Static task
static1
Behavioral task
behavioral1
Sample
Warbox Hack 0.8.1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Warbox Hack 0.8.1.exe
Resource
win10v2004-20221111-en
General
-
Target
a1adc93ce1d7b6dd4241c29fac66c1fbbe10c60caa05cac2c05564446067a0ed
-
Size
4.7MB
-
MD5
af8d6b48c39222151577eefbcc374f5f
-
SHA1
80f5f878aa0a7214a509faadfcf260a59012f91d
-
SHA256
a1adc93ce1d7b6dd4241c29fac66c1fbbe10c60caa05cac2c05564446067a0ed
-
SHA512
0862522ef9017f50964124e74f4edc507e1aebe6cbfcda36b660fa7a600dbaeaa510b903048adef2d9d7acf98ac04fcc5ad662eadbb04bfb0c0d713ad62d24b9
-
SSDEEP
98304:wL0Nh4zstYemSr05OP25sqwYXKWhpjWXAH+6kqTghR/xlY3331UD:woNqwDmZ8+rwYvSwfkzD23H1UD
Malware Config
Signatures
Files
-
a1adc93ce1d7b6dd4241c29fac66c1fbbe10c60caa05cac2c05564446067a0ed.zip
-
Warbox Hack 0.8.1.zip.zip
-
Warbox Hack 0.8.1.exe.exe windows x86
8d96e40ae83703a819be869c22f26b85
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
oleaut32
SysFreeString
SysReAllocStringLen
SysAllocStringLen
user32
MessageBoxA
SetWindowLongW
GetWindowLongW
CreateWindowExW
WaitMessage
UnregisterClassW
TranslateMessage
SystemParametersInfoW
ShowWindow
SetWindowPos
SetForegroundWindow
SetFocus
SendMessageW
ReleaseDC
RegisterClassW
PostQuitMessage
PostMessageW
PeekMessageW
MoveWindow
MessageBoxW
LoadIconW
LoadCursorW
IsWindowEnabled
InvalidateRect
GetSystemMetrics
GetSysColor
GetKeyState
GetDC
GetClientRect
FillRect
EnableWindow
DrawTextW
DispatchMessageW
DestroyWindow
DefWindowProcW
CharNextW
CallWindowProcW
kernel32
Sleep
VirtualFree
VirtualAlloc
VirtualQuery
GetSystemInfo
GetVersion
CompareStringW
IsDBCSLeadByteEx
SetThreadLocale
WideCharToMultiByte
MultiByteToWideChar
GetConsoleOutputCP
GetConsoleCP
GetACP
GetStartupInfoW
GetProcAddress
GetModuleHandleW
GetCommandLineW
FreeLibrary
GetLastError
UnhandledExceptionFilter
RtlUnwind
RaiseException
ExitProcess
GetCurrentThreadId
DeleteCriticalSection
InitializeCriticalSection
WriteFile
SetFilePointer
SetEndOfFile
ReadFile
GetFileType
GetFileSize
CreateFileW
GetStdHandle
CloseHandle
GetProcAddress
RaiseException
LoadLibraryA
GetLastError
TlsSetValue
TlsGetValue
LocalFree
LocalAlloc
GetModuleHandleW
FreeLibrary
SleepEx
Sleep
SizeofResource
LockResource
LoadResource
LoadLibraryA
GetVersionExW
GetProcAddress
GetLastError
FreeLibrary
FindResourceW
CompareStringW
gdi32
TextOutW
SetTextColor
SetBkMode
SetBkColor
SelectObject
Rectangle
MoveToEx
LineTo
GetTextExtentPoint32W
ExtTextOutW
DeleteObject
CreateSolidBrush
CreatePen
CreateFontIndirectW
shell32
Shell_NotifyIconA
Sections
.text Size: 102KB - Virtual size: 102KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.itext Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 11KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 8B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 3.6MB - Virtual size: 3.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ