Static task
static1
Behavioral task
behavioral1
Sample
4fee019fa79e2c0ab2bb08997231052f198f1b20bb094b6f1d12eec6b27bc5aa.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4fee019fa79e2c0ab2bb08997231052f198f1b20bb094b6f1d12eec6b27bc5aa.exe
Resource
win10v2004-20220812-en
General
-
Target
4fee019fa79e2c0ab2bb08997231052f198f1b20bb094b6f1d12eec6b27bc5aa
-
Size
424KB
-
MD5
a007b47bd81c6bc23cc508764aa75c06
-
SHA1
2871f234122c0dbef38913514274ef9479778ca9
-
SHA256
4fee019fa79e2c0ab2bb08997231052f198f1b20bb094b6f1d12eec6b27bc5aa
-
SHA512
b7c4527d15187b7f3bda339c4b130f9645f76edf2d9b730bd540c3af2f78a918f01958d7ea5f6bcc1b44ebcbbf7dbd15a5874d578ef48bdd4772792bee56f2cb
-
SSDEEP
12288:rGrbg2bl0Nud3KDg5rcReX+H9NWJaFLUgS53gz4:rZM6S38g5reH9N2cU
Malware Config
Signatures
-
Molebox Virtualization software 1 IoCs
Detects file using Molebox Virtualization software.
resource yara_rule sample molebox
Files
-
4fee019fa79e2c0ab2bb08997231052f198f1b20bb094b6f1d12eec6b27bc5aa.exe windows x86
d91eca83d40a445135c47739a53bacbb
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
AddAtomA
ExitProcess
FindAtomA
GetAtomNameA
SetUnhandledExceptionFilter
msvcrt
__getmainargs
__p__environ
__p__fmode
__set_app_type
_assert
_cexit
_iob
_onexit
_setmode
abort
atexit
free
malloc
memcpy
memset
signal
strcpy
strlen
wcscpy
user32
AdjustWindowRectEx
AppendMenuW
BeginDeferWindowPos
BringWindowToTop
CallNextHookEx
CheckMenuItem
ClientToScreen
CloseClipboard
CreateAcceleratorTableW
CreateDialogIndirectParamW
CreateDialogParamW
CreateIconIndirect
CreateMenu
CreatePopupMenu
DefFrameProcW
DefMDIChildProcW
DestroyAcceleratorTable
DestroyCursor
DestroyMenu
DestroyWindow
DispatchMessageW
DrawEdge
DrawIcon
EnableMenuItem
EnableWindow
EnumClipboardFormats
EnumWindows
FillRect
FlashWindow
GetActiveWindow
GetAsyncKeyState
GetClassInfoW
GetClassNameW
GetClipboardData
GetClipboardFormatNameW
GetCursorPos
GetDC
GetDesktopWindow
GetDlgItem
GetFocus
GetForegroundWindow
GetIconInfo
GetKeyState
GetMenuItemCount
GetMenuItemInfoW
GetMenuState
GetMenuStringW
GetMessageTime
GetMessageW
GetParent
GetScrollInfo
GetSubMenu
GetSysColor
GetUpdateRgn
GetWindowDC
GetWindowTextLengthW
GetWindowTextW
GetWindowThreadProcessId
HideCaret
InflateRect
InvalidateRect
IsWindow
IsWindowEnabled
IsWindowVisible
IsZoomed
LoadCursorFromFileW
LoadCursorW
LoadIconW
MapWindowPoints
MessageBeep
ModifyMenuW
MoveWindow
MsgWaitForMultipleObjects
OffsetRect
OpenClipboard
PostMessageW
PostQuitMessage
PostThreadMessageW
RegisterClassW
RegisterHotKey
ReleaseCapture
ReleaseDC
RemoveMenu
SetCapture
SetCursor
SetCursorPos
SetFocus
SetMenu
SetScrollInfo
SetWindowPos
SetWindowTextW
SetWindowsHookExW
ShowCaret
ShowCursor
ShowWindow
TranslateAcceleratorW
TranslateMDISysAccel
TranslateMessage
UnhookWindowsHookEx
UnionRect
UnregisterHotKey
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 80B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 312KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 4KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ