Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Oct. 20, 2023, 6:08 p.m. | Oct. 20, 2023, 6:12 p.m. |
-
-
-
-
mshta.exe mshta vbscript:createobject("wscript.shell").run("rathole client.toml",0)(window.close)
2404-
rathole.exe "C:\Users\test22\AppData\Local\Temp\rathole.exe" client.toml
2556
-
-
-
-
-
nginx.exe "C:\Users\test22\AppData\Local\Temp\nginx.exe"
2580
-
-
-
-
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
No hosts contacted. |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
pdb_path | D:\Projects\WinRAR\sfx\build\sfxzip32\Release\sfxzip.pdb |
section | .didat |
resource name | PNG |
name | PNG | language | LANG_CHINESE | filetype | PNG image data, 186 x 604, 8-bit/color RGB, non-interlaced | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0006906c | size | 0x000015a9 | ||||||||||||||||||
name | PNG | language | LANG_CHINESE | filetype | PNG image data, 186 x 604, 8-bit/color RGB, non-interlaced | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0006906c | size | 0x000015a9 | ||||||||||||||||||
name | RT_DIALOG | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0006f0d0 | size | 0x000001ce | ||||||||||||||||||
name | RT_DIALOG | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0006f0d0 | size | 0x000001ce | ||||||||||||||||||
name | RT_DIALOG | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0006f0d0 | size | 0x000001ce | ||||||||||||||||||
name | RT_DIALOG | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0006f0d0 | size | 0x000001ce | ||||||||||||||||||
name | RT_DIALOG | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0006f0d0 | size | 0x000001ce | ||||||||||||||||||
name | RT_DIALOG | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0006f0d0 | size | 0x000001ce | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0006f9e4 | size | 0x0000006a | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0006f9e4 | size | 0x0000006a | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0006f9e4 | size | 0x0000006a | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0006f9e4 | size | 0x0000006a | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0006f9e4 | size | 0x0000006a | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0006f9e4 | size | 0x0000006a | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0006f9e4 | size | 0x0000006a | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0006f9e4 | size | 0x0000006a | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0006f9e4 | size | 0x0000006a | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0006f9e4 | size | 0x0000006a | ||||||||||||||||||
name | RT_MANIFEST | language | LANG_CHINESE | filetype | XML 1.0 document, ASCII text, with CRLF line terminators | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0006fa64 | size | 0x00000753 |
file | C:\Users\test22\AppData\Local\Temp\start.vbs |
file | C:\Users\test22\AppData\Local\Temp\rathole.exe |
file | C:\Users\test22\AppData\Local\Temp\start.bat |
file | C:\Users\test22\AppData\Local\Temp\nginx.bat |
file | C:\Users\test22\AppData\Local\Temp\nginx.exe |
cmdline | mshta vbscript:createobject("wscript.shell").run("rathole client.toml",0)(window.close) |
cmdline | mshta vbscript:createobject("wscript.shell").run("nginx.exe",0)(window.close) |
cmdline | "C:\Windows\System32\cmd.exe" /c start.bat |
cmdline | "C:\Windows\System32\cmd.exe" /c nginx.bat |
section | {u'size_of_data': u'0x00008200', u'virtual_address': u'0x00068000', u'entropy': 7.686542966370366, u'name': u'.rsrc', u'virtual_size': u'0x000081b8'} | entropy | 7.68654296637 | description | A section with a high entropy has been found |
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep |
parent_process | wscript.exe | martian_process | "C:\Windows\System32\cmd.exe" /c start.bat | ||||||
parent_process | wscript.exe | martian_process | "C:\Windows\System32\cmd.exe" /c nginx.bat | ||||||
parent_process | wscript.exe | martian_process | cmd /c nginx.bat | ||||||
parent_process | wscript.exe | martian_process | cmd /c start.bat |
Bkav | W32.AIDetectMalware |
Elastic | malicious (high confidence) |
Skyhigh | BehavesLike.Win32.Generic.wc |
Malwarebytes | Malware.AI.638235587 |
Cybereason | malicious.a1cf75 |
Symantec | Trojan.Gen.MBT |
ESET-NOD32 | a variant of Win64/Riskware.Rathole.A |
APEX | Malicious |
Cynet | Malicious (score: 100) |
Kaspersky | Trojan.Win32.Runner.kyw |
Rising | Hacktool.Rathole!8.18BC9 (CLOUD) |
F-Secure | Trojan.TR/AD.Nekark.nutzf |
FireEye | Generic.mg.cb8a6ad517b3a3ee |
Sophos | Generic Reputation PUA (PUA) |
SentinelOne | Static AI - Malicious PE |
Avira | TR/AD.Nekark.nutzf |
ZoneAlarm | Trojan.Win32.Runner.kyw |
Microsoft | Trojan:Win32/Znyonm |
McAfee | Artemis!CB8A6AD517B3 |
Cylance | unsafe |
DeepInstinct | MALICIOUS |
CrowdStrike | win/malicious_confidence_60% (W) |
file | C:\Windows\SysWOW64\wscript.exe |
file | C:\Windows\System32\cmd.exe |