Static task
static1
Behavioral task
behavioral1
Sample
b2123f35964183d314c1b5c052ac76fd66889c4a3961cefc663ca9d50fd9520b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b2123f35964183d314c1b5c052ac76fd66889c4a3961cefc663ca9d50fd9520b.exe
Resource
win10v2004-20220901-en
General
-
Target
b2123f35964183d314c1b5c052ac76fd66889c4a3961cefc663ca9d50fd9520b
-
Size
587KB
-
MD5
651c6f9f5d2cf2ecf4894b0e55be5a26
-
SHA1
3b1d7905d9c443bfcac9875b691ebdd35839ca16
-
SHA256
b2123f35964183d314c1b5c052ac76fd66889c4a3961cefc663ca9d50fd9520b
-
SHA512
a61b0f053c314ad4c134f2633611eb93189b45ce1a048c9cfa6d61947cf9983895319ee7cb7d95714968c153ce5950db6c4b7de2ed303e05ac7de620e53ba230
-
SSDEEP
12288:2hL/zT+6AHOP5FM4ghqrXQSlsARHY05KXtkgbFuLADpyN/O9q:U/Wbg/ghqrXQKsA7CuLADpyxO9q
Malware Config
Signatures
-
Molebox Virtualization software 1 IoCs
Detects file using Molebox Virtualization software.
resource yara_rule sample molebox
Files
-
b2123f35964183d314c1b5c052ac76fd66889c4a3961cefc663ca9d50fd9520b.exe windows x86
b0943468ecf1ffe265fe90e6f61608e2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
RegCloseKey
RegCreateKeyA
RegCreateKeyExW
RegDeleteKeyW
RegEnumValueW
RegOpenKeyW
RegQueryValueExA
RegQueryValueExW
RegQueryValueW
RegSetValueExW
RegSetValueW
kernel32
CloseHandle
CreateFileMappingW
CreateFileW
EnterCriticalSection
ExitProcess
InitializeCriticalSection
LeaveCriticalSection
MapViewOfFile
ReadFile
SetFilePointer
SetUnhandledExceptionFilter
UnmapViewOfFile
WriteFile
msvcrt
__getmainargs
__p__environ
__p__fmode
__set_app_type
_cexit
_iob
_onexit
_setmode
abort
atexit
free
malloc
memcpy
realloc
signal
sprintf
sscanf
strcpy
wcscpy
user32
AdjustWindowRectEx
BeginPaint
BringWindowToTop
CallWindowProcW
ChangeDisplaySettingsW
CloseClipboard
CopyRect
CreateDialogIndirectParamW
CreateMenu
CreatePopupMenu
CreateWindowExW
DefFrameProcW
DefWindowProcW
DestroyCursor
DestroyMenu
DestroyWindow
DispatchMessageW
DrawEdge
DrawIconEx
DrawStateW
EmptyClipboard
EnableWindow
EndPaint
EnumDisplaySettingsW
FlashWindow
GetActiveWindow
GetAsyncKeyState
GetCapture
GetClassInfoW
GetClassNameW
GetClipboardData
GetClipboardFormatNameW
GetDC
GetDlgItem
GetForegroundWindow
GetMenuItemCount
GetMenuItemInfoW
GetMenuStringW
GetMessagePos
GetMessageW
GetParent
GetSubMenu
GetSysColor
GetSystemMetrics
GetUpdateRect
GetWindow
GetWindowTextLengthW
GetWindowTextW
GetWindowThreadProcessId
HideCaret
InvalidateRect
IsDialogMessageW
IsWindow
IsWindowVisible
LoadBitmapW
LoadCursorFromFileW
LoadCursorW
LoadIconW
LoadImageW
MapWindowPoints
MessageBeep
MessageBoxW
MoveWindow
MsgWaitForMultipleObjects
OffsetRect
OpenClipboard
PeekMessageW
PostMessageW
PostQuitMessage
RegisterClassW
ReleaseCapture
ReleaseDC
SendMessageW
SetCapture
SetClipboardData
SetCursor
SetCursorPos
SetForegroundWindow
SetWindowRgn
SetWindowTextW
ShowCaret
ShowCursor
ShowWindow
SystemParametersInfoW
TrackPopupMenu
TranslateMDISysAccel
TranslateMessage
UnionRect
UnregisterClassW
UpdateWindow
WaitForInputIdle
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 96B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 468KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 2KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ