Size | 358.5KB |
---|---|
Type | PE32 executable (GUI) Intel 80386, for MS Windows |
MD5 | 8d737122f285b1c3213fc5e9c2e2ba9e |
SHA1 | 281c9877ea1bef8721d97ec573eefb9a15206209 |
SHA256 | c534b47df5f355a17a5ef190f0273ec6e631e07fa8f301cad49ba942177f5dd5 |
SHA512 |
cd286279bfdab9c106aa2799991962d03d403e40cf3724a67724e5eb30c80cf1ad7dfabf96ae4b9ab21b9754d030cd39e337d733e997d71e16cdb50db421d024
|
CRC32 | 103F8DE2 |
ssdeep | None |
Yara |
|
This file is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | July 27, 2025, 3:58 p.m. | July 27, 2025, 4:05 p.m. | 404 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-07-26 05:40:59,015 [analyzer] DEBUG: Starting analyzer from: C:\tmpdrdvpd 2025-07-26 05:40:59,015 [analyzer] DEBUG: Pipe server name: \??\PIPE\CNMhcWqFBDFjlLnpGamSIxuFLbMy 2025-07-26 05:40:59,015 [analyzer] DEBUG: Log pipe server name: \??\PIPE\gAEQuPpggnSwQiGxWMlU 2025-07-26 05:40:59,280 [analyzer] DEBUG: Started auxiliary module Curtain 2025-07-26 05:40:59,280 [analyzer] DEBUG: Started auxiliary module DbgView 2025-07-26 05:40:59,967 [analyzer] DEBUG: Started auxiliary module Disguise 2025-07-26 05:41:00,203 [analyzer] DEBUG: Loaded monitor into process with pid 508 2025-07-26 05:41:00,203 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-07-26 05:41:00,203 [analyzer] DEBUG: Started auxiliary module Human 2025-07-26 05:41:00,203 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-07-26 05:41:00,217 [analyzer] DEBUG: Started auxiliary module Reboot 2025-07-26 05:41:00,328 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-07-26 05:41:00,328 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-07-26 05:41:00,328 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-07-26 05:41:00,328 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-07-26 05:41:00,483 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\c534b47df5f355a17a5ef190f0273ec6e631e07fa8f301cad49ba942177f5dd5.exe' with arguments '' and pid 2552 2025-07-26 05:41:00,687 [analyzer] DEBUG: Loaded monitor into process with pid 2552 2025-07-26 05:41:00,921 [analyzer] INFO: Added new file to list with pid 2552 and path C:\Windows\AppPatch\svchost.exe 2025-07-26 05:41:01,030 [analyzer] INFO: Injected into process with pid 708 and name u'svchost.exe' 2025-07-26 05:41:01,483 [analyzer] INFO: Process with pid 2552 has terminated 2025-07-26 05:41:29,483 [analyzer] INFO: Analysis timeout hit, terminating analysis. 2025-07-26 05:41:30,046 [analyzer] INFO: Terminating remaining processes before shutdown. 2025-07-26 05:41:30,046 [lib.api.process] INFO: Successfully terminated process with pid 708. 2025-07-26 05:41:30,062 [analyzer] INFO: Analysis completed.
2025-07-27 15:58:46,157 [cuckoo.core.scheduler] INFO: Task #6772929: acquired machine win7x6412 (label=win7x6412) 2025-07-27 15:58:46,158 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.212 for task #6772929 2025-07-27 15:58:46,609 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 1307948 (interface=vboxnet0, host=192.168.168.212) 2025-07-27 15:58:47,834 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x6412 2025-07-27 15:58:49,434 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x6412 to vmcloak 2025-07-27 16:01:53,585 [cuckoo.core.guest] INFO: Starting analysis #6772929 on guest (id=win7x6412, ip=192.168.168.212) 2025-07-27 16:01:54,592 [cuckoo.core.guest] DEBUG: win7x6412: not ready yet 2025-07-27 16:01:59,725 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x6412, ip=192.168.168.212) 2025-07-27 16:02:00,152 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x6412, ip=192.168.168.212, monitor=latest, size=6660546) 2025-07-27 16:02:01,633 [cuckoo.core.resultserver] DEBUG: Task #6772929: live log analysis.log initialized. 2025-07-27 16:02:03,116 [cuckoo.core.resultserver] DEBUG: Task #6772929 is sending a BSON stream 2025-07-27 16:02:03,229 [cuckoo.core.resultserver] DEBUG: Task #6772929 is sending a BSON stream 2025-07-27 16:02:03,682 [cuckoo.core.resultserver] DEBUG: Task #6772929: File upload for 'files/c534b47df5f355a1_50A1.tmp' 2025-07-27 16:02:03,703 [cuckoo.core.resultserver] DEBUG: Task #6772929 uploaded file length: 367104 2025-07-27 16:02:04,225 [cuckoo.core.resultserver] DEBUG: Task #6772929: File upload for 'shots/0001.jpg' 2025-07-27 16:02:04,297 [cuckoo.core.resultserver] DEBUG: Task #6772929 uploaded file length: 133459 2025-07-27 16:02:16,538 [cuckoo.core.guest] DEBUG: win7x6412: analysis #6772929 still processing 2025-07-27 16:02:31,868 [cuckoo.core.guest] DEBUG: win7x6412: analysis #6772929 still processing 2025-07-27 16:02:32,419 [cuckoo.core.resultserver] DEBUG: Task #6772929: File upload for 'curtain/1753501289.77.curtain.log' 2025-07-27 16:02:32,426 [cuckoo.core.resultserver] DEBUG: Task #6772929 uploaded file length: 36 2025-07-27 16:02:32,624 [cuckoo.core.resultserver] DEBUG: Task #6772929: File upload for 'sysmon/1753501289.98.sysmon.xml' 2025-07-27 16:02:32,705 [cuckoo.core.resultserver] DEBUG: Task #6772929 uploaded file length: 1566560 2025-07-27 16:02:32,741 [cuckoo.core.resultserver] DEBUG: Task #6772929: File upload for 'files/f8ea354785b862c5_svchost.exe' 2025-07-27 16:02:32,783 [cuckoo.core.resultserver] DEBUG: Task #6772929 uploaded file length: 367104 2025-07-27 16:02:33,275 [cuckoo.core.resultserver] DEBUG: Task #6772929 had connection reset for <Context for LOG> 2025-07-27 16:02:34,911 [cuckoo.core.guest] INFO: win7x6412: analysis completed successfully 2025-07-27 16:02:34,959 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-07-27 16:02:34,998 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-07-27 16:02:36,544 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x6412 to path /srv/cuckoo/cwd/storage/analyses/6772929/memory.dmp 2025-07-27 16:02:36,593 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x6412 2025-07-27 16:05:23,359 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.212 for task #6772929 2025-07-27 16:05:23,801 [cuckoo.core.scheduler] DEBUG: Released database task #6772929 2025-07-27 16:05:30,438 [cuckoo.core.scheduler] INFO: Task #6772929: analysis procedure completed
description | SpyEye X.Y memory | rule | spyeye | ||||||
description | Memory string yara for Shifu/Shiz | rule | shifu_shiz | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Anti-Sandbox checks for ThreatExpert | rule | antisb_threatExpert | ||||||
description | AntiVM checks for Bios version | rule | antivm_bios | ||||||
description | Code injection with CreateRemoteThread in a remote process | rule | inject_thread | ||||||
description | Communications over HTTP | rule | network_http | ||||||
description | Communications over RAW socket | rule | network_tcp_socket | ||||||
description | Communications use DNS | rule | network_dns | ||||||
description | Escalade priviledges | rule | escalate_priv |
file | C:\Windows\AppPatch\svchost.exe |
cmdline | C:\Windows\AppPatch\svchost.exe |
file | C:\Windows\AppPatch\svchost.exe |
file | C:\Program Files (x86)\AVG\AVG9\dfncfg.dat |
registry | HKEY_LOCAL_MACHINE\SystemBiosVersion |
G Data Antivirus (Windows) | Virus: Backdoor.Simda.A (Engine A), Win32.Trojan.Spyshiz.A (Engine B) |
Avast Core Security (Linux) | Win32:Shiz-JT [Trj] |
C4S ClamAV (Linux) | Win.Trojan.Shiz-9949267-0 |
Trellix (Linux) | BackDoor-FDOB |
WithSecure (Linux) | Trojan.TR/Hijacker.Gen |
eScan Antivirus (Linux) | Backdoor.Simda.A(DB) |
ESET Security (Windows) | a variant of Win32/Spy.Shiz.NBX trojan |
Sophos Anti-Virus (Linux) | Troj/Shiz-Gen |
DrWeb Antivirus (Linux) | Trojan.PWS.Ibank.300 |
ClamAV (Linux) | Win.Trojan.Shiz-9949267-0 |
Bitdefender Antivirus (Linux) | Backdoor.Simda.A |
Kaspersky Standard (Windows) | HEUR:Backdoor.Win32.Generic |
Emsisoft Commandline Scanner (Windows) | Backdoor.Simda.A (B) |