Static task
static1
Behavioral task
behavioral1
Sample
b9a8faf10bda0013a0a7550f5fe02a7a03c3ebcf5f0b1074569a41d6e510d751.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b9a8faf10bda0013a0a7550f5fe02a7a03c3ebcf5f0b1074569a41d6e510d751.exe
Resource
win10v2004-20220812-en
General
-
Target
b9a8faf10bda0013a0a7550f5fe02a7a03c3ebcf5f0b1074569a41d6e510d751
-
Size
504KB
-
MD5
2001f11ed0186405c924af2d57fa39ad
-
SHA1
6acf0f87f5fb372d43c32009d55996afb50f4190
-
SHA256
b9a8faf10bda0013a0a7550f5fe02a7a03c3ebcf5f0b1074569a41d6e510d751
-
SHA512
2a624679e264e6c37ac840f3e60a17631a121315e6ad1929c093c7df2b1e5a42300f16bf940821dcb6ae623d94582d3df60b9d0fa108e82cf7fbdb6591e986b5
-
SSDEEP
12288:VYZ3bPPjP5O3NItRoVCUvaE7f+E2SJXuUV36DcCdCIf+2bW:ObP75O9ItWBfqg+UV3EcACIf+gW
Malware Config
Signatures
-
Molebox Virtualization software 1 IoCs
Detects file using Molebox Virtualization software.
resource yara_rule sample molebox
Files
-
b9a8faf10bda0013a0a7550f5fe02a7a03c3ebcf5f0b1074569a41d6e510d751.exe windows x86
a9a78214e102a22926deb12744217535
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
RegOpenKeyExA
RegOpenKeyW
RegQueryValueExW
RegQueryValueW
RegSetValueA
RegSetValueW
kernel32
AddAtomA
ConvertThreadToFiber
CreateFiber
CreateFileW
CreateThread
EnterCriticalSection
ExitProcess
FindAtomA
GetAtomNameA
InitializeCriticalSection
LeaveCriticalSection
ReadFile
SetUnhandledExceptionFilter
SwitchToFiber
TerminateProcess
TerminateThread
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
WriteFile
msvcrt
__getmainargs
__p__environ
__p__fmode
__set_app_type
_assert
_cexit
_iob
_onexit
_setmode
abort
atexit
free
malloc
memcpy
memset
signal
strcpy
strlen
wcscpy
user32
CallNextHookEx
CheckMenuRadioItem
ChildWindowFromPoint
ClientToScreen
CloseClipboard
CreateMenu
CreateWindowExW
DefFrameProcW
DefWindowProcW
DeferWindowPos
DestroyMenu
DestroyWindow
DispatchMessageW
DrawEdge
DrawStateW
DrawTextW
EnableWindow
EndDeferWindowPos
EndPaint
EnumClipboardFormats
EnumDisplaySettingsW
FillRect
GetAsyncKeyState
GetClassNameW
GetClipboardData
GetCursorPos
GetDesktopWindow
GetForegroundWindow
GetKeyState
GetMenuState
GetMenuStringW
GetMessageTime
GetParent
GetSubMenu
GetSysColor
GetSystemMetrics
GetUpdateRgn
GetWindowDC
GetWindowRect
GetWindowTextLengthW
GetWindowTextW
GetWindowThreadProcessId
HideCaret
InflateRect
InsertMenuW
InvalidateRect
IsIconic
KillTimer
LoadBitmapW
LoadCursorW
LoadImageW
MessageBeep
MessageBoxW
ModifyMenuW
OpenClipboard
PeekMessageW
PostMessageW
RedrawWindow
RegisterClassW
RegisterClipboardFormatW
RegisterHotKey
ReleaseCapture
ReleaseDC
ScreenToClient
SendMessageW
SetCapture
SetClipboardData
SetCursor
SetCursorPos
SetFocus
SetForegroundWindow
SetMenu
SetMenuItemInfoW
SetTimer
SetWindowPos
SetWindowsHookExW
ShowCaret
SystemParametersInfoW
TrackPopupMenu
TranslateAcceleratorW
TranslateMessage
UnhookWindowsHookEx
UnregisterClassW
UnregisterHotKey
ValidateRect
WindowFromPoint
Sections
.text Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 1008B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 368KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 2KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 328KB - Virtual size: 328KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ