Size | 361.0KB |
---|---|
Type | PE32 executable (GUI) Intel 80386, for MS Windows |
MD5 | 61db0f8b44c70f9e6357e7a7a296a933 |
SHA1 | 15a665f2eba8aa65b3945f4f808ed42b8a4c1996 |
SHA256 | 44d358613af207e2292a25c130da56c2122c1116493bafbdb67bb645db7ace77 |
SHA512 |
e48ee9b1d17f2b2068bc0086f5e0ef36447207db97fc420b87ba2a6843f70101ef2765a60228919acde8d7b659f756a0fa093f242eb2f8186c787f880f781958
|
CRC32 | C754A200 |
ssdeep | None |
PDB Path | f:\软件工ç¨\驱å¨ç¼ç¨\OK\KernelYK\bin\InstallSYS.pdb |
Yara |
|
This file is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | June 25, 2025, 12:08 p.m. | June 25, 2025, 12:17 p.m. | 553 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-06-21 12:37:06,015 [analyzer] DEBUG: Starting analyzer from: C:\tmpht3fil 2025-06-21 12:37:06,015 [analyzer] DEBUG: Pipe server name: \??\PIPE\HyEmMWljwDOuOaJc 2025-06-21 12:37:06,015 [analyzer] DEBUG: Log pipe server name: \??\PIPE\MCbzPnLSiNRKajIqE 2025-06-21 12:37:06,015 [analyzer] DEBUG: No analysis package specified, trying to detect it automagically. 2025-06-21 12:37:06,015 [analyzer] INFO: Automatically selected analysis package "exe" 2025-06-21 12:37:06,296 [analyzer] DEBUG: Started auxiliary module Curtain 2025-06-21 12:37:06,296 [analyzer] DEBUG: Started auxiliary module DbgView 2025-06-21 12:37:06,905 [analyzer] DEBUG: Started auxiliary module Disguise 2025-06-21 12:37:07,108 [analyzer] DEBUG: Loaded monitor into process with pid 504 2025-06-21 12:37:07,108 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-06-21 12:37:07,108 [analyzer] DEBUG: Started auxiliary module Human 2025-06-21 12:37:07,108 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-06-21 12:37:07,108 [analyzer] DEBUG: Started auxiliary module Reboot 2025-06-21 12:37:07,187 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-06-21 12:37:07,187 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-06-21 12:37:07,187 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-06-21 12:37:07,187 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-06-21 12:37:07,312 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\44d358613af207e2_i_ywqoigbytq.exe' with arguments '' and pid 2472 2025-06-21 12:37:07,483 [analyzer] DEBUG: Loaded monitor into process with pid 2472 2025-06-21 12:37:08,000 [analyzer] INFO: Added new file to list with pid 2472 and path C:\Temp\CreateProcess.exe 2025-06-21 12:37:09,000 [analyzer] INFO: Added new file to list with pid 2472 and path C:\Temp\mhfzxrpjhczurmke.exe 2025-06-21 12:37:09,062 [analyzer] INFO: Injected into process with pid 2448 and name u'mhfzxrpjhczurmke.exe' 2025-06-21 12:37:09,233 [analyzer] DEBUG: Loaded monitor into process with pid 2448 2025-06-21 12:37:09,265 [analyzer] INFO: Added new file to list with pid 2448 and path \Device\NamedPipe\lsass 2025-06-21 12:37:09,280 [analyzer] INFO: Injected into process with pid 2996 and name u'iexplore.exe' 2025-06-21 12:37:09,500 [analyzer] DEBUG: Loaded monitor into process with pid 2996 2025-06-21 12:37:11,280 [analyzer] INFO: Added new file to list with pid 2472 and path C:\Temp\mhfzxrpjhczurmke.sys 2025-06-21 12:37:11,937 [analyzer] INFO: Added new file to list with pid 2448 and path C:\Temp\lfdyvqniga.exe 2025-06-21 12:37:12,000 [analyzer] INFO: Injected into process with pid 2440 and name u'CreateProcess.exe' 2025-06-21 12:37:12,155 [analyzer] DEBUG: Loaded monitor into process with pid 2440 2025-06-21 12:37:12,312 [analyzer] INFO: Process with pid 2472 has terminated 2025-06-21 12:37:13,312 [analyzer] INFO: Process with pid 2440 has terminated 2025-06-21 12:37:14,500 [analyzer] INFO: Added new file to list with pid 2448 and path C:\Temp\i_lfdyvqniga.exe 2025-06-21 12:37:19,842 [analyzer] INFO: Added new file to list with pid 2448 and path C:\Temp\hfaxsqkaus.exe 2025-06-21 12:40:26,312 [analyzer] INFO: Analysis timeout hit, terminating analysis. 2025-06-21 12:40:27,592 [analyzer] INFO: Terminating remaining processes before shutdown. 2025-06-21 12:40:27,592 [lib.api.process] INFO: Successfully terminated process with pid 2448. 2025-06-21 12:40:27,592 [lib.api.process] INFO: Successfully terminated process with pid 2996. 2025-06-21 12:40:27,592 [analyzer] WARNING: File at path u'\\device\\namedpipe\\lsass' does not exist, skip. 2025-06-21 12:40:27,608 [analyzer] INFO: Analysis completed.
2025-06-25 12:08:38,924 [cuckoo.core.scheduler] DEBUG: Task #6588445: no machine available yet 2025-06-25 12:08:39,974 [cuckoo.core.scheduler] DEBUG: Task #6588445: no machine available yet 2025-06-25 12:08:41,013 [cuckoo.core.scheduler] DEBUG: Task #6588445: no machine available yet 2025-06-25 12:08:42,367 [cuckoo.core.scheduler] DEBUG: Task #6588445: no machine available yet 2025-06-25 12:08:43,439 [cuckoo.core.scheduler] DEBUG: Task #6588445: no machine available yet 2025-06-25 12:08:44,525 [cuckoo.core.scheduler] DEBUG: Task #6588445: no machine available yet 2025-06-25 12:08:45,613 [cuckoo.core.scheduler] DEBUG: Task #6588445: no machine available yet 2025-06-25 12:08:46,683 [cuckoo.core.scheduler] DEBUG: Task #6588445: no machine available yet 2025-06-25 12:08:47,756 [cuckoo.core.scheduler] DEBUG: Task #6588445: no machine available yet 2025-06-25 12:08:48,797 [cuckoo.core.scheduler] DEBUG: Task #6588445: no machine available yet 2025-06-25 12:08:49,848 [cuckoo.core.scheduler] INFO: Task #6588445: acquired machine win7x6411 (label=win7x6411) 2025-06-25 12:08:49,850 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.211 for task #6588445 2025-06-25 12:08:50,235 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 3924102 (interface=vboxnet0, host=192.168.168.211) 2025-06-25 12:08:51,985 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x6411 2025-06-25 12:08:52,579 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x6411 to vmcloak 2025-06-25 12:12:10,355 [cuckoo.core.guest] INFO: Starting analysis #6588445 on guest (id=win7x6411, ip=192.168.168.211) 2025-06-25 12:12:11,370 [cuckoo.core.guest] DEBUG: win7x6411: not ready yet 2025-06-25 12:12:16,393 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x6411, ip=192.168.168.211) 2025-06-25 12:12:16,597 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x6411, ip=192.168.168.211, monitor=latest, size=6660546) 2025-06-25 12:12:17,938 [cuckoo.core.resultserver] DEBUG: Task #6588445: live log analysis.log initialized. 2025-06-25 12:12:19,040 [cuckoo.core.resultserver] DEBUG: Task #6588445 is sending a BSON stream 2025-06-25 12:12:19,558 [cuckoo.core.resultserver] DEBUG: Task #6588445 is sending a BSON stream 2025-06-25 12:12:20,236 [cuckoo.core.resultserver] DEBUG: Task #6588445: File upload for 'shots/0001.jpg' 2025-06-25 12:12:20,573 [cuckoo.core.resultserver] DEBUG: Task #6588445 uploaded file length: 133504 2025-06-25 12:12:21,095 [cuckoo.core.resultserver] DEBUG: Task #6588445 is sending a BSON stream 2025-06-25 12:12:21,299 [cuckoo.core.resultserver] DEBUG: Task #6588445 is sending a BSON stream 2025-06-25 12:12:24,018 [cuckoo.core.resultserver] DEBUG: Task #6588445 is sending a BSON stream 2025-06-25 12:12:24,444 [cuckoo.core.resultserver] DEBUG: Task #6588445: File upload for 'files/f015f9be08ab4d37_lfdyvqniga.exe' 2025-06-25 12:12:24,449 [cuckoo.core.resultserver] DEBUG: Task #6588445 uploaded file length: 369664 2025-06-25 12:12:29,238 [cuckoo.core.resultserver] DEBUG: Task #6588445: File upload for 'files/a66e226c7e03049e_i_lfdyvqniga.exe' 2025-06-25 12:12:29,243 [cuckoo.core.resultserver] DEBUG: Task #6588445 uploaded file length: 369664 2025-06-25 12:12:32,558 [cuckoo.core.guest] DEBUG: win7x6411: analysis #6588445 still processing 2025-06-25 12:12:47,660 [cuckoo.core.guest] DEBUG: win7x6411: analysis #6588445 still processing 2025-06-25 12:13:02,823 [cuckoo.core.guest] DEBUG: win7x6411: analysis #6588445 still processing 2025-06-25 12:13:17,926 [cuckoo.core.guest] DEBUG: win7x6411: analysis #6588445 still processing 2025-06-25 12:13:33,308 [cuckoo.core.guest] DEBUG: win7x6411: analysis #6588445 still processing 2025-06-25 12:13:48,513 [cuckoo.core.guest] DEBUG: win7x6411: analysis #6588445 still processing 2025-06-25 12:14:03,594 [cuckoo.core.guest] DEBUG: win7x6411: analysis #6588445 still processing 2025-06-25 12:14:18,836 [cuckoo.core.guest] DEBUG: win7x6411: analysis #6588445 still processing 2025-06-25 12:14:34,376 [cuckoo.core.guest] DEBUG: win7x6411: analysis #6588445 still processing 2025-06-25 12:14:49,465 [cuckoo.core.guest] DEBUG: win7x6411: analysis #6588445 still processing 2025-06-25 12:15:04,751 [cuckoo.core.guest] DEBUG: win7x6411: analysis #6588445 still processing 2025-06-25 12:15:19,938 [cuckoo.core.guest] DEBUG: win7x6411: analysis #6588445 still processing 2025-06-25 12:15:35,142 [cuckoo.core.guest] DEBUG: win7x6411: analysis #6588445 still processing 2025-06-25 12:15:38,429 [cuckoo.core.resultserver] DEBUG: Task #6588445: File upload for 'curtain/1750502426.48.curtain.log' 2025-06-25 12:15:38,433 [cuckoo.core.resultserver] DEBUG: Task #6588445 uploaded file length: 36 2025-06-25 12:15:39,423 [cuckoo.core.resultserver] DEBUG: Task #6588445: File upload for 'sysmon/1750502427.47.sysmon.xml' 2025-06-25 12:15:39,533 [cuckoo.core.resultserver] DEBUG: Task #6588445 uploaded file length: 15235074 2025-06-25 12:15:39,558 [cuckoo.core.resultserver] DEBUG: Task #6588445: File upload for 'files/ed7ff7c0ff140dcd_hfaxsqkaus.exe' 2025-06-25 12:15:39,565 [cuckoo.core.resultserver] DEBUG: Task #6588445: File upload for 'files/7458e51262150f35_mhfzxrpjhczurmke.exe' 2025-06-25 12:15:39,569 [cuckoo.core.resultserver] DEBUG: Task #6588445: File upload for 'files/a836bc5cec379920_mhfzxrpjhczurmke.sys' 2025-06-25 12:15:39,577 [cuckoo.core.resultserver] DEBUG: Task #6588445: File upload for 'files/80de1aec0c2406e9_createprocess.exe' 2025-06-25 12:15:39,579 [cuckoo.core.resultserver] DEBUG: Task #6588445 uploaded file length: 3584 2025-06-25 12:15:39,582 [cuckoo.core.resultserver] DEBUG: Task #6588445 uploaded file length: 369664 2025-06-25 12:15:39,584 [cuckoo.core.resultserver] DEBUG: Task #6588445 uploaded file length: 369664 2025-06-25 12:15:39,587 [cuckoo.core.resultserver] DEBUG: Task #6588445 uploaded file length: 300544 2025-06-25 12:15:39,592 [cuckoo.core.resultserver] DEBUG: Task #6588445 had connection reset for <Context for LOG> 2025-06-25 12:15:41,183 [cuckoo.core.guest] INFO: win7x6411: analysis completed successfully 2025-06-25 12:15:41,198 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-06-25 12:15:41,238 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-06-25 12:15:42,010 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x6411 to path /srv/cuckoo/cwd/storage/analyses/6588445/memory.dmp 2025-06-25 12:15:42,011 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x6411 2025-06-25 12:17:50,990 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.211 for task #6588445 2025-06-25 12:17:51,668 [cuckoo.core.scheduler] DEBUG: Released database task #6588445 2025-06-25 12:17:51,685 [cuckoo.core.scheduler] INFO: Task #6588445: analysis procedure completed
description | Possibly employs anti-virtualization techniques | rule | vmdetect | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Code injection with CreateRemoteThread in a remote process | rule | inject_thread | ||||||
description | Create a windows service | rule | create_service | ||||||
description | Communications over HTTP | rule | network_http | ||||||
description | File downloader/dropper | rule | network_dropper | ||||||
description | Communications over RAW socket | rule | network_tcp_socket | ||||||
description | Escalade priviledges | rule | escalate_priv | ||||||
description | Take screenshot | rule | screenshot | ||||||
description | Run a keylogger | rule | keylogger |
pdb_path | f:\软件工ç¨\驱å¨ç¼ç¨\OK\KernelYK\bin\InstallSYS.pdb |
name | RT_ICON | language | LANG_CHINESE | filetype | Device independent bitmap graphic, 13 x 26 x 8, image size 208, 256 important colors | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0005bec0 | size | 0x0000052c | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | Device independent bitmap graphic, 13 x 26 x 8, image size 208, 256 important colors | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0005bec0 | size | 0x0000052c | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | Device independent bitmap graphic, 13 x 26 x 8, image size 208, 256 important colors | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0005bec0 | size | 0x0000052c | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | Device independent bitmap graphic, 13 x 26 x 8, image size 208, 256 important colors | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0005bec0 | size | 0x0000052c | ||||||||||||||||||
name | RT_DIALOG | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0005c3ec | size | 0x00000094 | ||||||||||||||||||
name | RT_GROUP_ICON | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0005c480 | size | 0x0000003e | ||||||||||||||||||
name | RT_VERSION | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0005c4c0 | size | 0x000002cc |
file | C:\Temp\hfaxsqkaus.exe |
file | C:\Temp\lfdyvqniga.exe |
file | C:\Temp\CreateProcess.exe |
file | C:\Temp\i_lfdyvqniga.exe |
file | C:\Temp\mhfzxrpjhczurmke.exe |
cmdline | C:\Program Files\Internet Explorer\iexplore.exe http://xytets.com:2345/t.asp?os=home |
G Data Antivirus (Windows) | Virus: Generic.Dacic.467A5BC0.A.9DBEAA7E (Engine A), Win32.Trojan.PSE1.YSVY3N (Engine B) |
Avast Core Security (Linux) | MBR:Backboot-D [Rtk] |
C4S ClamAV (Linux) | Win.Malware.Mikey-9949492-0 |
Trellix (Linux) | Generic Dropper.aoe trojan |
WithSecure (Linux) | Trojan.TR/Rogue.7909438 |
eScan Antivirus (Linux) | Generic.Dacic.467A5BC0.A.9DBEAA7E(DB) |
ESET Security (Windows) | Win32/Agent.PGA trojan |
Sophos Anti-Virus (Linux) | Troj/Drop-GZ |
DrWeb Antivirus (Linux) | Trojan.Click2.32800 |
ClamAV (Linux) | Win.Malware.Mikey-9949492-0 |
Bitdefender Antivirus (Linux) | Generic.Dacic.467A5BC0.A.9DBEAA7E |
Kaspersky Standard (Windows) | Trojan.Win32.Tiny.cm |
Emsisoft Commandline Scanner (Windows) | Generic.Dacic.467A5BC0.A.9DBEAA7E (B) |