Size | 61.2KB |
---|---|
Type | PE32+ executable (console) x86-64, for MS Windows |
MD5 | a8e5d946ae2550d40d942129ab09596c |
SHA1 | 5ff839f70c49168e24048cfb0f3518bfc92ed786 |
SHA256 | db08a5b1d50a1ab1729f3a55f092c4dc3463aa9795f973b19b4c0c7a3fe6b46d |
SHA512 |
0df24fb59e67d304a4da5515b26bf36080483a2f1903d6f5746f0d355fe55262eed042bfa434f4710c124fa3b26ffea9fbf74c9669f023023ba132bd9692658c
|
CRC32 | C6FF43F9 |
ssdeep | None |
PDB Path | C:\Users\Utilizador\Desktop\Testingvulnerabilities\x64\Release\Testingvulnerabilities.pdb |
Yara |
|
This file is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | July 30, 2025, 10:16 p.m. | July 30, 2025, 10:23 p.m. | 417 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-07-27 07:50:16,000 [analyzer] DEBUG: Starting analyzer from: C:\tmpsgyfoe 2025-07-27 07:50:16,015 [analyzer] DEBUG: Pipe server name: \??\PIPE\bSbuGkxFiORSPyqlI 2025-07-27 07:50:16,015 [analyzer] DEBUG: Log pipe server name: \??\PIPE\zChbhpspMozGjSmUPuNLQJKoLr 2025-07-27 07:50:16,375 [analyzer] DEBUG: Started auxiliary module Curtain 2025-07-27 07:50:16,375 [analyzer] DEBUG: Started auxiliary module DbgView 2025-07-27 07:50:16,858 [analyzer] DEBUG: Started auxiliary module Disguise 2025-07-27 07:50:17,062 [analyzer] DEBUG: Loaded monitor into process with pid 516 2025-07-27 07:50:17,062 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-07-27 07:50:17,062 [analyzer] DEBUG: Started auxiliary module Human 2025-07-27 07:50:17,062 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-07-27 07:50:17,078 [analyzer] DEBUG: Started auxiliary module Reboot 2025-07-27 07:50:17,155 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-07-27 07:50:17,155 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-07-27 07:50:17,155 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-07-27 07:50:17,155 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-07-27 07:50:17,265 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\db08a5b1d50a1ab1729f3a55f092c4dc3463aa9795f973b19b4c0c7a3fe6b46d.exe' with arguments '' and pid 2984 2025-07-27 07:50:18,296 [analyzer] INFO: Process with pid 2984 has terminated 2025-07-27 07:50:18,296 [analyzer] INFO: Process list is empty, terminating analysis. 2025-07-27 07:50:19,546 [analyzer] INFO: Terminating remaining processes before shutdown. 2025-07-27 07:50:19,546 [analyzer] INFO: Analysis completed.
2025-07-30 22:16:16,942 [cuckoo.core.scheduler] INFO: Task #6791944: acquired machine win7x6413 (label=win7x6413) 2025-07-30 22:16:16,943 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.213 for task #6791944 2025-07-30 22:16:17,808 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 2266734 (interface=vboxnet0, host=192.168.168.213) 2025-07-30 22:16:18,025 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x6413 2025-07-30 22:16:19,050 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x6413 to vmcloak 2025-07-30 22:19:45,639 [cuckoo.core.guest] INFO: Starting analysis #6791944 on guest (id=win7x6413, ip=192.168.168.213) 2025-07-30 22:19:46,648 [cuckoo.core.guest] DEBUG: win7x6413: not ready yet 2025-07-30 22:19:51,685 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x6413, ip=192.168.168.213) 2025-07-30 22:19:52,180 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x6413, ip=192.168.168.213, monitor=latest, size=6660546) 2025-07-30 22:19:53,844 [cuckoo.core.resultserver] DEBUG: Task #6791944: live log analysis.log initialized. 2025-07-30 22:19:54,654 [cuckoo.core.resultserver] DEBUG: Task #6791944 is sending a BSON stream 2025-07-30 22:19:55,961 [cuckoo.core.resultserver] DEBUG: Task #6791944: File upload for 'shots/0001.jpg' 2025-07-30 22:19:55,983 [cuckoo.core.resultserver] DEBUG: Task #6791944 uploaded file length: 133559 2025-07-30 22:19:57,070 [cuckoo.core.resultserver] DEBUG: Task #6791944: File upload for 'curtain/1753595419.41.curtain.log' 2025-07-30 22:19:57,074 [cuckoo.core.resultserver] DEBUG: Task #6791944 uploaded file length: 36 2025-07-30 22:19:57,209 [cuckoo.core.resultserver] DEBUG: Task #6791944: File upload for 'sysmon/1753595419.55.sysmon.xml' 2025-07-30 22:19:57,217 [cuckoo.core.resultserver] DEBUG: Task #6791944 uploaded file length: 385018 2025-07-30 22:19:58,056 [cuckoo.core.resultserver] DEBUG: Task #6791944 had connection reset for <Context for LOG> 2025-07-30 22:19:59,407 [cuckoo.core.guest] INFO: win7x6413: analysis completed successfully 2025-07-30 22:19:59,433 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-07-30 22:19:59,466 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-07-30 22:20:01,290 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x6413 to path /srv/cuckoo/cwd/storage/analyses/6791944/memory.dmp 2025-07-30 22:20:01,298 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x6413 2025-07-30 22:23:13,475 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.213 for task #6791944 2025-07-30 22:23:14,045 [cuckoo.core.scheduler] DEBUG: Released database task #6791944 2025-07-30 22:23:14,102 [cuckoo.core.scheduler] INFO: Task #6791944: analysis procedure completed
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Affect system registries | rule | win_registry | ||||||
description | Affect system token | rule | win_token |
pdb_path | C:\Users\Utilizador\Desktop\Testingvulnerabilities\x64\Release\Testingvulnerabilities.pdb |
G Data Antivirus (Windows) | Virus: Generic.Dacic.6196.8FF74CC2 (Engine A) |
Avast Core Security (Linux) | Win64:MalwareX-gen [Misc] |
C4S ClamAV (Linux) | Win.Malware.Tedy-10043980-0 |
Trellix (Linux) | Trojan-FXND |
WithSecure (Linux) | Trojan.TR/Agent.mgfog |
eScan Antivirus (Linux) | Generic.Dacic.6196.8FF74CC2(DB) |
ESET Security (Windows) | a variant of Win32/Agent.AHGE trojan |
Sophos Anti-Virus (Linux) | Mal/Generic-S |
DrWeb Antivirus (Linux) | Trojan.MulDrop32.23046 |
Bitdefender Antivirus (Linux) | Generic.Dacic.6196.8FF74CC2 |
Kaspersky Standard (Windows) | HEUR:Trojan.Win64.Agent.gen |
Emsisoft Commandline Scanner (Windows) | Generic.Dacic.6196.8FF74CC2 (B) |
Bkav | W64.AIDetectMalware |
Skyhigh | BehavesLike.Win64.Dropper.kh |
ALYac | Generic.Dacic.6196.8FF74CC2 |
VIPRE | Generic.Dacic.6196.8FF74CC2 |
CrowdStrike | win/malicious_confidence_90% (D) |
BitDefender | Generic.Dacic.6196.8FF74CC2 |
K7GW | Trojan ( 005c3a401 ) |
K7AntiVirus | Trojan ( 005c3a401 ) |
Arcabit | Generic.Dacic.6196.8FF74CC2 |
Symantec | ML.Attribute.HighConfidence |
Elastic | malicious (high confidence) |
ESET-NOD32 | a variant of Win32/Agent.AHGE |
APEX | Malicious |
Avast | Win64:MalwareX-gen [Misc] |
ClamAV | Win.Malware.Tedy-10043980-0 |
Kaspersky | HEUR:Trojan.Win64.Agent.gen |
SUPERAntiSpyware | Trojan.Agent/Gen-Kryptik |
MicroWorld-eScan | Generic.Dacic.6196.8FF74CC2 |
Rising | Trojan.Agent!1.12DA1 (CLASSIC) |
Emsisoft | Generic.Dacic.6196.8FF74CC2 (B) |
F-Secure | Trojan.TR/Agent.mgfog |
Zillya | Trojan.Agent.Win32.4206562 |
McAfeeD | ti!DB08A5B1D50A |
CTX | exe.unknown.dacic |
Jiangmin | Trojan.Agent.fcla |
Detected | |
Avira | TR/Agent.mgfog |
Antiy-AVL | GrayWare/Win32.Wacapew |
Gridinsoft | Trojan.Win64.Agent.oa!s1 |
Microsoft | Trojan:Win64/Tedy.PGT!MTB |
GData | Generic.Dacic.6196.8FF74CC2 |
Varist | W64/Agent.NGBC |
AhnLab-V3 | Trojan/Win.Generic.R700341 |
VBA32 | Trojan.Win64.Agent |
DeepInstinct | MALICIOUS |
Malwarebytes | Malware.AI.1349389179 |
Ikarus | Trojan.Win32.Agent |
Panda | Trj/GdSda.A |
Tencent | Trojan.Win64.Agent.16001895 |
Yandex | Trojan.Agent!h4C34edfiiM |
TrellixENS | Trojan-FXND!A8E5D946AE25 |
MaxSecure | Trojan.Malware.121218.susgen |
Fortinet | W64/Agent.AHGE!tr |
AVG | Win64:MalwareX-gen [Misc] |