Size | 361.0KB |
---|---|
Type | PE32 executable (GUI) Intel 80386, for MS Windows |
MD5 | d154aaa526a579271fa220ac1ee46fba |
SHA1 | 427c284ef6a2f2926424b31043466f4a19508360 |
SHA256 | ec08a7de98f01100484b532ebda70b0ecc679b178704a19ad59b7ff16b37d768 |
SHA512 |
11de4fbe80643834c15d9599457d7df6bb89c5bce964aa3b9c0ec726ca77e3a8a64145cda21443c1350f8feee09330a5c059586f2090d8edccbdaf070046c4b1
|
CRC32 | 56E00C45 |
ssdeep | None |
PDB Path | f:\软件工ç¨\驱å¨ç¼ç¨\OK\KernelYK\bin\InstallSYS.pdb |
Yara |
|
This file is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | July 18, 2025, 4:30 a.m. | July 18, 2025, 4:37 a.m. | 451 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-07-14 05:07:11,030 [analyzer] DEBUG: Starting analyzer from: C:\tmpl4240h 2025-07-14 05:07:11,030 [analyzer] DEBUG: Pipe server name: \??\PIPE\pTJOHKiAEXzAaTFOJehi 2025-07-14 05:07:11,030 [analyzer] DEBUG: Log pipe server name: \??\PIPE\HDIMYHNHtBYuVgwHscEw 2025-07-14 05:07:11,030 [analyzer] DEBUG: No analysis package specified, trying to detect it automagically. 2025-07-14 05:07:11,046 [analyzer] INFO: Automatically selected analysis package "exe" 2025-07-14 05:07:11,312 [analyzer] DEBUG: Started auxiliary module Curtain 2025-07-14 05:07:11,312 [analyzer] DEBUG: Started auxiliary module DbgView 2025-07-14 05:07:11,796 [analyzer] DEBUG: Started auxiliary module Disguise 2025-07-14 05:07:12,015 [analyzer] DEBUG: Loaded monitor into process with pid 508 2025-07-14 05:07:12,015 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-07-14 05:07:12,015 [analyzer] DEBUG: Started auxiliary module Human 2025-07-14 05:07:12,015 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-07-14 05:07:12,030 [analyzer] DEBUG: Started auxiliary module Reboot 2025-07-14 05:07:12,092 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-07-14 05:07:12,092 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-07-14 05:07:12,092 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-07-14 05:07:12,108 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-07-14 05:07:12,250 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\ec08a7de98f01100_i_zxrpkhcaus.exe' with arguments '' and pid 2528 2025-07-14 05:07:12,405 [analyzer] DEBUG: Loaded monitor into process with pid 2528 2025-07-14 05:07:12,921 [analyzer] INFO: Added new file to list with pid 2528 and path C:\Temp\CreateProcess.exe 2025-07-14 05:07:13,921 [analyzer] INFO: Added new file to list with pid 2528 and path C:\Temp\ywrojgbztrljebwt.exe 2025-07-14 05:07:13,983 [analyzer] INFO: Injected into process with pid 124 and name u'ywrojgbztrljebwt.exe' 2025-07-14 05:07:14,078 [analyzer] INFO: Injected into process with pid 2924 and name u'iexplore.exe' 2025-07-14 05:07:14,125 [analyzer] DEBUG: Loaded monitor into process with pid 124 2025-07-14 05:07:14,155 [analyzer] INFO: Added new file to list with pid 124 and path \Device\NamedPipe\lsass 2025-07-14 05:07:14,280 [analyzer] DEBUG: Loaded monitor into process with pid 2924 2025-07-14 05:07:16,078 [analyzer] INFO: Added new file to list with pid 2528 and path C:\Temp\ywrojgbztrljebwt.sys 2025-07-14 05:07:16,250 [analyzer] INFO: Process with pid 2528 has terminated 2025-07-14 05:07:16,812 [analyzer] INFO: Added new file to list with pid 124 and path C:\Temp\icsmkecxup.exe 2025-07-14 05:07:16,875 [analyzer] INFO: Injected into process with pid 2964 and name u'CreateProcess.exe' 2025-07-14 05:07:17,030 [analyzer] DEBUG: Loaded monitor into process with pid 2964 2025-07-14 05:07:18,250 [analyzer] INFO: Process with pid 2964 has terminated 2025-07-14 05:07:19,280 [analyzer] INFO: Added new file to list with pid 124 and path C:\Temp\i_icsmkecxup.exe 2025-07-14 05:07:24,687 [analyzer] INFO: Added new file to list with pid 124 and path C:\Temp\cxupmhfzxr.exe 2025-07-14 05:10:31,280 [analyzer] INFO: Analysis timeout hit, terminating analysis. 2025-07-14 05:10:32,217 [analyzer] INFO: Terminating remaining processes before shutdown. 2025-07-14 05:10:32,217 [lib.api.process] INFO: Successfully terminated process with pid 124. 2025-07-14 05:10:32,217 [lib.api.process] INFO: Successfully terminated process with pid 2924. 2025-07-14 05:10:32,217 [analyzer] WARNING: File at path u'\\device\\namedpipe\\lsass' does not exist, skip. 2025-07-14 05:10:32,250 [analyzer] INFO: Analysis completed.
2025-07-18 04:30:16,974 [cuckoo.core.scheduler] INFO: Task #6729875: acquired machine win7x649 (label=win7x649) 2025-07-18 04:30:16,975 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.209 for task #6729875 2025-07-18 04:30:17,285 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 1701436 (interface=vboxnet0, host=192.168.168.209) 2025-07-18 04:30:17,625 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x649 2025-07-18 04:30:18,537 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x649 to vmcloak 2025-07-18 04:32:34,957 [cuckoo.core.guest] INFO: Starting analysis #6729875 on guest (id=win7x649, ip=192.168.168.209) 2025-07-18 04:32:35,962 [cuckoo.core.guest] DEBUG: win7x649: not ready yet 2025-07-18 04:32:40,994 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x649, ip=192.168.168.209) 2025-07-18 04:32:41,073 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x649, ip=192.168.168.209, monitor=latest, size=6660546) 2025-07-18 04:32:42,318 [cuckoo.core.resultserver] DEBUG: Task #6729875: live log analysis.log initialized. 2025-07-18 04:32:43,274 [cuckoo.core.resultserver] DEBUG: Task #6729875 is sending a BSON stream 2025-07-18 04:32:43,664 [cuckoo.core.resultserver] DEBUG: Task #6729875 is sending a BSON stream 2025-07-18 04:32:44,511 [cuckoo.core.resultserver] DEBUG: Task #6729875: File upload for 'shots/0001.jpg' 2025-07-18 04:32:44,529 [cuckoo.core.resultserver] DEBUG: Task #6729875 uploaded file length: 133456 2025-07-18 04:32:45,383 [cuckoo.core.resultserver] DEBUG: Task #6729875 is sending a BSON stream 2025-07-18 04:32:45,476 [cuckoo.core.resultserver] DEBUG: Task #6729875 is sending a BSON stream 2025-07-18 04:32:48,275 [cuckoo.core.resultserver] DEBUG: Task #6729875 is sending a BSON stream 2025-07-18 04:32:48,606 [cuckoo.core.resultserver] DEBUG: Task #6729875: File upload for 'files/7fbefae7f75f291c_icsmkecxup.exe' 2025-07-18 04:32:48,681 [cuckoo.core.resultserver] DEBUG: Task #6729875 uploaded file length: 369664 2025-07-18 04:32:53,341 [cuckoo.core.resultserver] DEBUG: Task #6729875: File upload for 'files/9da146755730e024_i_icsmkecxup.exe' 2025-07-18 04:32:53,347 [cuckoo.core.resultserver] DEBUG: Task #6729875 uploaded file length: 369664 2025-07-18 04:32:57,072 [cuckoo.core.guest] DEBUG: win7x649: analysis #6729875 still processing 2025-07-18 04:33:12,155 [cuckoo.core.guest] DEBUG: win7x649: analysis #6729875 still processing 2025-07-18 04:33:27,347 [cuckoo.core.guest] DEBUG: win7x649: analysis #6729875 still processing 2025-07-18 04:33:42,424 [cuckoo.core.guest] DEBUG: win7x649: analysis #6729875 still processing 2025-07-18 04:33:57,557 [cuckoo.core.guest] DEBUG: win7x649: analysis #6729875 still processing 2025-07-18 04:34:12,736 [cuckoo.core.guest] DEBUG: win7x649: analysis #6729875 still processing 2025-07-18 04:34:27,840 [cuckoo.core.guest] DEBUG: win7x649: analysis #6729875 still processing 2025-07-18 04:34:42,931 [cuckoo.core.guest] DEBUG: win7x649: analysis #6729875 still processing 2025-07-18 04:34:58,013 [cuckoo.core.guest] DEBUG: win7x649: analysis #6729875 still processing 2025-07-18 04:35:13,101 [cuckoo.core.guest] DEBUG: win7x649: analysis #6729875 still processing 2025-07-18 04:35:28,199 [cuckoo.core.guest] DEBUG: win7x649: analysis #6729875 still processing 2025-07-18 04:35:43,292 [cuckoo.core.guest] DEBUG: win7x649: analysis #6729875 still processing 2025-07-18 04:35:58,386 [cuckoo.core.guest] DEBUG: win7x649: analysis #6729875 still processing 2025-07-18 04:36:02,778 [cuckoo.core.resultserver] DEBUG: Task #6729875: File upload for 'curtain/1752462631.45.curtain.log' 2025-07-18 04:36:02,785 [cuckoo.core.resultserver] DEBUG: Task #6729875 uploaded file length: 36 2025-07-18 04:36:03,448 [cuckoo.core.resultserver] DEBUG: Task #6729875: File upload for 'sysmon/1752462632.12.sysmon.xml' 2025-07-18 04:36:03,540 [cuckoo.core.resultserver] DEBUG: Task #6729875 uploaded file length: 10029638 2025-07-18 04:36:03,560 [cuckoo.core.resultserver] DEBUG: Task #6729875: File upload for 'files/bc5a750469c9de6e_createprocess.exe' 2025-07-18 04:36:03,563 [cuckoo.core.resultserver] DEBUG: Task #6729875 uploaded file length: 3584 2025-07-18 04:36:03,565 [cuckoo.core.resultserver] DEBUG: Task #6729875: File upload for 'files/371049ea45dda5e3_ywrojgbztrljebwt.sys' 2025-07-18 04:36:03,568 [cuckoo.core.resultserver] DEBUG: Task #6729875: File upload for 'files/1713cf2cc3347542_cxupmhfzxr.exe' 2025-07-18 04:36:03,572 [cuckoo.core.resultserver] DEBUG: Task #6729875: File upload for 'files/517e56097cc738ea_ywrojgbztrljebwt.exe' 2025-07-18 04:36:03,582 [cuckoo.core.resultserver] DEBUG: Task #6729875 uploaded file length: 300544 2025-07-18 04:36:03,586 [cuckoo.core.resultserver] DEBUG: Task #6729875 uploaded file length: 369664 2025-07-18 04:36:03,590 [cuckoo.core.resultserver] DEBUG: Task #6729875 uploaded file length: 369664 2025-07-18 04:36:03,595 [cuckoo.core.resultserver] DEBUG: Task #6729875 had connection reset for <Context for LOG> 2025-07-18 04:36:04,414 [cuckoo.core.guest] INFO: win7x649: analysis completed successfully 2025-07-18 04:36:04,431 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-07-18 04:36:04,471 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-07-18 04:36:05,648 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x649 to path /srv/cuckoo/cwd/storage/analyses/6729875/memory.dmp 2025-07-18 04:36:05,650 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x649 2025-07-18 04:37:47,493 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.209 for task #6729875 2025-07-18 04:37:47,857 [cuckoo.core.scheduler] DEBUG: Released database task #6729875 2025-07-18 04:37:47,874 [cuckoo.core.scheduler] INFO: Task #6729875: analysis procedure completed
description | Possibly employs anti-virtualization techniques | rule | vmdetect | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Code injection with CreateRemoteThread in a remote process | rule | inject_thread | ||||||
description | Create a windows service | rule | create_service | ||||||
description | Communications over HTTP | rule | network_http | ||||||
description | File downloader/dropper | rule | network_dropper | ||||||
description | Communications over RAW socket | rule | network_tcp_socket | ||||||
description | Escalade priviledges | rule | escalate_priv | ||||||
description | Take screenshot | rule | screenshot | ||||||
description | Run a keylogger | rule | keylogger |
pdb_path | f:\软件工ç¨\驱å¨ç¼ç¨\OK\KernelYK\bin\InstallSYS.pdb |
name | RT_ICON | language | LANG_CHINESE | filetype | Device independent bitmap graphic, 13 x 26 x 8, image size 208, 256 important colors | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0005bec0 | size | 0x0000052c | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | Device independent bitmap graphic, 13 x 26 x 8, image size 208, 256 important colors | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0005bec0 | size | 0x0000052c | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | Device independent bitmap graphic, 13 x 26 x 8, image size 208, 256 important colors | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0005bec0 | size | 0x0000052c | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | Device independent bitmap graphic, 13 x 26 x 8, image size 208, 256 important colors | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0005bec0 | size | 0x0000052c | ||||||||||||||||||
name | RT_DIALOG | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0005c3ec | size | 0x00000094 | ||||||||||||||||||
name | RT_GROUP_ICON | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0005c480 | size | 0x0000003e | ||||||||||||||||||
name | RT_VERSION | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0005c4c0 | size | 0x000002cc |
file | C:\Temp\icsmkecxup.exe |
file | C:\Temp\i_icsmkecxup.exe |
file | C:\Temp\cxupmhfzxr.exe |
file | C:\Temp\ywrojgbztrljebwt.exe |
file | C:\Temp\CreateProcess.exe |
cmdline | C:\Program Files\Internet Explorer\iexplore.exe http://xytets.com:2345/t.asp?os=home |
G Data Antivirus (Windows) | Virus: Trojan.Generic.7761207 (Engine A), Win32.Trojan.PSE1.YSVY3N (Engine B) |
Avast Core Security (Linux) | MBR:Backboot-D [Rtk] |
C4S ClamAV (Linux) | Win.Malware.Mikey-9949492-0 |
Trellix (Linux) | Generic Dropper.aoe trojan |
WithSecure (Linux) | Trojan.TR/Rogue.7909438 |
eScan Antivirus (Linux) | Trojan.Generic.7761207(DB) |
ESET Security (Windows) | Win32/Agent.PGA trojan |
Sophos Anti-Virus (Linux) | Troj/Drop-GZ |
DrWeb Antivirus (Linux) | Trojan.Click2.32800 |
ClamAV (Linux) | Win.Malware.Mikey-9949492-0 |
Bitdefender Antivirus (Linux) | Trojan.Generic.7761207 |
Kaspersky Standard (Windows) | Trojan.Win32.Tiny.cm |
Emsisoft Commandline Scanner (Windows) | Trojan.Generic.7761207 (B) |
Bkav | W32.AlustinD.Trojan |
K7AntiVirus | Riskware ( 0040eff71 ) |
Lionic | Troj.Agent.lBUp |
MicroWorld-eScan | Trojan.Generic.7761207 |
CMC | Trojan-Dropper.Win32!O |
CAT-QuickHeal | Trojan.Systex.A5 |
ALYac | Trojan.Generic.7761207 |
Cylance | Unsafe |
TheHacker | Trojan/Agent.pga |
BitDefender | Trojan.Generic.7761207 |
K7GW | Riskware ( 0040eff71 ) |
Cybereason | malicious.526a57 |
Arcabit | Trojan.Generic.D766D37 |
Invincea | heuristic |
Baidu | Win32.Rootkit.Agent.w |
Cyren | W32/Pleh.A.gen!Eldorado |
Symantec | Trojan.Dropper |
TrendMicro-HouseCall | TSPY_ROGUE_BK084025.TOMC |
Avast | Win32:Agent-AUSD [Rtk] |
ClamAV | Win.Trojan.Agent-410649 |
Kaspersky | Trojan.Win32.Tiny.cm |
NANO-Antivirus | Trojan.Win32.Invader.vxfyv |
SUPERAntiSpyware | Trojan.Agent/Gen-Systex |
Rising | Backdoor.Farfli!1.64D7 (RDM+:cmRtazp4F9NQjKSyKWcnaje34Kny) |
Ad-Aware | Trojan.Generic.7761207 |
Emsisoft | Trojan.Generic.7761207 (B) |
F-Secure | Trojan.Generic.7761207 |
DrWeb | Trojan.Click2.32800 |
Zillya | Dropper.Daws.Win32.2427 |
TrendMicro | TSPY_ROGUE_BK084025.TOMC |
McAfee-GW-Edition | Generic Dropper.afz |
Sophos | Troj/Drop-GZ |
Ikarus | Trojan.SuspectCRC |
F-Prot | W32/Pleh.A.gen!Eldorado |
Jiangmin | Trojan/Invader.gje |
Webroot | W32.Invader |
Avira | TR/Rogue.79556412 |
MAX | malware (ai score=84) |
Antiy-AVL | Trojan[Dropper]/Win32.Daws.aumx |
Kingsoft | Win32.Troj.Undef.(kcloud) |
Microsoft | TrojanDropper:Win32/Systex.A |
Endgame | malicious (high confidence) |
ViRobot | Dropper.Daws.Gen.A |
AhnLab-V3 | Dropper/Win32.Daws.R34837 |
ZoneAlarm | HEUR:Trojan.Win32.Generic |
GData | Trojan.Generic.7761207 |
ESET-NOD32 | Win32/Agent.PGA |
McAfee | Generic Dropper.afz |
AVware | Trojan.Win32.Invader.b (v) |
TACHYON | Trojan-Dropper/W32.Daws.369664 |