Size | 65.4KB |
---|---|
Type | PE32 executable (GUI) Intel 80386, for MS Windows, PECompact2 compressed |
MD5 | ac3e04b97ff223a31acbb58b42449d83 |
SHA1 | 71c22f84f73fb7fee68555155c63f1c8ae3f6411 |
SHA256 | 341b632eb1fc1925c3f3423d2a8c0b66c12670746a045e48e7a6f72649c773fe |
SHA512 |
256de36e6989530ec4778667ba6583c73e7f506c4f9666915d038aae29182f80db259a73b27e98c5072826b8ef4166352a038f1e49085feda923bda6abffb08a
|
CRC32 | FC590FED |
ssdeep | None |
Yara |
|
This file is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | June 30, 2025, 5:53 p.m. | June 30, 2025, 5:54 p.m. | 94 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-06-23 02:41:41,030 [analyzer] DEBUG: Starting analyzer from: C:\tmpk4d6bl 2025-06-23 02:41:41,030 [analyzer] DEBUG: Pipe server name: \??\PIPE\gsVtAPyFzeHZgzZcfAjnwbsJxds 2025-06-23 02:41:41,030 [analyzer] DEBUG: Log pipe server name: \??\PIPE\LOOXzuCYMXjcBWETMFiIWjCPZOW 2025-06-23 02:41:41,390 [analyzer] DEBUG: Started auxiliary module Curtain 2025-06-23 02:41:41,390 [analyzer] DEBUG: Started auxiliary module DbgView 2025-06-23 02:41:41,905 [analyzer] DEBUG: Started auxiliary module Disguise 2025-06-23 02:41:42,092 [analyzer] DEBUG: Loaded monitor into process with pid 512 2025-06-23 02:41:42,092 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-06-23 02:41:42,092 [analyzer] DEBUG: Started auxiliary module Human 2025-06-23 02:41:42,092 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-06-23 02:41:42,108 [analyzer] DEBUG: Started auxiliary module Reboot 2025-06-23 02:41:42,203 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-06-23 02:41:42,203 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-06-23 02:41:42,203 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-06-23 02:41:42,203 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-06-23 02:41:42,375 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\341b632eb1fc1925c3f3423d2a8c0b66c12670746a045e48e7a6f72649c773fe.exe' with arguments '' and pid 1576 2025-06-23 02:41:42,546 [analyzer] DEBUG: Loaded monitor into process with pid 1576 2025-06-23 02:41:43,375 [analyzer] INFO: Process with pid 1576 has terminated 2025-06-23 02:41:43,375 [analyzer] INFO: Process list is empty, terminating analysis. 2025-06-23 02:41:44,562 [analyzer] INFO: Terminating remaining processes before shutdown. 2025-06-23 02:41:44,562 [analyzer] INFO: Analysis completed.
2025-06-30 17:53:14,528 [cuckoo.core.scheduler] INFO: Task #6620441: acquired machine win7x6422 (label=win7x6422) 2025-06-30 17:53:14,529 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.222 for task #6620441 2025-06-30 17:53:14,815 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 3229814 (interface=vboxnet0, host=192.168.168.222) 2025-06-30 17:53:14,866 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x6422 2025-06-30 17:53:15,397 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x6422 to vmcloak 2025-06-30 17:53:56,230 [cuckoo.core.guest] INFO: Starting analysis #6620441 on guest (id=win7x6422, ip=192.168.168.222) 2025-06-30 17:53:57,373 [cuckoo.core.guest] DEBUG: win7x6422: not ready yet 2025-06-30 17:54:02,413 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x6422, ip=192.168.168.222) 2025-06-30 17:54:02,477 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x6422, ip=192.168.168.222, monitor=latest, size=6660546) 2025-06-30 17:54:03,834 [cuckoo.core.resultserver] DEBUG: Task #6620441: live log analysis.log initialized. 2025-06-30 17:54:04,841 [cuckoo.core.resultserver] DEBUG: Task #6620441 is sending a BSON stream 2025-06-30 17:54:05,290 [cuckoo.core.resultserver] DEBUG: Task #6620441 is sending a BSON stream 2025-06-30 17:54:06,153 [cuckoo.core.resultserver] DEBUG: Task #6620441: File upload for 'shots/0001.jpg' 2025-06-30 17:54:06,190 [cuckoo.core.resultserver] DEBUG: Task #6620441 uploaded file length: 133464 2025-06-30 17:54:07,286 [cuckoo.core.resultserver] DEBUG: Task #6620441: File upload for 'curtain/1750639304.47.curtain.log' 2025-06-30 17:54:07,289 [cuckoo.core.resultserver] DEBUG: Task #6620441 uploaded file length: 36 2025-06-30 17:54:07,369 [cuckoo.core.resultserver] DEBUG: Task #6620441: File upload for 'sysmon/1750639304.56.sysmon.xml' 2025-06-30 17:54:07,375 [cuckoo.core.resultserver] DEBUG: Task #6620441 uploaded file length: 163878 2025-06-30 17:54:08,262 [cuckoo.core.resultserver] DEBUG: Task #6620441 had connection reset for <Context for LOG> 2025-06-30 17:54:09,391 [cuckoo.core.guest] INFO: win7x6422: analysis completed successfully 2025-06-30 17:54:09,417 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-06-30 17:54:09,452 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-06-30 17:54:10,239 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x6422 to path /srv/cuckoo/cwd/storage/analyses/6620441/memory.dmp 2025-06-30 17:54:10,241 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x6422 2025-06-30 17:54:48,308 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.222 for task #6620441 2025-06-30 17:54:48,700 [cuckoo.core.scheduler] DEBUG: Released database task #6620441 2025-06-30 17:54:48,717 [cuckoo.core.scheduler] INFO: Task #6620441: analysis procedure completed
description | The packer/protector section names/keywords | rule | suspicious_packer_section |
packer | PECompact 2.xx --> BitSum Technologies |
section | {u'size_of_data': u'0x0000c600', u'virtual_address': u'0x00001000', u'entropy': 7.996272003769068, u'name': u'.text', u'virtual_size': u'0x0002e000'} | entropy | 7.99627200377 | description | A section with a high entropy has been found | |||||||||
section | {u'size_of_data': u'0x00002000', u'virtual_address': u'0x0002f000', u'entropy': 7.547695357338245, u'name': u'.rsrc', u'virtual_size': u'0x00002000'} | entropy | 7.54769535734 | description | A section with a high entropy has been found | |||||||||
entropy | 1.0 | description | Overall entropy of this PE file is high |
G Data Antivirus (Windows) | Virus: Trojan.Agent.EVKN (Engine A) |
Avast Core Security (Linux) | Win32:Evo-gen [Trj] |
C4S ClamAV (Linux) | Win.Malware.Swisyn-6911464-0 |
Trellix (Linux) | W32/Swisyn.ag virus |
WithSecure (Linux) | Trojan.TR/Crypt.XPACK.Gen |
eScan Antivirus (Linux) | Trojan.Agent.EVKN(DB) |
ESET Security (Windows) | Win32/VB.OSK trojan |
Sophos Anti-Virus (Linux) | Troj/VB-JVT |
DrWeb Antivirus (Linux) | Trojan.Siggen6.54687 |
ClamAV (Linux) | Win.Malware.Swisyn-6911464-0 |
Bitdefender Antivirus (Linux) | Trojan.Agent.EVKN |
Kaspersky Standard (Windows) | Trojan.Win32.Swisyn.bner |
Emsisoft Commandline Scanner (Windows) | Trojan.Agent.EVKN (B) |
Bkav | W32.AIDetectMalware |
Cynet | Malicious (score: 100) |
Skyhigh | BehavesLike.Win32.SwisynTrojan.kc |
ALYac | Trojan.Agent.EVKN |
Cylance | Unsafe |
VIPRE | Trojan.Agent.EVKN |
Sangfor | Suspicious.Win32.Save.a |
CrowdStrike | win/malicious_confidence_100% (D) |
BitDefender | Trojan.Agent.EVKN |
Arcabit | Trojan.Agent.EVKN |
VirIT | Trojan.Win32.GenX.AD |
Symantec | W32.Gosys |
Elastic | malicious (high confidence) |
ESET-NOD32 | Win32/VB.OSK |
APEX | Malicious |
Avast | Win32:Evo-gen [Trj] |
ClamAV | Win.Malware.Swisyn-6911464-0 |
Kaspersky | Trojan.Win32.Swisyn.bner |
NANO-Antivirus | Trojan.Win32.Swisyn.fouerd |
MicroWorld-eScan | Trojan.Agent.EVKN |
Rising | Trojan.VB!8.B20 (TFE:3:Br4o3idVygG) |
Emsisoft | Trojan.Agent.EVKN (B) |
F-Secure | Trojan.TR/Crypt.XPACK.Gen |
DrWeb | Trojan.Siggen6.54687 |
Zillya | Trojan.Swisyn.Win32.35153 |
McAfeeD | Real Protect-LS!AC3E04B97FF2 |
Trapmine | malicious.moderate.ml.score |
CTX | exe.trojan.evkn |
Sophos | Troj/VB-JVT |
SentinelOne | Static AI - Malicious PE |
Jiangmin | Trojan/PSW.Lmir.dah |
Webroot | W32.Trojan.Gen |
Detected | |
Avira | TR/Crypt.XPACK.Gen |
Antiy-AVL | Trojan/Win32.Swisyn |
Kingsoft | malware.kb.a.1000 |
Gridinsoft | Ransom.Win32.Zbot.oa!s1 |
Xcitium | TrojWare.Win32.Trojan.XPACK.Gen@2ho5ur |
Microsoft | PWS:Win32/Zbot!ml |
ZoneAlarm | Troj/VB-JVT |
GData | Win32.Trojan.PSE.1249DSV |
Varist | W32/Trojan.CPXN-1141 |
AhnLab-V3 | Trojan/Win32.Swisyn.R262946 |
VBA32 | Trojan.VB.01049 |
DeepInstinct | MALICIOUS |
Malwarebytes | Generic.Malware.AI.DDS |
Ikarus | Trojan.Win32.Delf |
Panda | Trj/Genetic.gen |
Tencent | OB:Trojan.Win32.Swisyn.ca |
TrellixENS | W32/Swisyn.ag |