Size | 236.0KB |
---|---|
Type | PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed |
MD5 | 69782603fc1284fc9a96cecc491828c8 |
SHA1 | ae73b0716d276fae0a4d23add5004a036cad6feb |
SHA256 | 5439c19a73d2a825fafd384946d89ba31f0afac48eff196c0d6a3f496e8f2261 |
SHA512 |
44264a97ce9d9d37bfed96662f9710f411cc7fa353d8d5bb4b14b3fa1250c370b739840a78bb7ba3e94b4c5235e3a4a947c7f269c49970f4c05ab02facd7597d
|
CRC32 | 89D1ED32 |
ssdeep | None |
Yara |
|
This file is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | July 26, 2025, 4:53 p.m. | July 26, 2025, 4:56 p.m. | 144 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-07-25 22:47:47,000 [analyzer] DEBUG: Starting analyzer from: C:\tmpdrdvpd 2025-07-25 22:47:47,015 [analyzer] DEBUG: Pipe server name: \??\PIPE\GkiLcOKeNiaDNTWUzJCGqxwj 2025-07-25 22:47:47,015 [analyzer] DEBUG: Log pipe server name: \??\PIPE\RkOGTrVNKxpIohZTkV 2025-07-25 22:47:47,312 [analyzer] DEBUG: Started auxiliary module Curtain 2025-07-25 22:47:47,312 [analyzer] DEBUG: Started auxiliary module DbgView 2025-07-25 22:47:47,858 [analyzer] DEBUG: Started auxiliary module Disguise 2025-07-25 22:47:48,062 [analyzer] DEBUG: Loaded monitor into process with pid 508 2025-07-25 22:47:48,062 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-07-25 22:47:48,062 [analyzer] DEBUG: Started auxiliary module Human 2025-07-25 22:47:48,062 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-07-25 22:47:48,062 [analyzer] DEBUG: Started auxiliary module Reboot 2025-07-25 22:47:48,108 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-07-25 22:47:48,108 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-07-25 22:47:48,108 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-07-25 22:47:48,108 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-07-25 22:47:48,233 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\5439c19a73d2a825fafd384946d89ba31f0afac48eff196c0d6a3f496e8f2261.exe' with arguments '' and pid 1920 2025-07-25 22:47:48,483 [analyzer] DEBUG: Loaded monitor into process with pid 1920 2025-07-25 22:47:48,500 [analyzer] INFO: Added new file to list with pid 1920 and path C:\Users\Administrator\AppData\Local\Temp\rifaien2-VHodu9Aqre17aeHl.exe 2025-07-25 22:48:17,250 [analyzer] INFO: Analysis timeout hit, terminating analysis. 2025-07-25 22:48:17,703 [analyzer] INFO: Terminating remaining processes before shutdown. 2025-07-25 22:48:17,703 [lib.api.process] INFO: Successfully terminated process with pid 1920. 2025-07-25 22:48:17,717 [analyzer] INFO: Analysis completed.
2025-07-26 16:53:39,622 [cuckoo.core.scheduler] INFO: Task #6766155: acquired machine win7x6412 (label=win7x6412) 2025-07-26 16:53:39,623 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.212 for task #6766155 2025-07-26 16:53:40,022 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 3187103 (interface=vboxnet0, host=192.168.168.212) 2025-07-26 16:53:40,236 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x6412 2025-07-26 16:53:41,419 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x6412 to vmcloak 2025-07-26 16:54:31,968 [cuckoo.core.guest] INFO: Starting analysis #6766155 on guest (id=win7x6412, ip=192.168.168.212) 2025-07-26 16:54:32,974 [cuckoo.core.guest] DEBUG: win7x6412: not ready yet 2025-07-26 16:54:38,004 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x6412, ip=192.168.168.212) 2025-07-26 16:54:38,099 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x6412, ip=192.168.168.212, monitor=latest, size=6660546) 2025-07-26 16:54:39,494 [cuckoo.core.resultserver] DEBUG: Task #6766155: live log analysis.log initialized. 2025-07-26 16:54:40,505 [cuckoo.core.resultserver] DEBUG: Task #6766155 is sending a BSON stream 2025-07-26 16:54:40,895 [cuckoo.core.resultserver] DEBUG: Task #6766155 is sending a BSON stream 2025-07-26 16:54:41,770 [cuckoo.core.resultserver] DEBUG: Task #6766155: File upload for 'shots/0001.jpg' 2025-07-26 16:54:41,789 [cuckoo.core.resultserver] DEBUG: Task #6766155 uploaded file length: 134076 2025-07-26 16:54:54,111 [cuckoo.core.guest] DEBUG: win7x6412: analysis #6766155 still processing 2025-07-26 16:55:09,220 [cuckoo.core.guest] DEBUG: win7x6412: analysis #6766155 still processing 2025-07-26 16:55:10,021 [cuckoo.core.resultserver] DEBUG: Task #6766155: File upload for 'curtain/1753476497.48.curtain.log' 2025-07-26 16:55:10,026 [cuckoo.core.resultserver] DEBUG: Task #6766155 uploaded file length: 36 2025-07-26 16:55:10,203 [cuckoo.core.resultserver] DEBUG: Task #6766155: File upload for 'sysmon/1753476497.69.sysmon.xml' 2025-07-26 16:55:10,214 [cuckoo.core.resultserver] DEBUG: Task #6766155 uploaded file length: 868252 2025-07-26 16:55:10,220 [cuckoo.core.resultserver] DEBUG: Task #6766155: File upload for 'files/583a4aec22071db4_rifaien2-vhodu9aqre17aehl.exe' 2025-07-26 16:55:10,227 [cuckoo.core.resultserver] DEBUG: Task #6766155 uploaded file length: 241664 2025-07-26 16:55:10,957 [cuckoo.core.resultserver] DEBUG: Task #6766155: File upload for 'shots/0002.jpg' 2025-07-26 16:55:10,968 [cuckoo.core.resultserver] DEBUG: Task #6766155 uploaded file length: 133491 2025-07-26 16:55:10,983 [cuckoo.core.resultserver] DEBUG: Task #6766155 had connection reset for <Context for LOG> 2025-07-26 16:55:12,238 [cuckoo.core.guest] INFO: win7x6412: analysis completed successfully 2025-07-26 16:55:12,252 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-07-26 16:55:12,292 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-07-26 16:55:13,742 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x6412 to path /srv/cuckoo/cwd/storage/analyses/6766155/memory.dmp 2025-07-26 16:55:13,743 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x6412 2025-07-26 16:56:03,388 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.212 for task #6766155 2025-07-26 16:56:03,760 [cuckoo.core.scheduler] DEBUG: Released database task #6766155 2025-07-26 16:56:03,778 [cuckoo.core.scheduler] INFO: Task #6766155: analysis procedure completed
description | (no description) | rule | UPX | ||||||
description | The packer/protector section names/keywords | rule | suspicious_packer_section | ||||||
description | Listen for incoming communication | rule | network_tcp_listen | ||||||
description | Communications over RAW socket | rule | network_tcp_socket | ||||||
description | Communications use DNS | rule | network_dns |
file | C:\Users\Administrator\AppData\Local\Temp\rifaien2-VHodu9Aqre17aeHl.exe |
file | C:\Users\Administrator\AppData\Local\Temp\rifaien2-VHodu9Aqre17aeHl.exe |
section | UPX0 | description | Section name indicates UPX | ||||||
section | UPX1 | description | Section name indicates UPX | ||||||
section | UPX2 | description | Section name indicates UPX |
buffer | Buffer with sha1: 4dfe977ec631ed7ab2a028bb20414cf79fe87a13 |
suricata | ETPRO MALWARE Win32/Snojan Variant Uploading EXE |
suricata | ET INFO Generic HTTP EXE Upload Outbound |
G Data Antivirus (Windows) | Virus: Trojan.Agent.CYZT (Engine A) |
Avast Core Security (Linux) | Win32:Banker-LAA [Trj] |
C4S ClamAV (Linux) | Win.Malware.Cymt-10023133-0 |
WithSecure (Linux) | Trojan.TR/Agent.qasng |
eScan Antivirus (Linux) | Trojan.Agent.CYZT(DB) |
ESET Security (Windows) | a variant of Win32/Agent.AAEF trojan |
Sophos Anti-Virus (Linux) | Troj/Bdoor-BHD |
ClamAV (Linux) | Win.Malware.Cymt-10023133-0 |
Bitdefender Antivirus (Linux) | Trojan.Agent.CYZT |
Kaspersky Standard (Windows) | HEUR:Flooder.Win32.CoreWarrior.a |
Emsisoft Commandline Scanner (Windows) | Trojan.Agent.CYZT (B) |
Bkav | W32.AIDetectMalware |
Cynet | Malicious (score: 100) |
CAT-QuickHeal | Trojan.GenericPMF.S33900397 |
Skyhigh | BehavesLike.Win32.NemucodDownloader.dt |
ALYac | Trojan.Agent.CYZT |
Cylance | Unsafe |
VIPRE | Trojan.Agent.CYZT |
Sangfor | Trojan.Win32.Save.a |
CrowdStrike | win/malicious_confidence_100% (D) |
BitDefender | Trojan.Agent.CYZT |
K7GW | Trojan ( 004bcce41 ) |
K7AntiVirus | Trojan ( 004bcce41 ) |
Arcabit | Trojan.Agent.CYZT |
VirIT | Trojan.Win32.AgentT.LM |
Symantec | Trojan.Downloader!g2 |
Elastic | malicious (moderate confidence) |
ESET-NOD32 | a variant of Win32/Agent.AAEF |
APEX | Malicious |
Avast | Win32:Banker-LAA [Trj] |
ClamAV | Win.Malware.Cymt-10023133-0 |
Kaspersky | HEUR:Flooder.Win32.CoreWarrior.a |
NANO-Antivirus | Trojan.Win32.Snojan.jqzopm |
MicroWorld-eScan | Trojan.Agent.CYZT |
Rising | Trojan.Agent!1.B576 (CLASSIC) |
Emsisoft | Trojan.Agent.CYZT (B) |
F-Secure | Trojan.TR/Agent.qasng |
DrWeb | Tool.Snojan.1 |
Zillya | Trojan.GenericKD.Win32.100891 |
McAfeeD | ti!5439C19A73D2 |
Trapmine | suspicious.low.ml.score |
CTX | exe.trojan.cyzt |
Sophos | Troj/Bdoor-BHD |
SentinelOne | Static AI - Malicious PE |
Jiangmin | Downloader.Snojan.adp |
Webroot | W32.Malware.gen |
Detected | |
Avira | TR/Agent.qasng |
Antiy-AVL | RiskWare[Downloader]/Win32.Snojan |
Kingsoft | malware.kb.a.996 |
Gridinsoft | Trojan.Win32.Agent.oa!s1 |
Xcitium | TrojWare.Win32.Snojan.B@7h1cjp |
Microsoft | TrojanDownloader:Win32/Nemucod |
ZoneAlarm | Troj/Bdoor-BHD |
GData | Trojan.Agent.CYZT |
Varist | W32/Trojan.AHVI-3908 |
AhnLab-V3 | Downloader/Win.Nemucod.R658392 |
VBA32 | Flooder.CoreWarrior |
DeepInstinct | MALICIOUS |
Malwarebytes | Generic.Trojan.Malicious.DDS |
Ikarus | Trojan.Agent |