Summary | ZeroBOX

main.exe

Gen1 Suspicious_Script_Bin Generic Malware Malicious Library Downloader UPX Malicious Packer Anti_VM PE64 PNG Format PE File OS Processor Check PE32 DLL icon
Category Machine Started Completed
FILE s1_win7_x6403_us April 4, 2023, 7:08 a.m. April 4, 2023, 7:12 a.m.
Size 11.9MB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 07c9d25aeb2b712910258043749c7023
SHA256 0857cb13e21a082547ebd0f161b5c36be1766a6f16f7d83be06f8bc57dcb760d
CRC32 C688FAA7
ssdeep 196608:A4CsnpCM7vHSfnc2DRnaLDKfblFg1hPbch25RFEjKE3yTKQqiPb3kFWSF8H:ASnpz7vIc2DqWlYht5RFEjoKQqq3kjFg
PDB Path D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb
Yara
  • UPX_Zero - UPX packed file
  • Malicious_Library_Zero - Malicious_Library
  • OS_Processor_Check_Zero - OS Processor Check
  • IsPE32 - (no description)
  • PE_Header_Zero - PE File Signature

IP Address Status Action
164.124.101.2 Active Moloch
47.56.33.47 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

Flow Issuer Subject Fingerprint
TLS 1.2
192.168.56.103:49164
47.56.33.47:443
C=BE, O=GlobalSign nv-sa, CN=GlobalSign Organization Validation CA - SHA256 - G3 C=CN, ST=ZheJiang, L=HangZhou, O=Alibaba (China) Technology Co., Ltd., CN=*.oss-cn-hongkong.aliyuncs.com 97:ae:c0:1a:b6:ae:20:61:d3:5f:de:6c:6f:b3:9e:3e:15:5d:08:f3

pdb_path D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb
section .didat
resource name PNG
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Proxy_cata\msvcp100.dll
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Proxy_cata\ssleay32.dll
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Proxy_cata\run\piaproxy.exe
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Proxy_cata\local_check.exe
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Proxy_cata\libwinpthread-1.dll
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Proxy_cata\socks5\PiaS5ProxyDivert.exe
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Proxy_cata\msvcr100.dll
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Proxy_cata\unins000.exe
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Proxy_cata\libeay32.dll
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Proxy_cata\libgcc_s_dw2-1.dll
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Proxy_cata\libcurl.dll
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Proxy_cata\WebHttp.dll
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Proxy_cata\socks5\hxxd.dll
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Proxy_cata\PIA_S5_Proxy.exe
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Proxy_cata\update000.exe
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Proxy_cata\msvcp140.dll
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Proxy_cata\XCGUI.dll
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Proxy_cata\install.exe
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Proxy_cata\install.exe
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Proxy_cata\update000.exe
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Proxy_cata\run\piaproxy.exe
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Proxy_cata\libgcc_s_dw2-1.dll
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Proxy_cata\install.exe
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Proxy_cata\unins000.exe
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Proxy_cata\libcurl.dll
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Proxy_cata\libeay32.dll
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Proxy_cata\ssleay32.dll
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Proxy_cata\msvcp100.dll
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Proxy_cata\local_check.exe
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Proxy_cata\socks5\hxxd.dll
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Proxy_cata\XCGUI.dll
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Proxy_cata\WebHttp.dll
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Proxy_cata\msvcp140.dll
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Proxy_cata\libwinpthread-1.dll
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Proxy_cata\PIA_S5_Proxy.exe
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Proxy_cata\msvcr100.dll
file C:\Users\test22\AppData\Local\Temp\RarSFX0\Proxy_cata\socks5\PiaS5ProxyDivert.exe
Kaspersky UDS:DangerousObject.Multi.Generic
ZoneAlarm UDS:DangerousObject.Multi.Generic
process main.exe
process install.exe
Time & API Arguments Status Return Repeated

RegOpenKeyExW

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Pia S5 Proxy
base_handle: 0x80000002
key_handle: 0x00000000
options: 0
access: 0x02000000
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Pia S5 Proxy
2 0

RegOpenKeyExW

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Pia S5 Proxy
base_handle: 0x80000002
key_handle: 0x00000000
options: 0
access: 0x02000000
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Pia S5 Proxy
2 0

RegOpenKeyExW

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Pia S5 Proxy
base_handle: 0x80000002
key_handle: 0x00000254
options: 0
access: 0x02000000
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Pia S5 Proxy
1 0 0

RegOpenKeyExW

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Pia S5 Proxy
base_handle: 0x80000002
key_handle: 0x0000024c
options: 0
access: 0x02000000
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Pia S5 Proxy
1 0 0
registry HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString