Static task
static1
Behavioral task
behavioral1
Sample
283c232a6dad8db0cb522b2ed802d7b528de537676a671290cba06237d595282.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
283c232a6dad8db0cb522b2ed802d7b528de537676a671290cba06237d595282.exe
Resource
win10v2004-20221111-en
General
-
Target
283c232a6dad8db0cb522b2ed802d7b528de537676a671290cba06237d595282
-
Size
243KB
-
MD5
eae686ab284645d15c36c29eaa399bd5
-
SHA1
0a067e66648f03d51ff9f0a0ad642c819e82be40
-
SHA256
283c232a6dad8db0cb522b2ed802d7b528de537676a671290cba06237d595282
-
SHA512
6a92ec5d62ea63406910f14ca0fc7a35714cfba90ffec76712dba47e4555a6d591cbf4fb77b49a32287e8feee3e9721a188e3524186bcd2d05d2d53992172fae
-
SSDEEP
6144:U4OvuHhW8Nkmct+NI+gwQdCyLQu5lBNBfhCfvqNM8VQLG1:U4AuB5No+q5jQW3BfkfC5v1
Malware Config
Signatures
-
Molebox Virtualization software 1 IoCs
Detects file using Molebox Virtualization software.
resource yara_rule sample molebox
Files
-
283c232a6dad8db0cb522b2ed802d7b528de537676a671290cba06237d595282.exe windows x86
805383b1e091c6cb88b64a5c01c8e224
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
RegCloseKey
RegDeleteKeyW
RegEnumValueW
RegOpenKeyExA
RegOpenKeyExW
RegOpenKeyW
RegQueryValueW
RegSetValueW
kernel32
CloseHandle
CreateFileW
ExitProcess
InitializeCriticalSection
ReadFile
SetFilePointer
SetUnhandledExceptionFilter
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
msvcrt
__getmainargs
__p__environ
__p__fmode
__set_app_type
_cexit
_iob
_onexit
_setmode
abort
atexit
clock
free
localtime
malloc
memcpy
mktime
signal
sprintf
sscanf
strcpy
time
wcscpy
user32
AdjustWindowRectEx
BeginDeferWindowPos
BeginPaint
BringWindowToTop
CallWindowProcW
ChangeDisplaySettingsW
ChildWindowFromPoint
CloseClipboard
CreateAcceleratorTableW
CreateDialogIndirectParamW
CreateIconIndirect
CreateMenu
CreatePopupMenu
CreateWindowExW
DefFrameProcW
DefMDIChildProcW
DefWindowProcW
DeferWindowPos
DestroyAcceleratorTable
DestroyCursor
DestroyIcon
DestroyMenu
DestroyWindow
DispatchMessageW
DrawEdge
DrawFocusRect
DrawFrameControl
DrawIcon
DrawIconEx
DrawStateW
DrawTextW
EmptyClipboard
EnableWindow
EndDeferWindowPos
EndPaint
EnumDisplaySettingsW
EnumWindows
GetActiveWindow
GetClassInfoW
GetClassNameW
GetDC
GetDesktopWindow
GetDlgItem
GetFocus
GetIconInfo
GetKeyState
GetMessagePos
GetMessageTime
GetMessageW
GetParent
GetScrollInfo
GetSubMenu
GetSysColor
GetSystemMetrics
GetUpdateRect
GetWindow
GetWindowLongW
GetWindowTextLengthW
GetWindowTextW
HideCaret
InflateRect
InsertMenuItemW
InvalidateRect
IsClipboardFormatAvailable
IsDialogMessageW
IsIconic
IsWindow
IsWindowVisible
LoadAcceleratorsW
LoadBitmapW
LoadCursorFromFileW
LoadCursorW
LoadIconW
LoadImageW
MessageBeep
MessageBoxW
OpenClipboard
PeekMessageW
PostMessageW
PostQuitMessage
PostThreadMessageW
RegisterClassW
ReleaseDC
ScrollWindow
SendMessageW
SetFocus
SetParent
SetScrollInfo
SetWindowLongW
SetWindowPos
SetWindowTextW
ShowCaret
ShowCursor
ShowWindow
SystemParametersInfoW
TrackPopupMenu
TranslateAcceleratorW
TranslateMDISysAccel
TranslateMessage
UnionRect
UnregisterClassW
UpdateWindow
WaitForInputIdle
Sections
.text Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 68B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 308KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 2KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ