File db08a5b1d50a1ab1729f3a55f092c4dc3463aa9795f973b19b4c0c7a3fe6b46d

Size 61.2KB
Type PE32+ executable (console) x86-64, for MS Windows
MD5 a8e5d946ae2550d40d942129ab09596c
SHA1 5ff839f70c49168e24048cfb0f3518bfc92ed786
SHA256 db08a5b1d50a1ab1729f3a55f092c4dc3463aa9795f973b19b4c0c7a3fe6b46d
SHA512
0df24fb59e67d304a4da5515b26bf36080483a2f1903d6f5746f0d355fe55262eed042bfa434f4710c124fa3b26ffea9fbf74c9669f023023ba132bd9692658c
CRC32 C6FF43F9
ssdeep None
PDB Path C:\Users\Utilizador\Desktop\Testingvulnerabilities\x64\Release\Testingvulnerabilities.pdb
Yara
  • anti_dbg - Checks if being debugged
  • win_registry - Affect system registries
  • win_token - Affect system token

Score

This file is very suspicious, with a score of 10 out of 10!

Please notice: The scoring system is currently still in development and should be considered an alpha feature.


Feedback

Expecting different results? Send us this analysis and we will inspect it. Click here

Information on Execution

Analysis
Category Started Completed Duration Routing Logs
FILE July 30, 2025, 10:16 p.m. July 30, 2025, 10:23 p.m. 417 seconds internet Show Analyzer Log
Show Cuckoo Log

Analyzer Log

2025-07-27 07:50:16,000 [analyzer] DEBUG: Starting analyzer from: C:\tmpsgyfoe
2025-07-27 07:50:16,015 [analyzer] DEBUG: Pipe server name: \??\PIPE\bSbuGkxFiORSPyqlI
2025-07-27 07:50:16,015 [analyzer] DEBUG: Log pipe server name: \??\PIPE\zChbhpspMozGjSmUPuNLQJKoLr
2025-07-27 07:50:16,375 [analyzer] DEBUG: Started auxiliary module Curtain
2025-07-27 07:50:16,375 [analyzer] DEBUG: Started auxiliary module DbgView
2025-07-27 07:50:16,858 [analyzer] DEBUG: Started auxiliary module Disguise
2025-07-27 07:50:17,062 [analyzer] DEBUG: Loaded monitor into process with pid 516
2025-07-27 07:50:17,062 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets
2025-07-27 07:50:17,062 [analyzer] DEBUG: Started auxiliary module Human
2025-07-27 07:50:17,062 [analyzer] DEBUG: Started auxiliary module InstallCertificate
2025-07-27 07:50:17,078 [analyzer] DEBUG: Started auxiliary module Reboot
2025-07-27 07:50:17,155 [analyzer] DEBUG: Started auxiliary module RecentFiles
2025-07-27 07:50:17,155 [analyzer] DEBUG: Started auxiliary module Screenshots
2025-07-27 07:50:17,155 [analyzer] DEBUG: Started auxiliary module Sysmon
2025-07-27 07:50:17,155 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n
2025-07-27 07:50:17,265 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\db08a5b1d50a1ab1729f3a55f092c4dc3463aa9795f973b19b4c0c7a3fe6b46d.exe' with arguments '' and pid 2984
2025-07-27 07:50:18,296 [analyzer] INFO: Process with pid 2984 has terminated
2025-07-27 07:50:18,296 [analyzer] INFO: Process list is empty, terminating analysis.
2025-07-27 07:50:19,546 [analyzer] INFO: Terminating remaining processes before shutdown.
2025-07-27 07:50:19,546 [analyzer] INFO: Analysis completed.

Cuckoo Log

2025-07-30 22:16:16,942 [cuckoo.core.scheduler] INFO: Task #6791944: acquired machine win7x6413 (label=win7x6413)
2025-07-30 22:16:16,943 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.213 for task #6791944
2025-07-30 22:16:17,808 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 2266734 (interface=vboxnet0, host=192.168.168.213)
2025-07-30 22:16:18,025 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x6413
2025-07-30 22:16:19,050 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x6413 to vmcloak
2025-07-30 22:19:45,639 [cuckoo.core.guest] INFO: Starting analysis #6791944 on guest (id=win7x6413, ip=192.168.168.213)
2025-07-30 22:19:46,648 [cuckoo.core.guest] DEBUG: win7x6413: not ready yet
2025-07-30 22:19:51,685 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x6413, ip=192.168.168.213)
2025-07-30 22:19:52,180 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x6413, ip=192.168.168.213, monitor=latest, size=6660546)
2025-07-30 22:19:53,844 [cuckoo.core.resultserver] DEBUG: Task #6791944: live log analysis.log initialized.
2025-07-30 22:19:54,654 [cuckoo.core.resultserver] DEBUG: Task #6791944 is sending a BSON stream
2025-07-30 22:19:55,961 [cuckoo.core.resultserver] DEBUG: Task #6791944: File upload for 'shots/0001.jpg'
2025-07-30 22:19:55,983 [cuckoo.core.resultserver] DEBUG: Task #6791944 uploaded file length: 133559
2025-07-30 22:19:57,070 [cuckoo.core.resultserver] DEBUG: Task #6791944: File upload for 'curtain/1753595419.41.curtain.log'
2025-07-30 22:19:57,074 [cuckoo.core.resultserver] DEBUG: Task #6791944 uploaded file length: 36
2025-07-30 22:19:57,209 [cuckoo.core.resultserver] DEBUG: Task #6791944: File upload for 'sysmon/1753595419.55.sysmon.xml'
2025-07-30 22:19:57,217 [cuckoo.core.resultserver] DEBUG: Task #6791944 uploaded file length: 385018
2025-07-30 22:19:58,056 [cuckoo.core.resultserver] DEBUG: Task #6791944 had connection reset for <Context for LOG>
2025-07-30 22:19:59,407 [cuckoo.core.guest] INFO: win7x6413: analysis completed successfully
2025-07-30 22:19:59,433 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks
2025-07-30 22:19:59,466 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer
2025-07-30 22:20:01,290 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x6413 to path /srv/cuckoo/cwd/storage/analyses/6791944/memory.dmp
2025-07-30 22:20:01,298 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x6413
2025-07-30 22:23:13,475 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.213 for task #6791944
2025-07-30 22:23:14,045 [cuckoo.core.scheduler] DEBUG: Released database task #6791944
2025-07-30 22:23:14,102 [cuckoo.core.scheduler] INFO: Task #6791944: analysis procedure completed

Signatures

Yara rules detected for file (3 events)
description Checks if being debugged rule anti_dbg
description Affect system registries rule win_registry
description Affect system token rule win_token
This executable has a PDB path (1 event)
pdb_path C:\Users\Utilizador\Desktop\Testingvulnerabilities\x64\Release\Testingvulnerabilities.pdb
File has been identified by 12 AntiVirus engine on IRMA as malicious (12 events)
G Data Antivirus (Windows) Virus: Generic.Dacic.6196.8FF74CC2 (Engine A)
Avast Core Security (Linux) Win64:MalwareX-gen [Misc]
C4S ClamAV (Linux) Win.Malware.Tedy-10043980-0
Trellix (Linux) Trojan-FXND
WithSecure (Linux) Trojan.TR/Agent.mgfog
eScan Antivirus (Linux) Generic.Dacic.6196.8FF74CC2(DB)
ESET Security (Windows) a variant of Win32/Agent.AHGE trojan
Sophos Anti-Virus (Linux) Mal/Generic-S
DrWeb Antivirus (Linux) Trojan.MulDrop32.23046
Bitdefender Antivirus (Linux) Generic.Dacic.6196.8FF74CC2
Kaspersky Standard (Windows) HEUR:Trojan.Win64.Agent.gen
Emsisoft Commandline Scanner (Windows) Generic.Dacic.6196.8FF74CC2 (B)
File has been identified by 44 AntiVirus engines on VirusTotal as malicious (44 events)
Bkav W64.AIDetectMalware
Skyhigh BehavesLike.Win64.Dropper.kh
ALYac Generic.Dacic.6196.8FF74CC2
VIPRE Generic.Dacic.6196.8FF74CC2
CrowdStrike win/malicious_confidence_90% (D)
BitDefender Generic.Dacic.6196.8FF74CC2
K7GW Trojan ( 005c3a401 )
K7AntiVirus Trojan ( 005c3a401 )
Arcabit Generic.Dacic.6196.8FF74CC2
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
ESET-NOD32 a variant of Win32/Agent.AHGE
APEX Malicious
Avast Win64:MalwareX-gen [Misc]
ClamAV Win.Malware.Tedy-10043980-0
Kaspersky HEUR:Trojan.Win64.Agent.gen
SUPERAntiSpyware Trojan.Agent/Gen-Kryptik
MicroWorld-eScan Generic.Dacic.6196.8FF74CC2
Rising Trojan.Agent!1.12DA1 (CLASSIC)
Emsisoft Generic.Dacic.6196.8FF74CC2 (B)
F-Secure Trojan.TR/Agent.mgfog
Zillya Trojan.Agent.Win32.4206562
McAfeeD ti!DB08A5B1D50A
CTX exe.unknown.dacic
Jiangmin Trojan.Agent.fcla
Google Detected
Avira TR/Agent.mgfog
Antiy-AVL GrayWare/Win32.Wacapew
Gridinsoft Trojan.Win64.Agent.oa!s1
Microsoft Trojan:Win64/Tedy.PGT!MTB
GData Generic.Dacic.6196.8FF74CC2
Varist W64/Agent.NGBC
AhnLab-V3 Trojan/Win.Generic.R700341
VBA32 Trojan.Win64.Agent
DeepInstinct MALICIOUS
Malwarebytes Malware.AI.1349389179
Ikarus Trojan.Win32.Agent
Panda Trj/GdSda.A
Tencent Trojan.Win64.Agent.16001895
Yandex Trojan.Agent!h4C34edfiiM
TrellixENS Trojan-FXND!A8E5D946AE25
MaxSecure Trojan.Malware.121218.susgen
Fortinet W64/Agent.AHGE!tr
AVG Win64:MalwareX-gen [Misc]
Screenshots
Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action VT Location
No hosts contacted.
Cuckoo

We're processing your submission... This could take a few seconds.