Static task
static1
Behavioral task
behavioral1
Sample
52041b244b350d5c676b47fdd29afb2663624bf569f6d9919e349bfacaeb8204.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
52041b244b350d5c676b47fdd29afb2663624bf569f6d9919e349bfacaeb8204.exe
Resource
win10v2004-20220812-en
General
-
Target
52041b244b350d5c676b47fdd29afb2663624bf569f6d9919e349bfacaeb8204
-
Size
508KB
-
MD5
829e8252e0291badec0f110a805dfbb9
-
SHA1
8d2cb70c8bfc6560e018891940d662730122fa1c
-
SHA256
52041b244b350d5c676b47fdd29afb2663624bf569f6d9919e349bfacaeb8204
-
SHA512
5fb535a653ae0c72554cb18ea3eb87fc28073c82ec059b11df127912caf02e9a339a09d383cf11de5428387553407af616ebe3d83fea7da1fe8d56604ed713aa
-
SSDEEP
12288:6d8tZYCteRvee0yf4Gmf/KPmAjaXKEyZ9LvrJ4sGyaHP25DoJ:6yPteAe0JfmjjaaP9LOP2RoJ
Malware Config
Signatures
-
Molebox Virtualization software 1 IoCs
Detects file using Molebox Virtualization software.
resource yara_rule sample molebox
Files
-
52041b244b350d5c676b47fdd29afb2663624bf569f6d9919e349bfacaeb8204.exe windows x86
ea689c5b83f61da3163a48b7fa0b0b53
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
AddAtomA
ExitProcess
FindAtomA
GetAtomNameA
SetUnhandledExceptionFilter
msvcrt
__getmainargs
__p__environ
__p__fmode
__set_app_type
_assert
_cexit
_iob
_onexit
_setmode
abort
atexit
free
malloc
memcpy
memset
signal
strcpy
strlen
wcscpy
user32
AdjustWindowRectEx
AppendMenuW
BeginDeferWindowPos
BeginPaint
BringWindowToTop
CallNextHookEx
CallWindowProcW
ChangeDisplaySettingsW
ClientToScreen
CopyRect
CreateAcceleratorTableW
CreateDialogParamW
CreatePopupMenu
CreateWindowExW
DefFrameProcW
DefWindowProcW
DeferWindowPos
DestroyAcceleratorTable
DestroyCursor
DestroyMenu
DispatchMessageW
DrawFocusRect
DrawIcon
DrawMenuBar
DrawStateW
EmptyClipboard
EnableMenuItem
EnableWindow
EndDeferWindowPos
EndPaint
EnumClipboardFormats
EnumDisplaySettingsW
EnumWindows
ExitWindowsEx
FlashWindow
GetCapture
GetClassInfoW
GetClassNameW
GetClientRect
GetClipboardData
GetDC
GetDlgItem
GetFocus
GetIconInfo
GetMenuState
GetMenuStringW
GetSysColor
GetSystemMenu
GetSystemMetrics
GetUpdateRgn
GetWindow
GetWindowRect
GetWindowTextLengthW
GetWindowTextW
GetWindowThreadProcessId
HideCaret
InsertMenuItemW
InsertMenuW
IsClipboardFormatAvailable
IsDialogMessageW
IsIconic
IsWindow
IsWindowEnabled
IsWindowVisible
IsZoomed
KillTimer
LoadAcceleratorsW
LoadBitmapW
LoadCursorFromFileW
LoadCursorW
MessageBeep
MessageBoxW
MoveWindow
MsgWaitForMultipleObjects
OffsetRect
PeekMessageW
PostMessageW
PostThreadMessageW
PtInRect
RedrawWindow
RegisterClassW
RegisterHotKey
ReleaseCapture
ReleaseDC
ScreenToClient
SendMessageW
SetClipboardData
SetCursor
SetCursorPos
SetForegroundWindow
SetParent
SetWindowLongW
SetWindowPos
SetWindowRgn
SetWindowTextW
SetWindowsHookExW
ShowCaret
ShowCursor
ShowWindow
TranslateAcceleratorW
TranslateMDISysAccel
TranslateMessage
UnregisterClassW
UnregisterHotKey
UpdateWindow
WaitForInputIdle
WindowFromPoint
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 2.0MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 4KB - Virtual size: 188B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ