Static task
static1
Behavioral task
behavioral1
Sample
3ab974a5b45d332f7c1e425eceb1304b38e738d17e02521bed27619cc8445a23.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3ab974a5b45d332f7c1e425eceb1304b38e738d17e02521bed27619cc8445a23.exe
Resource
win10v2004-20221111-en
General
-
Target
3ab974a5b45d332f7c1e425eceb1304b38e738d17e02521bed27619cc8445a23
-
Size
961KB
-
MD5
c4e5ef73533e313673a7137f9f9b1a1a
-
SHA1
bdbcec9ba0a58be5e6224a19e1804e943bac696e
-
SHA256
3ab974a5b45d332f7c1e425eceb1304b38e738d17e02521bed27619cc8445a23
-
SHA512
04730a73ea5f62d0f6b08cfde727ce6ac5f4822c8858dfa0575492c5362e931616fdb70d794c4e50b9393e0dfd5463c3e4493e430f8925e5e1459826929dda55
-
SSDEEP
24576:xaflrNf6VokLTyoYGqA4jng1hEX0Y13QnmZwbrjFlTgfSgBvS:Z2oYGqA4jnmFlTESgM
Malware Config
Signatures
-
Molebox Virtualization software 1 IoCs
Detects file using Molebox Virtualization software.
resource yara_rule sample molebox
Files
-
3ab974a5b45d332f7c1e425eceb1304b38e738d17e02521bed27619cc8445a23.exe windows x86
d7d004bf1dd0e3ad0a5f477a487982ce
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
AddAtomA
CreateSemaphoreA
DeleteCriticalSection
EnterCriticalSection
ExitProcess
FindAtomA
GetAtomNameA
GetLastError
InitializeCriticalSection
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
LeaveCriticalSection
ReleaseSemaphore
SetLastError
SetUnhandledExceptionFilter
Sleep
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
WaitForSingleObject
msvcrt
_fdopen
_read
_strdup
_write
__getmainargs
__p__environ
__p__fmode
__set_app_type
_assert
_cexit
_ctype
_errno
_filelengthi64
_fstati64
_iob
_lseeki64
_onexit
_setmode
abort
atexit
fclose
fflush
fgetpos
fopen
fread
free
fsetpos
fwrite
getc
malloc
memchr
memcpy
memmove
memset
putc
scanf
setlocale
setvbuf
signal
strcmp
strcoll
strcpy
strftime
strlen
strtod
strxfrm
ungetc
user32
DialogBoxParamA
EndDialog
GetWindowLongA
LoadIconA
MessageBoxA
SendMessageA
Sections
.text Size: 256KB - Virtual size: 256KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 21KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.stab Size: 57KB - Virtual size: 57KB
IMAGE_SCN_MEM_DISCARDABLE
.stabstr Size: 420KB - Virtual size: 420KB
IMAGE_SCN_MEM_DISCARDABLE