File 8e3d76701d278fe4fc63e49ae937954d7d06f8358d7e0f123e4e3dc8d2ed450f

Size 85.7KB
Type HTML document, Unicode text, UTF-8 text, with very long lines (1350)
MD5 24ace09de53dd99342472ec5379dbb08
SHA1 20a36e401c3f8494d564e0fe35d4e32ce3bfd5a1
SHA256 8e3d76701d278fe4fc63e49ae937954d7d06f8358d7e0f123e4e3dc8d2ed450f
SHA512
39a2f048e3377b1664b722db188d770f50a50c7c9b54d73a6d636a535165b3ac3f614d84b1bb1f0715ba9b41686729758a8a86e4677901a78e521a85a1029d2d
CRC32 97E08F69
ssdeep None
Yara None matched

Score

This file is very suspicious, with a score of 10 out of 10!

Please notice: The scoring system is currently still in development and should be considered an alpha feature.


Feedback

Expecting different results? Send us this analysis and we will inspect it. Click here

Information on Execution

Analysis
Category Started Completed Duration Routing Logs
FILE July 13, 2025, 6:58 a.m. July 13, 2025, 7:01 a.m. 171 seconds internet Show Analyzer Log
Show Cuckoo Log

Analyzer Log

2025-07-08 23:00:21,030 [analyzer] DEBUG: Starting analyzer from: C:\tmp4w2pkt
2025-07-08 23:00:21,046 [analyzer] DEBUG: Pipe server name: \??\PIPE\hPATnCwfHTSMsOypbtNWGVJSkijwBMWm
2025-07-08 23:00:21,046 [analyzer] DEBUG: Log pipe server name: \??\PIPE\UpHguBIodZqFIiySJLILRxqgu
2025-07-08 23:00:21,312 [analyzer] DEBUG: Started auxiliary module Curtain
2025-07-08 23:00:21,312 [analyzer] DEBUG: Started auxiliary module DbgView
2025-07-08 23:00:21,796 [analyzer] DEBUG: Started auxiliary module Disguise
2025-07-08 23:00:22,030 [analyzer] DEBUG: Loaded monitor into process with pid 508
2025-07-08 23:00:22,030 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets
2025-07-08 23:00:22,030 [analyzer] DEBUG: Started auxiliary module Human
2025-07-08 23:00:22,030 [analyzer] DEBUG: Started auxiliary module InstallCertificate
2025-07-08 23:00:22,046 [analyzer] DEBUG: Started auxiliary module Reboot
2025-07-08 23:00:22,203 [analyzer] DEBUG: Started auxiliary module RecentFiles
2025-07-08 23:00:22,203 [analyzer] DEBUG: Started auxiliary module Screenshots
2025-07-08 23:00:22,203 [analyzer] DEBUG: Started auxiliary module Sysmon
2025-07-08 23:00:22,203 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n
2025-07-08 23:00:22,203 [modules.packages.js] INFO: Submitted file is missing extension, added .js
2025-07-08 23:00:22,296 [lib.api.process] INFO: Successfully executed process from path 'C:\\Windows\\System32\\wscript.exe' with arguments [u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\8e3d76701d278fe4fc63e49ae937954d7d06f8358d7e0f123e4e3dc8d2ed450f.js'] and pid 1200
2025-07-08 23:00:22,515 [analyzer] DEBUG: Loaded monitor into process with pid 1200
2025-07-08 23:00:22,858 [analyzer] INFO: io=NULL
2025-07-08 23:00:22,858 [analyzer] DEBUG: Error resolving function jscript!ActiveXObjectFncObj_Construct through our custom callback.
2025-07-08 23:00:22,858 [analyzer] INFO: io=NULL
2025-07-08 23:00:22,858 [analyzer] DEBUG: Error resolving function jscript!COleScript_Compile through our custom callback.
2025-07-08 23:00:22,858 [analyzer] INFO: io=NULL
2025-07-08 23:00:22,875 [analyzer] DEBUG: Error resolving function jscript!Math_random through our custom callback.
2025-07-08 23:00:22,921 [analyzer] INFO: io=NULL
2025-07-08 23:00:22,921 [analyzer] DEBUG: Error resolving function jscript!ActiveXObjectFncObj_Construct through our custom callback.
2025-07-08 23:00:22,921 [analyzer] INFO: io=NULL
2025-07-08 23:00:22,921 [analyzer] DEBUG: Error resolving function jscript!COleScript_Compile through our custom callback.
2025-07-08 23:00:22,921 [analyzer] INFO: io=NULL
2025-07-08 23:00:22,921 [analyzer] DEBUG: Error resolving function jscript!Math_random through our custom callback.
2025-07-08 23:00:51,312 [analyzer] INFO: Analysis timeout hit, terminating analysis.
2025-07-08 23:00:51,717 [analyzer] INFO: Terminating remaining processes before shutdown.
2025-07-08 23:00:51,717 [lib.api.process] INFO: Successfully terminated process with pid 1200.
2025-07-08 23:00:51,717 [analyzer] INFO: Analysis completed.

Cuckoo Log

2025-07-13 06:58:30,790 [cuckoo.core.scheduler] INFO: Task #6697059: acquired machine win7x6423 (label=win7x6423)
2025-07-13 06:58:30,792 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.223 for task #6697059
2025-07-13 06:58:31,069 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 3020556 (interface=vboxnet0, host=192.168.168.223)
2025-07-13 06:58:31,109 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x6423
2025-07-13 06:58:31,832 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x6423 to vmcloak
2025-07-13 06:59:24,912 [cuckoo.core.guest] INFO: Starting analysis #6697059 on guest (id=win7x6423, ip=192.168.168.223)
2025-07-13 06:59:25,919 [cuckoo.core.guest] DEBUG: win7x6423: not ready yet
2025-07-13 06:59:30,950 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x6423, ip=192.168.168.223)
2025-07-13 06:59:31,066 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x6423, ip=192.168.168.223, monitor=latest, size=6660546)
2025-07-13 06:59:32,640 [cuckoo.core.resultserver] DEBUG: Task #6697059: live log analysis.log initialized.
2025-07-13 06:59:33,620 [cuckoo.core.resultserver] DEBUG: Task #6697059 is sending a BSON stream
2025-07-13 06:59:34,026 [cuckoo.core.resultserver] DEBUG: Task #6697059 is sending a BSON stream
2025-07-13 06:59:34,970 [cuckoo.core.resultserver] DEBUG: Task #6697059: File upload for 'shots/0001.jpg'
2025-07-13 06:59:34,989 [cuckoo.core.resultserver] DEBUG: Task #6697059 uploaded file length: 133465
2025-07-13 06:59:36,110 [cuckoo.core.resultserver] DEBUG: Task #6697059: File upload for 'shots/0002.jpg'
2025-07-13 06:59:36,127 [cuckoo.core.resultserver] DEBUG: Task #6697059 uploaded file length: 137077
2025-07-13 06:59:47,255 [cuckoo.core.guest] DEBUG: win7x6423: analysis #6697059 still processing
2025-07-13 07:00:02,374 [cuckoo.core.guest] DEBUG: win7x6423: analysis #6697059 still processing
2025-07-13 07:00:03,211 [cuckoo.core.resultserver] DEBUG: Task #6697059: File upload for 'curtain/1752008451.55.curtain.log'
2025-07-13 07:00:03,214 [cuckoo.core.resultserver] DEBUG: Task #6697059 uploaded file length: 36
2025-07-13 07:00:03,380 [cuckoo.core.resultserver] DEBUG: Task #6697059: File upload for 'sysmon/1752008451.72.sysmon.xml'
2025-07-13 07:00:03,393 [cuckoo.core.resultserver] DEBUG: Task #6697059 uploaded file length: 1024806
2025-07-13 07:00:03,972 [cuckoo.core.resultserver] DEBUG: Task #6697059: File upload for 'shots/0003.jpg'
2025-07-13 07:00:03,988 [cuckoo.core.resultserver] DEBUG: Task #6697059 uploaded file length: 133465
2025-07-13 07:00:04,002 [cuckoo.core.resultserver] DEBUG: Task #6697059 had connection reset for <Context for LOG>
2025-07-13 07:00:05,389 [cuckoo.core.guest] INFO: win7x6423: analysis completed successfully
2025-07-13 07:00:05,462 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks
2025-07-13 07:00:05,492 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer
2025-07-13 07:00:06,402 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x6423 to path /srv/cuckoo/cwd/storage/analyses/6697059/memory.dmp
2025-07-13 07:00:06,420 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x6423
2025-07-13 07:01:21,287 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.223 for task #6697059
2025-07-13 07:01:21,667 [cuckoo.core.scheduler] DEBUG: Released database task #6697059
2025-07-13 07:01:21,691 [cuckoo.core.scheduler] INFO: Task #6697059: analysis procedure completed

Signatures

Collects information to fingerprint the system (MachineGuid, DigitalProductId, SystemBiosDate) (1 event)
registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid
File has been identified by 10 AntiVirus engine on IRMA as malicious (10 events)
G Data Antivirus (Windows) Virus: JS:Trojan.Cryxos.5913 (Engine A)
Avast Core Security (Linux) Script:SNH-gen [Trj]
Trellix (Linux) JS/Downloader.fq trojan
WithSecure (Linux) Malware.HTML/ExpKit.Gen2
eScan Antivirus (Linux) JS:Trojan.Cryxos.5913(DB)
ESET Security (Windows) JS/Kryptik.BPI trojan
Sophos Anti-Virus (Linux) Troj/JSDldr-YH
DrWeb Antivirus (Linux) JS.Inject.105
Bitdefender Antivirus (Linux) JS:Trojan.Cryxos.5913
Emsisoft Commandline Scanner (Windows) JS:Trojan.Cryxos.5913 (B)
File has been identified by 26 AntiVirus engines on VirusTotal as malicious (26 events)
CTX html.trojan.cryxos
ALYac JS:Trojan.Cryxos.5913
Sangfor Malware.Generic-Script.Save.ma16
Symantec Trojan.Malscript
ESET-NOD32 JS/Kryptik.BPI
Cynet Malicious (score: 99)
Arcabit JS:Trojan.Cryxos.D1719
NANO-Antivirus Trojan.Script.Agent.jcntnx
MicroWorld-eScan JS:Trojan.Cryxos.5913
Rising Trojan.Kryptik!8.8 (TOPIS:E0:vCwRpqLnqMM)
Emsisoft JS:Trojan.Cryxos.5913 (B)
F-Secure Malware.HTML/ExpKit.Gen2
DrWeb JS.Inject.105
Zillya Trojan.Kryptik.JS.26
Sophos Troj/JSDldr-YH
Ikarus Trojan.JS.Crypt
Google Detected
Avira HTML/ExpKit.Gen2
Microsoft Trojan:Script/Phonzy.A!ml
ZoneAlarm Troj/JSDldr-YH
GData JS:Trojan.Cryxos.5913
Varist JS/Agent.AQO!Eldorado
AhnLab-V3 Trojan/HTML.Obfus.S1283
Tencent Trojan.JS.Kryptik.504768
huorong Trojan/JS.Obfuscated.p
Fortinet JS/Kryptik.BP!tr
Screenshots
Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action VT Location
No hosts contacted.
Cuckoo

We're processing your submission... This could take a few seconds.