Size | 85.7KB |
---|---|
Type | HTML document, Unicode text, UTF-8 text, with very long lines (1350) |
MD5 | 24ace09de53dd99342472ec5379dbb08 |
SHA1 | 20a36e401c3f8494d564e0fe35d4e32ce3bfd5a1 |
SHA256 | 8e3d76701d278fe4fc63e49ae937954d7d06f8358d7e0f123e4e3dc8d2ed450f |
SHA512 |
39a2f048e3377b1664b722db188d770f50a50c7c9b54d73a6d636a535165b3ac3f614d84b1bb1f0715ba9b41686729758a8a86e4677901a78e521a85a1029d2d
|
CRC32 | 97E08F69 |
ssdeep | None |
Yara | None matched |
This file is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | July 13, 2025, 6:58 a.m. | July 13, 2025, 7:01 a.m. | 171 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-07-08 23:00:21,030 [analyzer] DEBUG: Starting analyzer from: C:\tmp4w2pkt 2025-07-08 23:00:21,046 [analyzer] DEBUG: Pipe server name: \??\PIPE\hPATnCwfHTSMsOypbtNWGVJSkijwBMWm 2025-07-08 23:00:21,046 [analyzer] DEBUG: Log pipe server name: \??\PIPE\UpHguBIodZqFIiySJLILRxqgu 2025-07-08 23:00:21,312 [analyzer] DEBUG: Started auxiliary module Curtain 2025-07-08 23:00:21,312 [analyzer] DEBUG: Started auxiliary module DbgView 2025-07-08 23:00:21,796 [analyzer] DEBUG: Started auxiliary module Disguise 2025-07-08 23:00:22,030 [analyzer] DEBUG: Loaded monitor into process with pid 508 2025-07-08 23:00:22,030 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-07-08 23:00:22,030 [analyzer] DEBUG: Started auxiliary module Human 2025-07-08 23:00:22,030 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-07-08 23:00:22,046 [analyzer] DEBUG: Started auxiliary module Reboot 2025-07-08 23:00:22,203 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-07-08 23:00:22,203 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-07-08 23:00:22,203 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-07-08 23:00:22,203 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-07-08 23:00:22,203 [modules.packages.js] INFO: Submitted file is missing extension, added .js 2025-07-08 23:00:22,296 [lib.api.process] INFO: Successfully executed process from path 'C:\\Windows\\System32\\wscript.exe' with arguments [u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\8e3d76701d278fe4fc63e49ae937954d7d06f8358d7e0f123e4e3dc8d2ed450f.js'] and pid 1200 2025-07-08 23:00:22,515 [analyzer] DEBUG: Loaded monitor into process with pid 1200 2025-07-08 23:00:22,858 [analyzer] INFO: io=NULL 2025-07-08 23:00:22,858 [analyzer] DEBUG: Error resolving function jscript!ActiveXObjectFncObj_Construct through our custom callback. 2025-07-08 23:00:22,858 [analyzer] INFO: io=NULL 2025-07-08 23:00:22,858 [analyzer] DEBUG: Error resolving function jscript!COleScript_Compile through our custom callback. 2025-07-08 23:00:22,858 [analyzer] INFO: io=NULL 2025-07-08 23:00:22,875 [analyzer] DEBUG: Error resolving function jscript!Math_random through our custom callback. 2025-07-08 23:00:22,921 [analyzer] INFO: io=NULL 2025-07-08 23:00:22,921 [analyzer] DEBUG: Error resolving function jscript!ActiveXObjectFncObj_Construct through our custom callback. 2025-07-08 23:00:22,921 [analyzer] INFO: io=NULL 2025-07-08 23:00:22,921 [analyzer] DEBUG: Error resolving function jscript!COleScript_Compile through our custom callback. 2025-07-08 23:00:22,921 [analyzer] INFO: io=NULL 2025-07-08 23:00:22,921 [analyzer] DEBUG: Error resolving function jscript!Math_random through our custom callback. 2025-07-08 23:00:51,312 [analyzer] INFO: Analysis timeout hit, terminating analysis. 2025-07-08 23:00:51,717 [analyzer] INFO: Terminating remaining processes before shutdown. 2025-07-08 23:00:51,717 [lib.api.process] INFO: Successfully terminated process with pid 1200. 2025-07-08 23:00:51,717 [analyzer] INFO: Analysis completed.
2025-07-13 06:58:30,790 [cuckoo.core.scheduler] INFO: Task #6697059: acquired machine win7x6423 (label=win7x6423) 2025-07-13 06:58:30,792 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.223 for task #6697059 2025-07-13 06:58:31,069 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 3020556 (interface=vboxnet0, host=192.168.168.223) 2025-07-13 06:58:31,109 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x6423 2025-07-13 06:58:31,832 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x6423 to vmcloak 2025-07-13 06:59:24,912 [cuckoo.core.guest] INFO: Starting analysis #6697059 on guest (id=win7x6423, ip=192.168.168.223) 2025-07-13 06:59:25,919 [cuckoo.core.guest] DEBUG: win7x6423: not ready yet 2025-07-13 06:59:30,950 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x6423, ip=192.168.168.223) 2025-07-13 06:59:31,066 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x6423, ip=192.168.168.223, monitor=latest, size=6660546) 2025-07-13 06:59:32,640 [cuckoo.core.resultserver] DEBUG: Task #6697059: live log analysis.log initialized. 2025-07-13 06:59:33,620 [cuckoo.core.resultserver] DEBUG: Task #6697059 is sending a BSON stream 2025-07-13 06:59:34,026 [cuckoo.core.resultserver] DEBUG: Task #6697059 is sending a BSON stream 2025-07-13 06:59:34,970 [cuckoo.core.resultserver] DEBUG: Task #6697059: File upload for 'shots/0001.jpg' 2025-07-13 06:59:34,989 [cuckoo.core.resultserver] DEBUG: Task #6697059 uploaded file length: 133465 2025-07-13 06:59:36,110 [cuckoo.core.resultserver] DEBUG: Task #6697059: File upload for 'shots/0002.jpg' 2025-07-13 06:59:36,127 [cuckoo.core.resultserver] DEBUG: Task #6697059 uploaded file length: 137077 2025-07-13 06:59:47,255 [cuckoo.core.guest] DEBUG: win7x6423: analysis #6697059 still processing 2025-07-13 07:00:02,374 [cuckoo.core.guest] DEBUG: win7x6423: analysis #6697059 still processing 2025-07-13 07:00:03,211 [cuckoo.core.resultserver] DEBUG: Task #6697059: File upload for 'curtain/1752008451.55.curtain.log' 2025-07-13 07:00:03,214 [cuckoo.core.resultserver] DEBUG: Task #6697059 uploaded file length: 36 2025-07-13 07:00:03,380 [cuckoo.core.resultserver] DEBUG: Task #6697059: File upload for 'sysmon/1752008451.72.sysmon.xml' 2025-07-13 07:00:03,393 [cuckoo.core.resultserver] DEBUG: Task #6697059 uploaded file length: 1024806 2025-07-13 07:00:03,972 [cuckoo.core.resultserver] DEBUG: Task #6697059: File upload for 'shots/0003.jpg' 2025-07-13 07:00:03,988 [cuckoo.core.resultserver] DEBUG: Task #6697059 uploaded file length: 133465 2025-07-13 07:00:04,002 [cuckoo.core.resultserver] DEBUG: Task #6697059 had connection reset for <Context for LOG> 2025-07-13 07:00:05,389 [cuckoo.core.guest] INFO: win7x6423: analysis completed successfully 2025-07-13 07:00:05,462 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-07-13 07:00:05,492 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-07-13 07:00:06,402 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x6423 to path /srv/cuckoo/cwd/storage/analyses/6697059/memory.dmp 2025-07-13 07:00:06,420 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x6423 2025-07-13 07:01:21,287 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.223 for task #6697059 2025-07-13 07:01:21,667 [cuckoo.core.scheduler] DEBUG: Released database task #6697059 2025-07-13 07:01:21,691 [cuckoo.core.scheduler] INFO: Task #6697059: analysis procedure completed
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid |
G Data Antivirus (Windows) | Virus: JS:Trojan.Cryxos.5913 (Engine A) |
Avast Core Security (Linux) | Script:SNH-gen [Trj] |
Trellix (Linux) | JS/Downloader.fq trojan |
WithSecure (Linux) | Malware.HTML/ExpKit.Gen2 |
eScan Antivirus (Linux) | JS:Trojan.Cryxos.5913(DB) |
ESET Security (Windows) | JS/Kryptik.BPI trojan |
Sophos Anti-Virus (Linux) | Troj/JSDldr-YH |
DrWeb Antivirus (Linux) | JS.Inject.105 |
Bitdefender Antivirus (Linux) | JS:Trojan.Cryxos.5913 |
Emsisoft Commandline Scanner (Windows) | JS:Trojan.Cryxos.5913 (B) |
CTX | html.trojan.cryxos |
ALYac | JS:Trojan.Cryxos.5913 |
Sangfor | Malware.Generic-Script.Save.ma16 |
Symantec | Trojan.Malscript |
ESET-NOD32 | JS/Kryptik.BPI |
Cynet | Malicious (score: 99) |
Arcabit | JS:Trojan.Cryxos.D1719 |
NANO-Antivirus | Trojan.Script.Agent.jcntnx |
MicroWorld-eScan | JS:Trojan.Cryxos.5913 |
Rising | Trojan.Kryptik!8.8 (TOPIS:E0:vCwRpqLnqMM) |
Emsisoft | JS:Trojan.Cryxos.5913 (B) |
F-Secure | Malware.HTML/ExpKit.Gen2 |
DrWeb | JS.Inject.105 |
Zillya | Trojan.Kryptik.JS.26 |
Sophos | Troj/JSDldr-YH |
Ikarus | Trojan.JS.Crypt |
Detected | |
Avira | HTML/ExpKit.Gen2 |
Microsoft | Trojan:Script/Phonzy.A!ml |
ZoneAlarm | Troj/JSDldr-YH |
GData | JS:Trojan.Cryxos.5913 |
Varist | JS/Agent.AQO!Eldorado |
AhnLab-V3 | Trojan/HTML.Obfus.S1283 |
Tencent | Trojan.JS.Kryptik.504768 |
huorong | Trojan/JS.Obfuscated.p |
Fortinet | JS/Kryptik.BP!tr |