Size | 60.1KB |
---|---|
Type | PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed |
MD5 | 8a456baa79f2c83426329f2372e15039 |
SHA1 | ecaa6cabfc35fd2af8042337a95e445f485f9b91 |
SHA256 | fd8bff8b51288f136ebb29eece43d1ce048dcb43d6f5841e3819fca907f5cd06 |
SHA512 |
3d251f57e3501f5ba80a715a7cc1444e8618db6e7d9ca1ef282bc73c3054c6e7d44e43f97a5cb2064bfea291b948c6db80deb1abdb7d6db339c4cfa0214417f7
|
CRC32 | DB22C376 |
ssdeep | None |
Yara |
|
This file is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | June 30, 2025, 5:48 p.m. | June 30, 2025, 5:49 p.m. | 109 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-06-23 02:28:57,015 [analyzer] DEBUG: Starting analyzer from: C:\tmp4hzt0l 2025-06-23 02:28:57,015 [analyzer] DEBUG: Pipe server name: \??\PIPE\WhTdBUxaNVXzdLkouOWYLNrvq 2025-06-23 02:28:57,015 [analyzer] DEBUG: Log pipe server name: \??\PIPE\VPcEQDoibFqFPrEsJ 2025-06-23 02:28:57,296 [analyzer] DEBUG: Started auxiliary module Curtain 2025-06-23 02:28:57,296 [analyzer] DEBUG: Started auxiliary module DbgView 2025-06-23 02:28:57,750 [analyzer] DEBUG: Started auxiliary module Disguise 2025-06-23 02:28:57,953 [analyzer] DEBUG: Loaded monitor into process with pid 504 2025-06-23 02:28:57,967 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-06-23 02:28:57,967 [analyzer] DEBUG: Started auxiliary module Human 2025-06-23 02:28:57,967 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-06-23 02:28:57,967 [analyzer] DEBUG: Started auxiliary module Reboot 2025-06-23 02:28:58,046 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-06-23 02:28:58,046 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-06-23 02:28:58,062 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-06-23 02:28:58,062 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-06-23 02:28:58,187 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\fd8bff8b51288f136ebb29eece43d1ce048dcb43d6f5841e3819fca907f5cd06.exe' with arguments '' and pid 2900 2025-06-23 02:28:58,358 [analyzer] DEBUG: Loaded monitor into process with pid 2900 2025-06-23 02:28:58,421 [analyzer] INFO: Added new file to list with pid 2900 and path C:\ProgramData\AhnLab\AhnSvc.exe 2025-06-23 02:28:58,515 [analyzer] INFO: Injected into process with pid 1404 and name u'AhnSvc.exe' 2025-06-23 02:28:58,671 [analyzer] DEBUG: Loaded monitor into process with pid 1404 2025-06-23 02:28:58,733 [analyzer] INFO: Added pid 1404 for u'C:\\ProgramData\\AhnLab\\AhnSvc.exe' 2025-06-23 02:28:58,733 [analyzer] INFO: Added new file to list with pid 1404 and path C:\ProgramData\AhnLab\AhnSvc.exe 2025-06-23 02:29:27,187 [analyzer] INFO: Analysis timeout hit, terminating analysis. 2025-06-23 02:29:27,546 [analyzer] INFO: Terminating remaining processes before shutdown. 2025-06-23 02:29:27,546 [lib.api.process] INFO: Successfully terminated process with pid 2900. 2025-06-23 02:29:27,562 [lib.api.process] INFO: Successfully terminated process with pid 1404. 2025-06-23 02:29:27,562 [analyzer] INFO: Analysis completed.
2025-06-30 17:48:03,315 [cuckoo.core.scheduler] INFO: Task #6620413: acquired machine win7x6420 (label=win7x6420) 2025-06-30 17:48:03,316 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.220 for task #6620413 2025-06-30 17:48:03,609 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 3220650 (interface=vboxnet0, host=192.168.168.220) 2025-06-30 17:48:03,655 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x6420 2025-06-30 17:48:04,238 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x6420 to vmcloak 2025-06-30 17:48:29,663 [cuckoo.core.guest] INFO: Starting analysis #6620413 on guest (id=win7x6420, ip=192.168.168.220) 2025-06-30 17:48:30,673 [cuckoo.core.guest] DEBUG: win7x6420: not ready yet 2025-06-30 17:48:35,707 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x6420, ip=192.168.168.220) 2025-06-30 17:48:35,844 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x6420, ip=192.168.168.220, monitor=latest, size=6660546) 2025-06-30 17:48:37,254 [cuckoo.core.resultserver] DEBUG: Task #6620413: live log analysis.log initialized. 2025-06-30 17:48:38,164 [cuckoo.core.resultserver] DEBUG: Task #6620413 is sending a BSON stream 2025-06-30 17:48:38,554 [cuckoo.core.resultserver] DEBUG: Task #6620413 is sending a BSON stream 2025-06-30 17:48:38,867 [cuckoo.core.resultserver] DEBUG: Task #6620413 is sending a BSON stream 2025-06-30 17:48:39,574 [cuckoo.core.resultserver] DEBUG: Task #6620413: File upload for 'shots/0001.jpg' 2025-06-30 17:48:39,586 [cuckoo.core.resultserver] DEBUG: Task #6620413 uploaded file length: 133476 2025-06-30 17:48:51,871 [cuckoo.core.guest] DEBUG: win7x6420: analysis #6620413 still processing 2025-06-30 17:49:07,065 [cuckoo.core.guest] DEBUG: win7x6420: analysis #6620413 still processing 2025-06-30 17:49:07,801 [cuckoo.core.resultserver] DEBUG: Task #6620413: File upload for 'curtain/1750638567.42.curtain.log' 2025-06-30 17:49:07,822 [cuckoo.core.resultserver] DEBUG: Task #6620413 uploaded file length: 36 2025-06-30 17:49:07,832 [cuckoo.core.resultserver] DEBUG: Task #6620413: File upload for 'sysmon/1750638567.55.sysmon.xml' 2025-06-30 17:49:07,840 [cuckoo.core.resultserver] DEBUG: Task #6620413 uploaded file length: 796774 2025-06-30 17:49:07,847 [cuckoo.core.resultserver] DEBUG: Task #6620413: File upload for 'files/9ce3e5a16921bb4e_ahnsvc.exe_' 2025-06-30 17:49:07,849 [cuckoo.core.resultserver] DEBUG: Task #6620413: File upload for 'files/c60abe071eb0a2ed_ahnsvc.exe' 2025-06-30 17:49:07,851 [cuckoo.core.resultserver] DEBUG: Task #6620413 uploaded file length: 61554 2025-06-30 17:49:07,852 [cuckoo.core.resultserver] DEBUG: Task #6620413 uploaded file length: 61553 2025-06-30 17:49:08,531 [cuckoo.core.resultserver] DEBUG: Task #6620413 had connection reset for <Context for LOG> 2025-06-30 17:49:10,080 [cuckoo.core.guest] INFO: win7x6420: analysis completed successfully 2025-06-30 17:49:10,094 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-06-30 17:49:10,118 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-06-30 17:49:10,902 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x6420 to path /srv/cuckoo/cwd/storage/analyses/6620413/memory.dmp 2025-06-30 17:49:10,905 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x6420 2025-06-30 17:49:52,498 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.220 for task #6620413 2025-06-30 17:49:52,931 [cuckoo.core.scheduler] DEBUG: Released database task #6620413 2025-06-30 17:49:52,950 [cuckoo.core.scheduler] INFO: Task #6620413: analysis procedure completed
description | (no description) | rule | UPX | ||||||
description | The packer/protector section names/keywords | rule | suspicious_packer_section |
file | C:\ProgramData\AhnLab\AhnSvc.exe |
section | {u'size_of_data': u'0x0000d400', u'virtual_address': u'0x00018000', u'entropy': 7.968099260252522, u'name': u'UPX1', u'virtual_size': u'0x0000e000'} | entropy | 7.96809926025 | description | A section with a high entropy has been found | |||||||||
entropy | 0.990654205607 | description | Overall entropy of this PE file is high |
section | UPX0 | description | Section name indicates UPX | ||||||
section | UPX1 | description | Section name indicates UPX | ||||||
section | UPX2 | description | Section name indicates UPX |
reg_key | HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AhnUpadate | reg_value | "C:\ProgramData\AhnLab\AhnSvc.exe" /run |
G Data Antivirus (Windows) | Virus: Generic.Dacic.222C339A.A.B34E8ED8 (Engine A) |
Avast Core Security (Linux) | Win32:MalwareX-gen [Bd] |
C4S ClamAV (Linux) | Win.Spyware.Dacic-10032147-0 |
Trellix (Linux) | GenericRXKA-VV |
WithSecure (Linux) | Trojan.TR/Dropper.Gen |
eScan Antivirus (Linux) | Generic.Dacic.222C339A.A.B34E8ED8(DB) |
ESET Security (Windows) | Win32/Spy.Keydoor.AD trojan |
Sophos Anti-Virus (Linux) | Mal/Behav-031 |
DrWeb Antivirus (Linux) | Trojan.Siggen6.34441 |
ClamAV (Linux) | Win.Spyware.Dacic-10032147-0 |
Bitdefender Antivirus (Linux) | Generic.Dacic.222C339A.A.B34E8ED8 |
Kaspersky Standard (Windows) | Trojan.Win32.Scar.ojnn |
Emsisoft Commandline Scanner (Windows) | Generic.Dacic.222C339A.A.B34E8ED8 (B) |
Bkav | W32.AIDetectMalware |
tehtris | Generic.Malware |
Cynet | Malicious (score: 100) |
CAT-QuickHeal | Trojan.Dynamer.8881 |
Skyhigh | BehavesLike.Win32.Generic.kc |
ALYac | Generic.Dacic.222C339A.A.B34E8ED8 |
Cylance | Unsafe |
VIPRE | Generic.Dacic.222C339A.A.B34E8ED8 |
Sangfor | Suspicious.Win32.Save.a |
CrowdStrike | win/malicious_confidence_90% (D) |
BitDefender | Generic.Dacic.222C339A.A.B34E8ED8 |
K7GW | Spyware ( 00592b1f1 ) |
K7AntiVirus | Spyware ( 00592b1f1 ) |
Arcabit | Generic.Dacic.222C339A.A.B34E8ED8 |
Baidu | Win32.Trojan.Agent.avd |
VirIT | Trojan.Win32.SpyT.DZX |
Symantec | ML.Attribute.HighConfidence |
Elastic | malicious (moderate confidence) |
ESET-NOD32 | Win32/Spy.Keydoor.AD |
APEX | Malicious |
Avast | Win32:MalwareX-gen [Bd] |
ClamAV | Win.Spyware.Dacic-10032147-0 |
Kaspersky | Trojan.Win32.Scar.ojnn |
NANO-Antivirus | Trojan.Win32.TrjGen.drufdw |
SUPERAntiSpyware | Trojan.Agent/Gen-Dropper |
MicroWorld-eScan | Generic.Dacic.222C339A.A.B34E8ED8 |
Rising | Spyware.Keydoor!8.A45 (TFE:5:xukjg1PPwuQ) |
Emsisoft | Generic.Dacic.222C339A.A.B34E8ED8 (B) |
F-Secure | Trojan.TR/Dropper.Gen |
DrWeb | Trojan.Siggen6.34441 |
Zillya | Trojan.Scar.Win32.189251 |
TrendMicro | TrojanSpy.Win32.KEYDOOR.SM |
McAfeeD | Real Protect-LS!8A456BAA79F2 |
Trapmine | malicious.high.ml.score |
CTX | exe.unknown.dacic |
Sophos | Mal/Behav-031 |
SentinelOne | Static AI - Malicious PE |
Jiangmin | Trojan/Generic.beovz |
Webroot | W32.Trojan.Gen |
Detected | |
Avira | TR/Dropper.Gen |
Antiy-AVL | Trojan/Win32.Scar |
Kingsoft | malware.kb.b.994 |
Gridinsoft | Trojan.Win32.Agent.oa!s2 |
Xcitium | TrojWare.Win32.Spy.Keydoor.AA@82pvo3 |
Microsoft | Trojan:Win32/Phonzy.A!ml |
ZoneAlarm | Mal/Behav-031 |
GData | Generic.Dacic.222C339A.A.B34E8ED8 |
Varist | W32/Keydoor.D.gen!Eldorado |
AhnLab-V3 | Trojan/Win.Scar.R653421 |