Static task
static1
Behavioral task
behavioral1
Sample
d338a6bb6e5e1e3409450026c5e22b86af5d1c8c1ef78dd9d0d77e7da472fe57.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d338a6bb6e5e1e3409450026c5e22b86af5d1c8c1ef78dd9d0d77e7da472fe57.exe
Resource
win10v2004-20220812-en
General
-
Target
d338a6bb6e5e1e3409450026c5e22b86af5d1c8c1ef78dd9d0d77e7da472fe57
-
Size
744KB
-
MD5
7a6ed7c321aadaf7acb6387017835c46
-
SHA1
96e5d31de5d5f7f50a9da3e6de3192cbcd639f81
-
SHA256
d338a6bb6e5e1e3409450026c5e22b86af5d1c8c1ef78dd9d0d77e7da472fe57
-
SHA512
c57aafac073d74a0e785353f58f891d318d35b398d4c7fbc34533162318052c41d83fdfe7e3afb880e5860efe4b5818cf0878aaa0a14c0a6cb15f1a36aac9ee1
-
SSDEEP
12288:Ep0zNsnm2mhms880U+U+9n1qjVbD8QycPBAiKmdD6HQO4VrX9mp6:HNW5mdT0fvqZD8DcpAODQQnVrsg
Malware Config
Signatures
-
Molebox Virtualization software 1 IoCs
Detects file using Molebox Virtualization software.
resource yara_rule sample molebox
Files
-
d338a6bb6e5e1e3409450026c5e22b86af5d1c8c1ef78dd9d0d77e7da472fe57.exe windows x86
8307d18e294ac119e7fb0e2015757765
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
RegCreateKeyExW
RegOpenKeyW
RegSetValueA
RegSetValueW
kernel32
CreateFileA
CreateFileW
ExitProcess
SetFilePointer
SetUnhandledExceptionFilter
TerminateThread
WriteFile
msvcrt
__getmainargs
__p__environ
__p__fmode
__set_app_type
_cexit
_iob
_onexit
_setmode
abort
atexit
memcpy
signal
strcpy
wcscpy
user32
BeginPaint
CallNextHookEx
CallWindowProcW
ClientToScreen
CreateAcceleratorTableW
CreateWindowExW
DefWindowProcW
DestroyAcceleratorTable
EmptyClipboard
EndDeferWindowPos
GetClassNameW
GetCursorPos
GetDesktopWindow
GetDlgItem
GetMenuState
GetSysColor
GetWindow
GetWindowTextLengthW
KillTimer
LoadImageW
MoveWindow
MsgWaitForMultipleObjects
PostQuitMessage
ReleaseCapture
ScreenToClient
ScrollWindow
SendMessageW
SetCursor
SetParent
SetTimer
SetWindowLongW
SetWindowTextW
TranslateMessage
UnhookWindowsHookEx
VkKeyScanW
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 72B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 608B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 993KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 2KB - Virtual size: 20B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ