Static task
static1
Behavioral task
behavioral1
Sample
872a5879fc0076717792d38b3b561025eb270fb93d78edc9582322e77237fb12.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
872a5879fc0076717792d38b3b561025eb270fb93d78edc9582322e77237fb12.exe
Resource
win10v2004-20221111-en
General
-
Target
872a5879fc0076717792d38b3b561025eb270fb93d78edc9582322e77237fb12
-
Size
654KB
-
MD5
403a8b67b9325427cf558688285deafd
-
SHA1
24ceaacf0817fd6027302710d9b3ed58183b9051
-
SHA256
872a5879fc0076717792d38b3b561025eb270fb93d78edc9582322e77237fb12
-
SHA512
00f3ebd1d506ed44f1a973863db024468b29f99423ead0992e42c347768d1177e6eddf4ebc33d4ec696e3bb3d2b4a71d156152952151c92e6c5db20a6c19284b
-
SSDEEP
12288:F3Eh2S/RYrktlnTxeiTS02/46ivwoO1fky1jltNP0FYQAOuG+oKG:F3e2SuklTxeia1j5jF0R7uyKG
Malware Config
Signatures
-
Molebox Virtualization software 1 IoCs
Detects file using Molebox Virtualization software.
Processes:
resource yara_rule sample molebox
Files
-
872a5879fc0076717792d38b3b561025eb270fb93d78edc9582322e77237fb12.exe windows x86
d8d0dc085ac85d20e7791276cb2bf650
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
RegCloseKey
RegCreateKeyExW
RegDeleteKeyW
RegEnumValueW
RegOpenKeyW
RegQueryValueExA
RegQueryValueW
RegSetValueA
RegSetValueExW
RegSetValueW
kernel32
CloseHandle
CreateFileA
CreateFileW
EnterCriticalSection
ExitProcess
GetFileSize
InitializeCriticalSection
LeaveCriticalSection
ReadFile
SetUnhandledExceptionFilter
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
WriteFile
msvcrt
__getmainargs
__p__environ
__p__fmode
__set_app_type
_cexit
_iob
_onexit
_setmode
abort
atexit
clock
free
localtime
malloc
memcpy
mktime
signal
sprintf
sscanf
strcpy
time
wcscpy
user32
AdjustWindowRectEx
BeginPaint
CallWindowProcW
ChangeDisplaySettingsW
CheckMenuItem
CheckMenuRadioItem
ChildWindowFromPoint
CloseClipboard
CreateDialogIndirectParamW
CreateMenu
CreatePopupMenu
CreateWindowExW
DefFrameProcW
DefMDIChildProcW
DefWindowProcW
DestroyCursor
DestroyMenu
DestroyWindow
DispatchMessageW
DrawFocusRect
DrawFrameControl
EmptyClipboard
EnableWindow
EndPaint
EnumDisplaySettingsW
EnumWindows
ExitWindowsEx
FillRect
FlashWindow
GetActiveWindow
GetAsyncKeyState
GetClassInfoW
GetClassNameW
GetClientRect
GetClipboardFormatNameW
GetDC
GetDesktopWindow
GetDlgItem
GetFocus
GetForegroundWindow
GetKeyState
GetMenuItemCount
GetMenuItemInfoW
GetMenuState
GetMessagePos
GetMessageW
GetParent
GetSystemMetrics
GetUpdateRect
GetWindow
GetWindowDC
GetWindowRect
GetWindowTextLengthW
GetWindowTextW
GetWindowThreadProcessId
InsertMenuItemW
InsertMenuW
InvalidateRect
IsClipboardFormatAvailable
IsDialogMessageW
IsWindow
IsWindowVisible
LoadBitmapW
LoadCursorFromFileW
LoadCursorW
LoadIconW
LoadImageW
MessageBeep
MessageBoxW
ModifyMenuW
OpenClipboard
PeekMessageW
PostMessageW
PostQuitMessage
PostThreadMessageW
PtInRect
RegisterClassW
ReleaseDC
RemoveMenu
SendMessageW
SetClipboardData
SetFocus
SetForegroundWindow
SetMenu
SetMenuItemInfoW
SetParent
SetWindowPos
SetWindowTextW
ShowWindow
SystemParametersInfoW
TrackPopupMenu
TranslateAcceleratorW
TranslateMessage
UnregisterClassW
UpdateWindow
ValidateRect
WaitForInputIdle
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 144B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 802KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 2KB - Virtual size: 60B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 114KB - Virtual size: 113KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ