Size | 58.8KB |
---|---|
Type | PE32+ executable (console) x86-64, for MS Windows |
MD5 | 72b9db77017d035d26fc4ca3ad478ce8 |
SHA1 | 841b6164988f304c4be89fc6f6d785f5c1fcdf4d |
SHA256 | 7c5b4b86ecbd3258f245a8b83af28d841918ebf79811156be1325c499a034ce1 |
SHA512 |
2167182af306b2581403811181fa0e773e1b73ffa0d468775f7606ca2a9d3d63a66c903f19b61bf662e5ecaa4186e72b60d803ae6d0dec2bda9b91c8b6a2a161
|
CRC32 | ECA126CF |
ssdeep | None |
PDB Path | C:\Users\Utilizador\Desktop\Testingvulnerabilities\x64\Release\Testingvulnerabilities.pdb |
Yara |
|
This file is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | Aug. 28, 2025, 4:52 p.m. | Aug. 28, 2025, 4:53 p.m. | 31 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-08-26 16:59:24,015 [analyzer] DEBUG: Starting analyzer from: C:\tmpzepe2z 2025-08-26 16:59:24,015 [analyzer] DEBUG: Pipe server name: \??\PIPE\BbphqjQskolyHhjasaeowwqBmlDbOBSn 2025-08-26 16:59:24,015 [analyzer] DEBUG: Log pipe server name: \??\PIPE\DIVuVPJpAdHAHXNY 2025-08-26 16:59:24,296 [analyzer] DEBUG: Started auxiliary module Curtain 2025-08-26 16:59:24,296 [analyzer] DEBUG: Started auxiliary module DbgView 2025-08-26 16:59:24,687 [analyzer] DEBUG: Started auxiliary module Disguise 2025-08-26 16:59:24,905 [analyzer] DEBUG: Loaded monitor into process with pid 504 2025-08-26 16:59:24,905 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-08-26 16:59:24,905 [analyzer] DEBUG: Started auxiliary module Human 2025-08-26 16:59:24,905 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-08-26 16:59:24,905 [analyzer] DEBUG: Started auxiliary module Reboot 2025-08-26 16:59:25,030 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-08-26 16:59:25,030 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-08-26 16:59:25,030 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-08-26 16:59:25,030 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-08-26 16:59:25,125 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\7c5b4b86ecbd3258f245a8b83af28d841918ebf79811156be1325c499a034ce1.exe' with arguments '' and pid 1760 2025-08-26 16:59:26,140 [analyzer] INFO: Process with pid 1760 has terminated 2025-08-26 16:59:26,140 [analyzer] INFO: Process list is empty, terminating analysis. 2025-08-26 16:59:27,375 [analyzer] INFO: Terminating remaining processes before shutdown. 2025-08-26 16:59:27,375 [analyzer] INFO: Analysis completed.
2025-08-28 16:52:38,787 [cuckoo.core.scheduler] INFO: Task #6920090: acquired machine win7x6417 (label=win7x6417) 2025-08-28 16:52:38,788 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.217 for task #6920090 2025-08-28 16:52:39,019 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 2700933 (interface=vboxnet0, host=192.168.168.217) 2025-08-28 16:52:39,113 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x6417 2025-08-28 16:52:39,533 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x6417 to vmcloak 2025-08-28 16:52:48,585 [cuckoo.core.guest] INFO: Starting analysis #6920090 on guest (id=win7x6417, ip=192.168.168.217) 2025-08-28 16:52:49,590 [cuckoo.core.guest] DEBUG: win7x6417: not ready yet 2025-08-28 16:52:54,631 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x6417, ip=192.168.168.217) 2025-08-28 16:52:54,816 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x6417, ip=192.168.168.217, monitor=latest, size=6660546) 2025-08-28 16:52:55,954 [cuckoo.core.resultserver] DEBUG: Task #6920090: live log analysis.log initialized. 2025-08-28 16:52:56,807 [cuckoo.core.resultserver] DEBUG: Task #6920090 is sending a BSON stream 2025-08-28 16:52:58,120 [cuckoo.core.resultserver] DEBUG: Task #6920090: File upload for 'shots/0001.jpg' 2025-08-28 16:52:58,133 [cuckoo.core.resultserver] DEBUG: Task #6920090 uploaded file length: 133482 2025-08-28 16:52:59,231 [cuckoo.core.resultserver] DEBUG: Task #6920090: File upload for 'curtain/1756220367.27.curtain.log' 2025-08-28 16:52:59,234 [cuckoo.core.resultserver] DEBUG: Task #6920090 uploaded file length: 36 2025-08-28 16:52:59,337 [cuckoo.core.resultserver] DEBUG: Task #6920090: File upload for 'sysmon/1756220367.36.sysmon.xml' 2025-08-28 16:52:59,341 [cuckoo.core.resultserver] DEBUG: Task #6920090 uploaded file length: 101514 2025-08-28 16:53:00,225 [cuckoo.core.resultserver] DEBUG: Task #6920090 had connection reset for <Context for LOG> 2025-08-28 16:53:01,615 [cuckoo.core.guest] INFO: win7x6417: analysis completed successfully 2025-08-28 16:53:01,626 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-08-28 16:53:01,658 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-08-28 16:53:02,269 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x6417 to path /srv/cuckoo/cwd/storage/analyses/6920090/memory.dmp 2025-08-28 16:53:02,273 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x6417 2025-08-28 16:53:09,425 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.217 for task #6920090 2025-08-28 16:53:09,797 [cuckoo.core.scheduler] DEBUG: Released database task #6920090 2025-08-28 16:53:09,819 [cuckoo.core.scheduler] INFO: Task #6920090: analysis procedure completed
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Affect system registries | rule | win_registry | ||||||
description | Affect system token | rule | win_token |
pdb_path | C:\Users\Utilizador\Desktop\Testingvulnerabilities\x64\Release\Testingvulnerabilities.pdb |
G Data Antivirus (Windows) | Virus: Generic.Dacic.6108.7DEB8AFB (Engine A) |
Avast Core Security (Linux) | Win64:MalwareX-gen [Misc] |
C4S ClamAV (Linux) | Win.Malware.Tedy-10044415-0 |
WithSecure (Linux) | Trojan.TR/Agent_AGen.snbsy |
eScan Antivirus (Linux) | Generic.Dacic.6108.7DEB8AFB(DB) |
ESET Security (Windows) | Win64/Agent.FVV trojan |
Sophos Anti-Virus (Linux) | Mal/Generic-S |
DrWeb Antivirus (Linux) | Trojan.MulDrop32.32436 |
ClamAV (Linux) | Win.Malware.Tedy-10044415-0 |
Bitdefender Antivirus (Linux) | Generic.Dacic.6108.7DEB8AFB |
Kaspersky Standard (Windows) | HEUR:Trojan.Win32.Agent.pef |
Emsisoft Commandline Scanner (Windows) | Generic.Dacic.6108.7DEB8AFB (B) |
Bkav | W64.AIDetectMalware |
Cynet | Malicious (score: 99) |
ALYac | Generic.Dacic.6108.7DEB8AFB |
VIPRE | Generic.Dacic.6108.7DEB8AFB |
CrowdStrike | win/malicious_confidence_60% (D) |
BitDefender | Generic.Dacic.6108.7DEB8AFB |
K7GW | Trojan ( 005c59531 ) |
K7AntiVirus | Trojan ( 005c59531 ) |
Arcabit | Generic.Dacic.6108.7DEB8AFB |
Symantec | ML.Attribute.HighConfidence |
Elastic | malicious (high confidence) |
ESET-NOD32 | Win64/Agent.FVV |
APEX | Malicious |
Avast | Win64:MalwareX-gen [Misc] |
ClamAV | Win.Malware.Tedy-10044415-0 |
Kaspersky | HEUR:Trojan.Win32.Agent.pef |
SUPERAntiSpyware | Trojan.Agent/Gen-Crypt |
MicroWorld-eScan | Generic.Dacic.6108.7DEB8AFB |
Rising | Trojan.Agent!8.B1E (RDMK:cmRtazrr1FMmPpWHHcPCm14BOBee) |
Emsisoft | Generic.Dacic.6108.7DEB8AFB (B) |
F-Secure | Trojan.TR/Agent_AGen.snbsy |
Zillya | Trojan.AgentAGen.Win32.138065 |
McAfeeD | ti!7C5B4B86ECBD |
CTX | exe.unknown.dacic |
Jiangmin | Trojan.Tedy.cj |
Detected | |
Avira | TR/Agent_AGen.snbsy |
Antiy-AVL | Trojan/Win32.Agent |
Gridinsoft | Trojan.Win64.Agent.oa!s1 |
Microsoft | Trojan:Win64/Tedy.ATYE!MTB |
GData | Generic.Dacic.6108.7DEB8AFB |
Varist | W64/Agent.LCF.gen!Eldorado |
AhnLab-V3 | Trojan/Win.Generic.R700341 |
VBA32 | Trojan.Agent |
DeepInstinct | MALICIOUS |
Malwarebytes | Malware.AI.1515020114 |
Ikarus | Trojan.Win64.Agent |
Panda | Trj/GdSda.A |
Tencent | Trojan.Win64.Agent.16001895 |
Yandex | Trojan.Agent!0uHxq6uv8yE |
huorong | Trojan/Agent.chc |
MaxSecure | Trojan.Malware.300983.susgen |
Fortinet | W32/Agent_AGen.EUV!tr |
AVG | Win64:MalwareX-gen [Misc] |