Size | 361.0KB |
---|---|
Type | PE32 executable (GUI) Intel 80386, for MS Windows |
MD5 | 5bd4ce5fc5adba0d73910740a0ec7494 |
SHA1 | ad056d222b9cac9db18f7afb7c008e75c6f08082 |
SHA256 | 11ade02e3450116e38719853560645550b6118ea277ce704ddcbd3fe97bb0929 |
SHA512 |
f0186742a194f71b501b4dba1f2ef51d19ed4914f4a81b27aedffaf003231ddc59961d15cbbd731590ac75fc7a10f1b8546f97cb5441e39e6a1e8ba8f405ea52
|
CRC32 | E7E4066C |
ssdeep | None |
PDB Path | f:\软件工ç¨\驱å¨ç¼ç¨\OK\KernelYK\bin\InstallSYS.pdb |
Yara |
|
This file is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | July 16, 2025, 8:11 p.m. | July 16, 2025, 8:16 p.m. | 293 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-07-11 20:13:44,015 [analyzer] DEBUG: Starting analyzer from: C:\tmp4nivwu 2025-07-11 20:13:44,015 [analyzer] DEBUG: Pipe server name: \??\PIPE\WjJGcKCuVOezxgab 2025-07-11 20:13:44,015 [analyzer] DEBUG: Log pipe server name: \??\PIPE\InbxbMZxucxujjFGiKJIIN 2025-07-11 20:13:44,015 [analyzer] DEBUG: No analysis package specified, trying to detect it automagically. 2025-07-11 20:13:44,015 [analyzer] INFO: Automatically selected analysis package "exe" 2025-07-11 20:13:44,250 [analyzer] DEBUG: Started auxiliary module Curtain 2025-07-11 20:13:44,250 [analyzer] DEBUG: Started auxiliary module DbgView 2025-07-11 20:13:44,765 [analyzer] DEBUG: Started auxiliary module Disguise 2025-07-11 20:13:45,015 [analyzer] DEBUG: Loaded monitor into process with pid 508 2025-07-11 20:13:45,015 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-07-11 20:13:45,015 [analyzer] DEBUG: Started auxiliary module Human 2025-07-11 20:13:45,015 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-07-11 20:13:45,015 [analyzer] DEBUG: Started auxiliary module Reboot 2025-07-11 20:13:45,125 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-07-11 20:13:45,125 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-07-11 20:13:45,125 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-07-11 20:13:45,125 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-07-11 20:13:45,280 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\11ade02e3450116e_i_omhezwrpjh.exe' with arguments '' and pid 2736 2025-07-11 20:13:45,453 [analyzer] DEBUG: Loaded monitor into process with pid 2736 2025-07-11 20:13:45,967 [analyzer] INFO: Added new file to list with pid 2736 and path C:\Temp\CreateProcess.exe 2025-07-11 20:13:46,967 [analyzer] INFO: Added new file to list with pid 2736 and path C:\Temp\cavsnlfdxvpnifay.exe 2025-07-11 20:13:47,078 [analyzer] INFO: Injected into process with pid 2352 and name u'cavsnlfdxvpnifay.exe' 2025-07-11 20:13:47,203 [analyzer] INFO: Injected into process with pid 2372 and name u'iexplore.exe' 2025-07-11 20:13:47,233 [analyzer] DEBUG: Loaded monitor into process with pid 2352 2025-07-11 20:13:47,265 [analyzer] INFO: Added new file to list with pid 2352 and path \Device\NamedPipe\lsass 2025-07-11 20:13:47,405 [analyzer] DEBUG: Loaded monitor into process with pid 2372 2025-07-11 20:13:49,203 [analyzer] INFO: Added new file to list with pid 2736 and path C:\Temp\cavsnlfdxvpnifay.sys 2025-07-11 20:13:49,921 [analyzer] INFO: Added new file to list with pid 2352 and path C:\Temp\ywqojgbztr.exe 2025-07-11 20:13:49,967 [analyzer] INFO: Injected into process with pid 2064 and name u'CreateProcess.exe' 2025-07-11 20:13:50,125 [analyzer] DEBUG: Loaded monitor into process with pid 2064 2025-07-11 20:13:50,280 [analyzer] INFO: Process with pid 2736 has terminated 2025-07-11 20:13:51,280 [analyzer] INFO: Process with pid 2064 has terminated 2025-07-11 20:13:52,405 [analyzer] INFO: Added new file to list with pid 2352 and path C:\Temp\i_ywqojgbztr.exe 2025-07-11 20:13:57,796 [analyzer] INFO: Added new file to list with pid 2352 and path C:\Temp\tqljdbvtnl.exe 2025-07-11 20:17:04,296 [analyzer] INFO: Analysis timeout hit, terminating analysis. 2025-07-11 20:17:05,640 [analyzer] INFO: Terminating remaining processes before shutdown. 2025-07-11 20:17:05,640 [lib.api.process] INFO: Successfully terminated process with pid 2352. 2025-07-11 20:17:05,640 [lib.api.process] INFO: Successfully terminated process with pid 2372. 2025-07-11 20:17:05,640 [analyzer] WARNING: File at path u'\\device\\namedpipe\\lsass' does not exist, skip. 2025-07-11 20:17:05,671 [analyzer] INFO: Analysis completed.
2025-07-16 20:11:29,351 [cuckoo.core.scheduler] INFO: Task #6721105: acquired machine win7x6424 (label=win7x6424) 2025-07-16 20:11:29,354 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.224 for task #6721105 2025-07-16 20:11:29,641 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 2815709 (interface=vboxnet0, host=192.168.168.224) 2025-07-16 20:11:31,072 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x6424 2025-07-16 20:11:32,013 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x6424 to vmcloak 2025-07-16 20:11:46,076 [cuckoo.core.guest] INFO: Starting analysis #6721105 on guest (id=win7x6424, ip=192.168.168.224) 2025-07-16 20:11:47,083 [cuckoo.core.guest] DEBUG: win7x6424: not ready yet 2025-07-16 20:11:52,173 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x6424, ip=192.168.168.224) 2025-07-16 20:11:52,289 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x6424, ip=192.168.168.224, monitor=latest, size=6660546) 2025-07-16 20:11:53,505 [cuckoo.core.resultserver] DEBUG: Task #6721105: live log analysis.log initialized. 2025-07-16 20:11:54,469 [cuckoo.core.resultserver] DEBUG: Task #6721105 is sending a BSON stream 2025-07-16 20:11:54,892 [cuckoo.core.resultserver] DEBUG: Task #6721105 is sending a BSON stream 2025-07-16 20:11:55,779 [cuckoo.core.resultserver] DEBUG: Task #6721105: File upload for 'shots/0001.jpg' 2025-07-16 20:11:55,800 [cuckoo.core.resultserver] DEBUG: Task #6721105 uploaded file length: 133456 2025-07-16 20:11:56,674 [cuckoo.core.resultserver] DEBUG: Task #6721105 is sending a BSON stream 2025-07-16 20:11:56,797 [cuckoo.core.resultserver] DEBUG: Task #6721105 is sending a BSON stream 2025-07-16 20:11:59,563 [cuckoo.core.resultserver] DEBUG: Task #6721105 is sending a BSON stream 2025-07-16 20:11:59,933 [cuckoo.core.resultserver] DEBUG: Task #6721105: File upload for 'files/a60ee64c3044b411_ywqojgbztr.exe' 2025-07-16 20:11:59,946 [cuckoo.core.resultserver] DEBUG: Task #6721105 uploaded file length: 369664 2025-07-16 20:12:04,661 [cuckoo.core.resultserver] DEBUG: Task #6721105: File upload for 'files/62b93879619b1318_i_ywqojgbztr.exe' 2025-07-16 20:12:04,668 [cuckoo.core.resultserver] DEBUG: Task #6721105 uploaded file length: 369664 2025-07-16 20:12:08,268 [cuckoo.core.guest] DEBUG: win7x6424: analysis #6721105 still processing 2025-07-16 20:12:23,380 [cuckoo.core.guest] DEBUG: win7x6424: analysis #6721105 still processing 2025-07-16 20:12:38,502 [cuckoo.core.guest] DEBUG: win7x6424: analysis #6721105 still processing 2025-07-16 20:12:53,676 [cuckoo.core.guest] DEBUG: win7x6424: analysis #6721105 still processing 2025-07-16 20:13:08,841 [cuckoo.core.guest] DEBUG: win7x6424: analysis #6721105 still processing 2025-07-16 20:13:23,953 [cuckoo.core.guest] DEBUG: win7x6424: analysis #6721105 still processing 2025-07-16 20:13:39,079 [cuckoo.core.guest] DEBUG: win7x6424: analysis #6721105 still processing 2025-07-16 20:13:54,237 [cuckoo.core.guest] DEBUG: win7x6424: analysis #6721105 still processing 2025-07-16 20:14:09,343 [cuckoo.core.guest] DEBUG: win7x6424: analysis #6721105 still processing 2025-07-16 20:14:24,571 [cuckoo.core.guest] DEBUG: win7x6424: analysis #6721105 still processing 2025-07-16 20:14:39,684 [cuckoo.core.guest] DEBUG: win7x6424: analysis #6721105 still processing 2025-07-16 20:14:54,830 [cuckoo.core.guest] DEBUG: win7x6424: analysis #6721105 still processing 2025-07-16 20:15:09,913 [cuckoo.core.guest] DEBUG: win7x6424: analysis #6721105 still processing 2025-07-16 20:15:14,101 [cuckoo.core.resultserver] DEBUG: Task #6721105: File upload for 'curtain/1752257824.58.curtain.log' 2025-07-16 20:15:14,106 [cuckoo.core.resultserver] DEBUG: Task #6721105 uploaded file length: 36 2025-07-16 20:15:15,079 [cuckoo.core.resultserver] DEBUG: Task #6721105: File upload for 'sysmon/1752257825.55.sysmon.xml' 2025-07-16 20:15:15,161 [cuckoo.core.resultserver] DEBUG: Task #6721105 uploaded file length: 10796926 2025-07-16 20:15:15,188 [cuckoo.core.resultserver] DEBUG: Task #6721105: File upload for 'files/293cd138f57316a6_cavsnlfdxvpnifay.sys' 2025-07-16 20:15:15,194 [cuckoo.core.resultserver] DEBUG: Task #6721105: File upload for 'files/1ce787f372cb56c8_tqljdbvtnl.exe' 2025-07-16 20:15:15,198 [cuckoo.core.resultserver] DEBUG: Task #6721105: File upload for 'files/a0ed9d714498d54c_createprocess.exe' 2025-07-16 20:15:15,200 [cuckoo.core.resultserver] DEBUG: Task #6721105 uploaded file length: 3584 2025-07-16 20:15:15,208 [cuckoo.core.resultserver] DEBUG: Task #6721105: File upload for 'files/5dce0a82b3e328b0_cavsnlfdxvpnifay.exe' 2025-07-16 20:15:15,210 [cuckoo.core.resultserver] DEBUG: Task #6721105 uploaded file length: 369664 2025-07-16 20:15:15,213 [cuckoo.core.resultserver] DEBUG: Task #6721105 uploaded file length: 300544 2025-07-16 20:15:15,218 [cuckoo.core.resultserver] DEBUG: Task #6721105 uploaded file length: 369664 2025-07-16 20:15:15,221 [cuckoo.core.resultserver] DEBUG: Task #6721105 had connection reset for <Context for LOG> 2025-07-16 20:15:15,968 [cuckoo.core.guest] INFO: win7x6424: analysis completed successfully 2025-07-16 20:15:15,978 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-07-16 20:15:16,005 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-07-16 20:15:16,917 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x6424 to path /srv/cuckoo/cwd/storage/analyses/6721105/memory.dmp 2025-07-16 20:15:16,918 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x6424 2025-07-16 20:16:21,472 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.224 for task #6721105 2025-07-16 20:16:21,922 [cuckoo.core.scheduler] DEBUG: Released database task #6721105 2025-07-16 20:16:21,953 [cuckoo.core.scheduler] INFO: Task #6721105: analysis procedure completed
description | Possibly employs anti-virtualization techniques | rule | vmdetect | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Code injection with CreateRemoteThread in a remote process | rule | inject_thread | ||||||
description | Create a windows service | rule | create_service | ||||||
description | Communications over HTTP | rule | network_http | ||||||
description | File downloader/dropper | rule | network_dropper | ||||||
description | Communications over RAW socket | rule | network_tcp_socket | ||||||
description | Escalade priviledges | rule | escalate_priv | ||||||
description | Take screenshot | rule | screenshot | ||||||
description | Run a keylogger | rule | keylogger |
pdb_path | f:\软件工ç¨\驱å¨ç¼ç¨\OK\KernelYK\bin\InstallSYS.pdb |
name | RT_ICON | language | LANG_CHINESE | filetype | Device independent bitmap graphic, 13 x 26 x 8, image size 208, 256 important colors | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0005bec0 | size | 0x0000052c | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | Device independent bitmap graphic, 13 x 26 x 8, image size 208, 256 important colors | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0005bec0 | size | 0x0000052c | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | Device independent bitmap graphic, 13 x 26 x 8, image size 208, 256 important colors | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0005bec0 | size | 0x0000052c | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | Device independent bitmap graphic, 13 x 26 x 8, image size 208, 256 important colors | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0005bec0 | size | 0x0000052c | ||||||||||||||||||
name | RT_DIALOG | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0005c3ec | size | 0x00000094 | ||||||||||||||||||
name | RT_GROUP_ICON | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0005c480 | size | 0x0000003e | ||||||||||||||||||
name | RT_VERSION | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0005c4c0 | size | 0x000002cc |
file | C:\Temp\i_ywqojgbztr.exe |
file | C:\Temp\cavsnlfdxvpnifay.exe |
file | C:\Temp\tqljdbvtnl.exe |
file | C:\Temp\ywqojgbztr.exe |
file | C:\Temp\CreateProcess.exe |
cmdline | C:\Program Files\Internet Explorer\iexplore.exe http://xytets.com:2345/t.asp?os=home |
G Data Antivirus (Windows) | Virus: Trojan.Generic.7761207 (Engine A), Win32.Trojan.PSE1.YSVY3N (Engine B) |
Avast Core Security (Linux) | MBR:Backboot-D [Rtk] |
C4S ClamAV (Linux) | Win.Malware.Mikey-9949492-0 |
Trellix (Linux) | Generic Dropper.aoe trojan |
WithSecure (Linux) | Trojan.TR/Rogue.7909438 |
eScan Antivirus (Linux) | Trojan.Generic.7761207(DB) |
ESET Security (Windows) | Win32/Agent.PGA trojan |
Sophos Anti-Virus (Linux) | Troj/Drop-GZ |
DrWeb Antivirus (Linux) | Trojan.Click2.32800 |
ClamAV (Linux) | Win.Malware.Mikey-9949492-0 |
Bitdefender Antivirus (Linux) | Trojan.Generic.7761207 |
Kaspersky Standard (Windows) | Trojan.Win32.Tiny.cm |
Emsisoft Commandline Scanner (Windows) | Trojan.Generic.7761207 (B) |
nProtect | Trojan-Dropper/W32.Daws.369664 |
McAfee | Generic Dropper.afz |
TheHacker | Trojan/Agent.pga |
K7AntiVirus | Trojan |
F-Prot | W32/Pleh.A.gen!Eldorado |
Avast | Win32:Trojan-gen |
Kaspersky | Trojan-Dropper.Win32.Daws.aumx |
BitDefender | Trojan.Generic.KDV.717130 |
Emsisoft | Packed.Win32.PePatch!IK |
Comodo | TrojWare.Win32.Clicker.naf |
F-Secure | Trojan.Generic.KDV.717130 |
DrWeb | Trojan.Click2.32800 |
VIPRE | Trojan.Win32.Invader.b (v) |
AntiVir | TR/Agent.300544.50 |
Sophos | Mal/Behav-027 |
Jiangmin | Trojan/Invader.hct |
Kingsoft | Win32.Troj.Undef.(kcloud) |
Microsoft | TrojanDropper:Win32/Systex.A |
ViRobot | Dropper.Daws.Gen.A |
GData | Trojan.Generic.KDV.717130 |
Commtouch | W32/Pleh.A.gen!Eldorado |
ESET-NOD32 | Win32/Agent.PGA |
VBA32 | Trojan-Dropper.Daws.aumx |
Rising | Trojan.Spy.Texy!4898 |
Ikarus | Packed.Win32.PePatch |
Fortinet | W32/Agent.XAW!tr |
AVG | Dropper.Generic6.BPPW |
Panda | Trj/Genetic.gen |