| Size | 1.4MB |
|---|---|
| Type | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5 | 6b99e07b50a94776c2b4a22e4abb993d |
| SHA1 | ca0082da4b86c40260d21a28297100bfae584064 |
| SHA256 | 4b94270d77479578ce5d88659bc8e76024c8456578392a341971fbe006e01963 |
| SHA512 |
7e270dd975d0381dd68c3aa46b21b74e312fc95a1cd590375f5a7b552d1387a171af871c9f8860dcc0a5e377764e205845a584ba01890f2f1787b47f9cfa50ec
|
| CRC32 | F66420E4 |
| ssdeep | None |
| Yara |
|
This file is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
| Category | Started | Completed | Duration | Routing | Logs |
|---|---|---|---|---|---|
| FILE | Oct. 13, 2025, 6:44 a.m. | Oct. 13, 2025, 6:47 a.m. | 209 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-10-13 06:43:57,000 [analyzer] DEBUG: Starting analyzer from: C:\tmp2pjrvv 2025-10-13 06:43:57,030 [analyzer] DEBUG: Pipe server name: \??\PIPE\zpCsvuLEvZyTFQYkiczsZhtFvP 2025-10-13 06:43:57,030 [analyzer] DEBUG: Log pipe server name: \??\PIPE\FLWzGkzDdnQMQXtUDYIBEhKYF 2025-10-13 06:43:57,296 [analyzer] DEBUG: Started auxiliary module Curtain 2025-10-13 06:43:57,312 [analyzer] DEBUG: Started auxiliary module DbgView 2025-10-13 06:43:57,733 [analyzer] DEBUG: Started auxiliary module Disguise 2025-10-13 06:43:57,953 [analyzer] DEBUG: Loaded monitor into process with pid 504 2025-10-13 06:43:57,953 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-10-13 06:43:57,953 [analyzer] DEBUG: Started auxiliary module Human 2025-10-13 06:43:57,953 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-10-13 06:43:57,953 [analyzer] DEBUG: Started auxiliary module Reboot 2025-10-13 06:43:58,092 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-10-13 06:43:58,092 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-10-13 06:43:58,092 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-10-13 06:43:58,092 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-10-13 06:43:58,233 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\4b94270d77479578ce5d88659bc8e76024c8456578392a341971fbe006e01963.exe' with arguments '' and pid 2784 2025-10-13 06:43:58,421 [analyzer] DEBUG: Loaded monitor into process with pid 2784 2025-10-13 05:45:37,992 [analyzer] INFO: Analysis timeout hit, terminating analysis. 2025-10-13 05:45:38,257 [lib.api.process] ERROR: Failed to dump memory of 32-bit process with pid 2784. 2025-10-13 05:45:38,710 [analyzer] INFO: Terminating remaining processes before shutdown. 2025-10-13 05:45:38,710 [lib.api.process] INFO: Successfully terminated process with pid 2784. 2025-10-13 05:45:38,710 [analyzer] INFO: Analysis completed.
2025-10-13 06:44:12,560 [cuckoo.core.scheduler] INFO: Task #7030552: acquired machine win7x648 (label=win7x648) 2025-10-13 06:44:12,563 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.208 for task #7030552 2025-10-13 06:44:12,871 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 469147 (interface=vboxnet0, host=192.168.168.208) 2025-10-13 06:44:17,279 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x648 2025-10-13 06:44:17,936 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x648 to vmcloak 2025-10-13 06:44:54,991 [cuckoo.core.guest] INFO: Starting analysis #7030552 on guest (id=win7x648, ip=192.168.168.208) 2025-10-13 06:44:56,060 [cuckoo.core.guest] DEBUG: win7x648: not ready yet 2025-10-13 06:45:01,220 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x648, ip=192.168.168.208) 2025-10-13 06:45:06,108 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x648, ip=192.168.168.208, monitor=latest, size=6660546) 2025-10-13 06:45:07,750 [cuckoo.core.resultserver] DEBUG: Task #7030552: live log analysis.log initialized. 2025-10-13 06:45:08,684 [cuckoo.core.resultserver] DEBUG: Task #7030552 is sending a BSON stream 2025-10-13 06:45:09,105 [cuckoo.core.resultserver] DEBUG: Task #7030552 is sending a BSON stream 2025-10-13 06:45:09,983 [cuckoo.core.resultserver] DEBUG: Task #7030552: File upload for 'shots/0001.jpg' 2025-10-13 06:45:10,060 [cuckoo.core.resultserver] DEBUG: Task #7030552 uploaded file length: 146121 2025-10-13 06:45:23,316 [cuckoo.core.guest] DEBUG: win7x648: analysis #7030552 still processing 2025-10-13 06:45:38,641 [cuckoo.core.resultserver] DEBUG: Task #7030552: File upload for 'curtain/1760327138.48.curtain.log' 2025-10-13 06:45:38,673 [cuckoo.core.resultserver] DEBUG: Task #7030552 uploaded file length: 36 2025-10-13 06:45:38,878 [cuckoo.core.resultserver] DEBUG: Task #7030552: File upload for 'sysmon/1760327138.71.sysmon.xml' 2025-10-13 06:45:39,005 [cuckoo.core.guest] INFO: win7x648: analysis completed successfully 2025-10-13 06:45:39,077 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-10-13 06:45:39,127 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-10-13 06:45:39,139 [cuckoo.core.resultserver] DEBUG: Task #7030552 uploaded file length: 942846 2025-10-13 06:45:39,959 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x648 to path /srv/cuckoo/cwd/storage/analyses/7030552/memory.dmp 2025-10-13 06:45:39,988 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x648 2025-10-13 06:45:41,107 [cuckoo.core.resultserver] DEBUG: Task #7030552: File upload for 'shots/0002.jpg' 2025-10-13 06:45:41,198 [cuckoo.core.resultserver] DEBUG: Task #7030552 uploaded file length: 133498 2025-10-13 06:45:41,230 [cuckoo.core.resultserver] DEBUG: Task #7030552 had connection reset for <Context for LOG> 2025-10-13 06:47:40,817 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.208 for task #7030552 2025-10-13 06:47:41,413 [cuckoo.core.scheduler] DEBUG: Released database task #7030552 2025-10-13 06:47:41,457 [cuckoo.core.scheduler] INFO: Task #7030552: analysis procedure completed
| description | Checks if being debugged | rule | anti_dbg | ||||||
| description | Listen for incoming communication | rule | network_tcp_listen | ||||||
| description | Communications over RAW socket | rule | network_tcp_socket | ||||||
| description | Communications use DNS | rule | network_dns | ||||||
| description | Take screenshot | rule | screenshot | ||||||
| description | Create or check mutex | rule | win_mutex | ||||||
| description | Affect system registries | rule | win_registry | ||||||
| description | Affect system token | rule | win_token | ||||||
| description | Affect private profile | rule | win_files_operation | ||||||
| section | .00cfg |
| section | .voltbl |
| resource name | None |
| section | {u'size_of_data': u'0x0005ac00', u'virtual_address': u'0x00109000', u'entropy': 7.826598818837417, u'name': u'.rsrc', u'virtual_size': u'0x0005ab48'} | entropy | 7.82659881884 | description | A section with a high entropy has been found | |||||||||
| section | {u'size_of_data': u'0x0000b400', u'virtual_address': u'0x00164000', u'entropy': 6.882151568761567, u'name': u'.reloc', u'virtual_size': u'0x0000b400'} | entropy | 6.88215156876 | description | A section with a high entropy has been found | |||||||||
| entropy | 0.284122562674 | description | Overall entropy of this PE file is high | |||||||||||
| registry | HKEY_CURRENT_USER\Software\SimonTatham\PuTTY\Sessions |
| G Data Antivirus (Windows) | Virus: Gen:Variant.Razy.15265 (Engine A) |
| Avast Core Security (Linux) | Win32:Evo-gen [Trj] |
| Trellix (Linux) | MalHeur-FAG |
| WithSecure (Linux) | Trojan.TR/Rozena.jinsf |
| eScan Antivirus (Linux) | Gen:Variant.Razy.15265(DB) |
| ESET Security (Windows) | a variant of Win32/Rozena.WI trojan |
| Sophos Anti-Virus (Linux) | Mal/Generic-S |
| Bitdefender Antivirus (Linux) | Gen:Variant.Razy.15265 |
| Kaspersky Standard (Windows) | HEUR:Trojan.Win32.Cometer.gen |
| Emsisoft Commandline Scanner (Windows) | Gen:Variant.Razy.15265 (B) |
| Bkav | W32.AIDetectMalware |
| Lionic | Trojan.Win32.Rozena.4!c |
| tehtris | Generic.Malware |
| Cynet | Malicious (score: 100) |
| CAT-QuickHeal | Trojan.Ghanarava.1723248232bb993d |
| Skyhigh | BehavesLike.Win32.MalHeur.tc |
| ALYac | Gen:Variant.Razy.15265 |
| Cylance | Unsafe |
| VIPRE | Gen:Variant.Razy.15265 |
| Sangfor | Trojan.Win32.Save.a |
| CrowdStrike | win/malicious_confidence_100% (W) |
| BitDefender | Gen:Variant.Razy.15265 |
| K7GW | Trojan ( 005187541 ) |
| K7AntiVirus | Trojan ( 005187541 ) |
| Arcabit | Trojan.Razy.D3BA1 |
| Symantec | ML.Attribute.HighConfidence |
| Elastic | malicious (high confidence) |
| ESET-NOD32 | a variant of Win32/Rozena.WI |
| APEX | Malicious |
| Avast | Win32:Evo-gen [Trj] |
| Kaspersky | HEUR:Trojan.Win32.Cometer.gen |
| Alibaba | Trojan:Win32/Swrort.ffe08c29 |
| MicroWorld-eScan | Gen:Variant.Razy.15265 |
| Rising | Trojan.ShellCodeRunner!1.F3BD (CLASSIC) |
| Emsisoft | Gen:Variant.Razy.15265 (B) |
| F-Secure | Trojan.TR/Rozena.jinsf |
| Zillya | Trojan.Generic.Win32.1855874 |
| TrendMicro | TROJ_GEN.R002C0DAL25 |
| McAfeeD | ti!4B94270D7747 |
| Trapmine | malicious.moderate.ml.score |
| CTX | exe.trojan.rozena |
| Sophos | Mal/Generic-S |
| SentinelOne | Static AI - Suspicious PE |
| Jiangmin | Trojan.Cometer.cwj |
| Detected | |
| Avira | TR/Rozena.jinsf |
| Antiy-AVL | Trojan/Win32.Cometer |
| Kingsoft | Win32.Trojan.Cometer.gen |
| Xcitium | Malware@#304uyhez9tt25 |
| Microsoft | Trojan:Win32/Swrort!pz |
| GData | Gen:Variant.Razy.15265 |
| Varist | W32/Rozena.HR.gen!Eldorado |
| AhnLab-V3 | Trojan/Win.FAG.C5564740 |
| Acronis | suspicious |
| VBA32 | BScope.TrojanDownloader.Upatre |
| TACHYON | Trojan/W32.Cometer.1471488.B |
| DeepInstinct | MALICIOUS |
| Malwarebytes | Floxif.Virus.FileInfector.DDS |
| Ikarus | Trojan.Agent |
| Panda | Trj/Genetic.gen |