colors | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0005bec0 | size | 0x0000052c | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | Device independent bitmap graphic, 13 x 26 x 8, image size 208, 256 important colors | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0005bec0 | size | 0x0000052c | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | Device independent bitmap graphic, 13 x 26 x 8, image size 208, 256 important colors | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0005bec0 | size | 0x0000052c | ||||||||||||||||||
name | RT_DIALOG | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0005c3ec | size | 0x00000094 | ||||||||||||||||||
name | RT_GROUP_ICON | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0005c480 | size | 0x0000003e | ||||||||||||||||||
name | RT_VERSION | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0005c4c0 | size | 0x000002cc |
file | C:\Temp\i_pnhfaxsqki.exe |
file | C:\Temp\pkhcausmke.exe |
file | C:\Temp\wuomgezwrpjhbztr.exe |
file | C:\Temp\pnhfaxsqki.exe |
file | C:\Temp\CreateProcess.exe |
cmdline | C:\Program Files\Internet Explorer\iexplore.exe http://xytets.com:2345/t.asp?os=home |
G Data Antivirus (Windows) | Virus: Generic.Dacic.467A5BC0.A.124FABD3 (Engine A), Win32.Trojan.PSE1.YSVY3N (Engine B) |
Avast Core Security (Linux) | MBR:Backboot-D [Rtk] |
C4S ClamAV (Linux) | Win.Malware.Mikey-9949492-0 |
Trellix (Linux) | Generic Dropper.aoe trojan |
WithSecure (Linux) | Trojan.TR/Rogue.7909438 |
eScan Antivirus (Linux) | Generic.Dacic.467A5BC0.A.124FABD3(DB) |
ESET Security (Windows) | Win32/Agent.PGA trojan |
Sophos Anti-Virus (Linux) | Troj/Drop-GZ |
DrWeb Antivirus (Linux) | Trojan.Click2.32800 |
ClamAV (Linux) | Win.Malware.Mikey-9949492-0 |
Bitdefender Antivirus (Linux) | Generic.Dacic.467A5BC0.A.124FABD3 |
Emsisoft Commandline Scanner (Windows) | Generic.Dacic.467A5BC0.A.124FABD3 (B) |