Summary | ZeroBOX

shareu.exe

Malicious Library UPX AntiDebug PE File OS Processor Check PE32 AntiVM
Category Machine Started Completed
FILE s1_win7_x6403_us Oct. 20, 2023, 6:08 p.m. Oct. 20, 2023, 6:12 p.m.
Size 3.5MB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 cb8a6ad517b3a3eeb0eb66d90cca43b6
SHA256 8553cea6af854981af81e294b86ae8ef9ce57d21b6201fb21fe9593f28269b8a
CRC32 FCC5530F
ssdeep 98304:q6XGIqDaV+DhRGSHmRgPPT5IsZDtpEz5bbd4:q9IqDaV0RGxyPLZ5pgdd4
PDB Path D:\Projects\WinRAR\sfx\build\sfxzip32\Release\sfxzip.pdb
Yara
  • Malicious_Library_Zero - Malicious_Library
  • UPX_Zero - UPX packed file
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • OS_Processor_Check_Zero - OS Processor Check

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

WriteConsoleA

buffer: nginx: [emerg] bind() to 0.0.0.0:8000 failed (10013: An attempt was made to access a socket in a way forbidden by its access permissions)
console_handle: 0x0000000b
1 1 0
pdb_path D:\Projects\WinRAR\sfx\build\sfxzip32\Release\sfxzip.pdb
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
section .didat
resource name PNG
name PNG language LANG_CHINESE filetype PNG image data, 186 x 604, 8-bit/color RGB, non-interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x0006906c size 0x000015a9
name PNG language LANG_CHINESE filetype PNG image data, 186 x 604, 8-bit/color RGB, non-interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x0006906c size 0x000015a9
name RT_DIALOG language LANG_CHINESE filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x0006f0d0 size 0x000001ce
name RT_DIALOG language LANG_CHINESE filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x0006f0d0 size 0x000001ce
name RT_DIALOG language LANG_CHINESE filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x0006f0d0 size 0x000001ce
name RT_DIALOG language LANG_CHINESE filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x0006f0d0 size 0x000001ce
name RT_DIALOG language LANG_CHINESE filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x0006f0d0 size 0x000001ce
name RT_DIALOG language LANG_CHINESE filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x0006f0d0 size 0x000001ce
name RT_STRING language LANG_CHINESE filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x0006f9e4 size 0x0000006a
name RT_STRING language LANG_CHINESE filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x0006f9e4 size 0x0000006a
name RT_STRING language LANG_CHINESE filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x0006f9e4 size 0x0000006a
name RT_STRING language LANG_CHINESE filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x0006f9e4 size 0x0000006a
name RT_STRING language LANG_CHINESE filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x0006f9e4 size 0x0000006a
name RT_STRING language LANG_CHINESE filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x0006f9e4 size 0x0000006a
name RT_STRING language LANG_CHINESE filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x0006f9e4 size 0x0000006a
name RT_STRING language LANG_CHINESE filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x0006f9e4 size 0x0000006a
name RT_STRING language LANG_CHINESE filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x0006f9e4 size 0x0000006a
name RT_STRING language LANG_CHINESE filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x0006f9e4 size 0x0000006a
name RT_MANIFEST language LANG_CHINESE filetype XML 1.0 document, ASCII text, with CRLF line terminators sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x0006fa64 size 0x00000753
file C:\Users\test22\AppData\Local\Temp\start.vbs
file C:\Users\test22\AppData\Local\Temp\rathole.exe
file C:\Users\test22\AppData\Local\Temp\start.bat
file C:\Users\test22\AppData\Local\Temp\nginx.bat
file C:\Users\test22\AppData\Local\Temp\nginx.exe
cmdline mshta vbscript:createobject("wscript.shell").run("rathole client.toml",0)(window.close)
cmdline mshta vbscript:createobject("wscript.shell").run("nginx.exe",0)(window.close)
cmdline "C:\Windows\System32\cmd.exe" /c start.bat
cmdline "C:\Windows\System32\cmd.exe" /c nginx.bat
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: cmd
parameters: /c start.bat
filepath: cmd
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd
parameters: /c nginx.bat
filepath: cmd
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: rathole
parameters: client.toml
filepath: rathole
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: nginx.exe
parameters:
filepath: nginx.exe
1 1 0
section {u'size_of_data': u'0x00008200', u'virtual_address': u'0x00068000', u'entropy': 7.686542966370366, u'name': u'.rsrc', u'virtual_size': u'0x000081b8'} entropy 7.68654296637 description A section with a high entropy has been found
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
parent_process wscript.exe martian_process "C:\Windows\System32\cmd.exe" /c start.bat
parent_process wscript.exe martian_process "C:\Windows\System32\cmd.exe" /c nginx.bat
parent_process wscript.exe martian_process cmd /c nginx.bat
parent_process wscript.exe martian_process cmd /c start.bat
Process injection Process 1460 resumed a thread in remote process 2172
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x000002f0
suspend_count: 1
process_identifier: 2172
1 0 0
Bkav W32.AIDetectMalware
Elastic malicious (high confidence)
Skyhigh BehavesLike.Win32.Generic.wc
Malwarebytes Malware.AI.638235587
Cybereason malicious.a1cf75
Symantec Trojan.Gen.MBT
ESET-NOD32 a variant of Win64/Riskware.Rathole.A
APEX Malicious
Cynet Malicious (score: 100)
Kaspersky Trojan.Win32.Runner.kyw
Rising Hacktool.Rathole!8.18BC9 (CLOUD)
F-Secure Trojan.TR/AD.Nekark.nutzf
FireEye Generic.mg.cb8a6ad517b3a3ee
Sophos Generic Reputation PUA (PUA)
SentinelOne Static AI - Malicious PE
Avira TR/AD.Nekark.nutzf
ZoneAlarm Trojan.Win32.Runner.kyw
Microsoft Trojan:Win32/Znyonm
McAfee Artemis!CB8A6AD517B3
Cylance unsafe
DeepInstinct MALICIOUS
CrowdStrike win/malicious_confidence_60% (W)
file C:\Windows\SysWOW64\wscript.exe
file C:\Windows\System32\cmd.exe