| Size | 735.7KB |
|---|---|
| Type | PE32+ executable (GUI) x86-64, for MS Windows |
| MD5 | ec6bb6105f1d84218f696cc4c32c4dff |
| SHA1 | 2016a36590438ee9a975c31ba8f92628e50e01f5 |
| SHA256 | 5cde4f16b5fa21e6daa226b4c7b287a4419f04421e03ec45b4df21a45f75371a |
| SHA512 |
586df7fb19a093fb7c1c74024eeb6dda33850d1c9462501009b42fd50fccaa7c808b794645fd46d269a298adf084d6c3e4001cff37db0a4a542fa8c41dbcbd41
|
| CRC32 | 43A4C412 |
| ssdeep | None |
| Yara |
|
This file is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
| Category | Started | Completed | Duration | Routing | Logs |
|---|---|---|---|---|---|
| FILE | Dec. 20, 2025, 12:46 p.m. | Dec. 20, 2025, 12:53 p.m. | 368 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-12-19 06:52:34,000 [analyzer] DEBUG: Starting analyzer from: C:\tmpd0os1j 2025-12-19 06:52:34,015 [analyzer] DEBUG: Pipe server name: \??\PIPE\pCaZEANBxFVfqYkPUbEjqjPqWPHtTG 2025-12-19 06:52:34,015 [analyzer] DEBUG: Log pipe server name: \??\PIPE\lGjOmhFYMAjeDXMHwtikEnqNCi 2025-12-19 06:52:34,328 [analyzer] DEBUG: Started auxiliary module Curtain 2025-12-19 06:52:34,328 [analyzer] DEBUG: Started auxiliary module DbgView 2025-12-19 06:52:34,796 [analyzer] DEBUG: Started auxiliary module Disguise 2025-12-19 06:52:35,015 [analyzer] DEBUG: Loaded monitor into process with pid 512 2025-12-19 06:52:35,015 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-12-19 06:52:35,015 [analyzer] DEBUG: Started auxiliary module Human 2025-12-19 06:52:35,015 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-12-19 06:52:35,015 [analyzer] DEBUG: Started auxiliary module Reboot 2025-12-19 06:52:35,078 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-12-19 06:52:35,078 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-12-19 06:52:35,078 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-12-19 06:52:35,078 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-12-19 06:52:35,328 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\5cde4f16b5fa21e6daa226b4c7b287a4419f04421e03ec45b4df21a45f75371a.exe' with arguments '' and pid 2924 2025-12-19 06:52:35,562 [analyzer] DEBUG: Loaded monitor into process with pid 2924 2025-12-19 06:52:36,328 [analyzer] INFO: Process with pid 2924 has terminated 2025-12-19 06:52:36,328 [analyzer] INFO: Process list is empty, terminating analysis. 2025-12-19 06:52:37,500 [analyzer] INFO: Terminating remaining processes before shutdown. 2025-12-19 06:52:37,500 [analyzer] INFO: Analysis completed.
2025-12-20 12:46:55,164 [cuckoo.core.scheduler] DEBUG: Task #7240218: no machine available yet 2025-12-20 12:46:56,217 [cuckoo.core.scheduler] DEBUG: Task #7240218: no machine available yet 2025-12-20 12:46:57,275 [cuckoo.core.scheduler] DEBUG: Task #7240218: no machine available yet 2025-12-20 12:46:58,334 [cuckoo.core.scheduler] DEBUG: Task #7240218: no machine available yet 2025-12-20 12:46:59,411 [cuckoo.core.scheduler] DEBUG: Task #7240218: no machine available yet 2025-12-20 12:47:00,483 [cuckoo.core.scheduler] DEBUG: Task #7240218: no machine available yet 2025-12-20 12:47:01,580 [cuckoo.core.scheduler] DEBUG: Task #7240218: no machine available yet 2025-12-20 12:47:02,818 [cuckoo.core.scheduler] INFO: Task #7240218: acquired machine win7x6429 (label=win7x6429) 2025-12-20 12:47:02,826 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.229 for task #7240218 2025-12-20 12:47:03,307 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 3509680 (interface=vboxnet0, host=192.168.168.229) 2025-12-20 12:47:06,753 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x6429 2025-12-20 12:47:07,591 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x6429 to vmcloak 2025-12-20 12:49:56,401 [cuckoo.core.guest] INFO: Starting analysis #7240218 on guest (id=win7x6429, ip=192.168.168.229) 2025-12-20 12:49:57,406 [cuckoo.core.guest] DEBUG: win7x6429: not ready yet 2025-12-20 12:50:02,428 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x6429, ip=192.168.168.229) 2025-12-20 12:50:02,501 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x6429, ip=192.168.168.229, monitor=latest, size=6660546) 2025-12-20 12:50:03,780 [cuckoo.core.resultserver] DEBUG: Task #7240218: live log analysis.log initialized. 2025-12-20 12:50:04,748 [cuckoo.core.resultserver] DEBUG: Task #7240218 is sending a BSON stream 2025-12-20 12:50:05,242 [cuckoo.core.resultserver] DEBUG: Task #7240218 is sending a BSON stream 2025-12-20 12:50:05,992 [cuckoo.core.resultserver] DEBUG: Task #7240218: File upload for 'shots/0001.jpg' 2025-12-20 12:50:06,026 [cuckoo.core.resultserver] DEBUG: Task #7240218 uploaded file length: 133413 2025-12-20 12:50:07,197 [cuckoo.core.resultserver] DEBUG: Task #7240218: File upload for 'curtain/1766123557.39.curtain.log' 2025-12-20 12:50:07,200 [cuckoo.core.resultserver] DEBUG: Task #7240218 uploaded file length: 36 2025-12-20 12:50:07,290 [cuckoo.core.resultserver] DEBUG: Task #7240218: File upload for 'sysmon/1766123557.48.sysmon.xml' 2025-12-20 12:50:07,296 [cuckoo.core.resultserver] DEBUG: Task #7240218 uploaded file length: 258696 2025-12-20 12:50:08,093 [cuckoo.core.resultserver] DEBUG: Task #7240218 had connection reset for <Context for LOG> 2025-12-20 12:50:09,458 [cuckoo.core.guest] INFO: win7x6429: analysis completed successfully 2025-12-20 12:50:09,469 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-12-20 12:50:09,580 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-12-20 12:50:10,831 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x6429 to path /srv/cuckoo/cwd/storage/analyses/7240218/memory.dmp 2025-12-20 12:50:10,833 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x6429 2025-12-20 12:53:02,941 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.229 for task #7240218 2025-12-20 12:53:03,757 [cuckoo.core.scheduler] DEBUG: Released database task #7240218 2025-12-20 12:53:03,795 [cuckoo.core.scheduler] INFO: Task #7240218: analysis procedure completed
| description | Checks if being debugged | rule | anti_dbg | ||||||
| description | Affect system registries | rule | win_registry | ||||||
| description | Affect private profile | rule | win_files_operation | ||||||
| section | .fptable |
| section | .retplne |
| section | _RDATA |
| G Data Antivirus (Windows) | Virus: Trojan.GenericKDZ.114419 (Engine A) |
| Avast Core Security (Linux) | Win64:MalwareX-gen [Cryp] |
| C4S ClamAV (Linux) | C4S.MALWARE.SHA256.AUTOGEN.65242932.UNOFFICIAL |
| Trellix (Linux) | Trojan-JAPY |
| eScan Antivirus (Linux) | Trojan.GenericKDZ.114419(DB) |
| ESET Security (Windows) | a variant of Win64/Kryptik.FQF trojan |
| Sophos Anti-Virus (Linux) | Mal/Generic-S |
| DrWeb Antivirus (Linux) | Trojan.Inject6.1996 |
| ClamAV (Linux) | Win.Packed.njRAT-10002074-1 |
| Bitdefender Antivirus (Linux) | Trojan.GenericKDZ.114419 |
| Kaspersky Standard (Windows) | HEUR:Trojan.MSIL.Convagent.gen |
| Emsisoft Commandline Scanner (Windows) | Trojan.GenericKDZ.114419 (B) |
| Bkav | W64.AIDetectMalware |
| Lionic | Trojan.Win32.Fsysna.tsUM |
| Cynet | Malicious (score: 100) |
| Skyhigh | BehavesLike.Win64.Generic.bh |
| ALYac | Trojan.GenericKDZ.114419 |
| Cylance | Unsafe |
| VIPRE | Trojan.GenericKDZ.114419 |
| Sangfor | Trojan.Win64.Xworm.Vq0y |
| CrowdStrike | win/malicious_confidence_90% (W) |
| BitDefender | Trojan.GenericKDZ.114419 |
| K7GW | Trojan ( 005cf5221 ) |
| K7AntiVirus | Trojan ( 005cf5221 ) |
| Arcabit | Trojan.Generic.D1BEF3 |
| VirIT | Trojan.Win64.Genus.ITG |
| Symantec | Downloader.XWorm!gen4 |
| Elastic | malicious (high confidence) |
| ESET-NOD32 | Win64/Kryptik.FQF trojan |
| APEX | Malicious |
| Avast | Win32:MalwareX-gen [Misc] |
| ClamAV | Win.Packed.njRAT-10002074-1 |
| Kaspersky | UDS:Trojan.MSIL.Convagent.gen |
| Alibaba | Trojan:Win64/Xworm.34cb2304 |
| NANO-Antivirus | Trojan.Win64.Kryptik.leplwv |
| SUPERAntiSpyware | Backdoor.Bot/Variant |
| MicroWorld-eScan | Trojan.GenericKDZ.114419 |
| Rising | Backdoor.XWorm!1.129F7 (CLASSIC) |
| Emsisoft | Trojan.GenericKDZ.114419 (B) |
| DrWeb | Trojan.Inject6.1996 |
| Zillya | Trojan.Kryptik.Win64.67320 |
| McAfeeD | ti!5CDE4F16B5FA |
| Trapmine | malicious.moderate.ml.score |
| CTX | exe.trojan.kryptik |
| Sophos | Mal/Generic-S |
| SentinelOne | Static AI - Malicious PE |
| Jiangmin | Worm.MSIL.yhc |
| Webroot | W32.Malware.gen |
| Detected | |
| Kingsoft | MSIL.Trojan.Convagent.gen |
| Gridinsoft | Trojan.Win64.Kryptik.oa!s4 |
| Microsoft | Trojan:Win64/Xworm.ZBO!MTB |
| GData | Trojan.GenericKDZ.114419 |
| Varist | W64/ARisk.CH |
| AhnLab-V3 | Backdoor/Win.XWorm.R719793 |
| DeepInstinct | MALICIOUS |
| Malwarebytes | Backdoor.Agent |
| Ikarus | Trojan.Win64.Krypt |
| Panda | Trj/GdSda.A |
| Tencent | Trojan.Msil.Xworm.16001415 |
| TrellixENS | Trojan-JAPY!EC6BB6105F1D |
| huorong | Backdoor/XWorm.c |