Static task
static1
Behavioral task
behavioral1
Sample
c460078b93bea6715db1574f1af5dfb5fa35351cc9401ae0690601e4fb9bd692.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c460078b93bea6715db1574f1af5dfb5fa35351cc9401ae0690601e4fb9bd692.exe
Resource
win10v2004-20220812-en
General
-
Target
c460078b93bea6715db1574f1af5dfb5fa35351cc9401ae0690601e4fb9bd692
-
Size
621KB
-
MD5
2e4d5b8e4e03fdb88af3deaa81087238
-
SHA1
34f37e4c97fab9786bfa13357b08b8ae8a72d942
-
SHA256
c460078b93bea6715db1574f1af5dfb5fa35351cc9401ae0690601e4fb9bd692
-
SHA512
bca84bc3b8305d43ff284f8d5344e842c1df71972efda8b313ea313729218c8a4beed8c2d305dc42c51b06b75ba65846a67e4acbeaf98c1ac9a4df922cfea42f
-
SSDEEP
12288:HZYcWG36EREyC2+8kriQtlDrIYdicb7Jx3fHZ+FiPXG11RCn847PoAH:HCcF36CC2+8UiAlDrIYEcb9h5+Fu2TU3
Malware Config
Signatures
-
Molebox Virtualization software 1 IoCs
Detects file using Molebox Virtualization software.
resource yara_rule sample molebox
Files
-
c460078b93bea6715db1574f1af5dfb5fa35351cc9401ae0690601e4fb9bd692.exe windows x86
e52678a782632b7ae04b848a127d0538
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
RegOpenKeyExA
kernel32
CreateThread
ExitProcess
SetFilePointer
SetUnhandledExceptionFilter
SwitchToFiber
msvcrt
__getmainargs
__p__environ
__p__fmode
__set_app_type
_cexit
_iob
_onexit
_setmode
abort
atexit
memcpy
signal
strcpy
wcscpy
user32
BeginDeferWindowPos
BringWindowToTop
ChildWindowFromPoint
CreatePopupMenu
DefFrameProcW
DefWindowProcW
DrawFocusRect
EndDeferWindowPos
EnumWindows
GetAsyncKeyState
GetClipboardData
GetDC
GetDlgItem
GetForegroundWindow
GetParent
GetSysColor
GetUpdateRect
GetWindow
GetWindowThreadProcessId
HideCaret
InsertMenuItemW
InvalidateRect
KillTimer
LoadIconW
OpenClipboard
PostQuitMessage
PtInRect
ReleaseDC
SendMessageW
SetForegroundWindow
SetMenu
SetMenuItemInfoW
SetParent
SetTimer
SetWindowsHookExW
ShowCaret
UpdateWindow
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 68B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 601KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 2KB - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ