Static task
static1
Behavioral task
behavioral1
Sample
busybox.exe
Resource
win10-20230703-en
General
-
Target
busybox.exe
-
Size
565KB
-
MD5
2b83f12e3ac14182691d2858c299c5e2
-
SHA1
afdb836292c8cdfd4e9f6778783faf92fbf9aced
-
SHA256
38d74863786cfdf537f78c0a3bf4bd5284b4d963fec59101e9faa94fedd31988
-
SHA512
b506967dd80443ddc3cc9992d3e0eb453b5afeb29ac09275819d577e1adce230f220734c1b8e9b63fcf18c2237a52f7fe261628ea3f0316781f8799244afc624
-
SSDEEP
12288:tdxbUaejJOTOREzxXZhYj0dMtgk2xdRk6rocVOrSNn2Pjgy2fk5fZ+vS:tdxbLjTOO1ZWGMtgpxFnpq2fk5kvS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource busybox.exe
Files
-
busybox.exe.exe windows x86
Password: virus
2f55e47b006968bb656445a9810700da
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
EqualSid
GetSecurityInfo
GetTokenInformation
GetUserNameA
OpenProcessToken
OpenThreadToken
kernel32
CloseHandle
CreateConsoleScreenBuffer
CreateEventA
CreateFileA
CreateFileMappingA
CreateNamedPipeA
CreatePipe
CreateProcessA
CreateRemoteThread
CreateToolhelp32Snapshot
DeleteCriticalSection
DeviceIoControl
DuplicateHandle
EnterCriticalSection
FillConsoleOutputAttribute
FillConsoleOutputCharacterA
FindClose
FindFirstFileA
FindFirstVolumeW
FindNextVolumeW
FindVolumeClose
FlushFileBuffers
GenerateConsoleCtrlEvent
GetACP
GetCPInfo
GetCompressedFileSizeA
GetConsoleCP
GetConsoleMode
GetConsoleOutputCP
GetConsoleScreenBufferInfo
GetConsoleWindow
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDiskFreeSpaceExA
GetDiskFreeSpaceExW
GetDriveTypeA
GetEnvironmentVariableW
GetExitCodeProcess
GetFileAttributesA
GetFileAttributesExA
GetFileInformationByHandle
GetFileSizeEx
GetFileType
GetFullPathNameA
GetLastError
GetLocalTime
GetLogicalDrives
GetModuleFileNameA
GetModuleHandleA
GetModuleHandleW
GetNumberOfConsoleInputEvents
GetProcAddress
GetProcessId
GetProcessTimes
GetStartupInfoA
GetStdHandle
GetSystemDirectoryA
GetSystemInfo
GetSystemTimeAsFileTime
GetTickCount
GetVersionExA
GetVolumeInformationA
GetVolumeInformationW
GlobalMemoryStatus
InitializeCriticalSection
IsDBCSLeadByteEx
IsValidCodePage
IsWow64Process
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LocalFree
MapViewOfFile
MoveFileExA
MultiByteToWideChar
OpenProcess
PeekConsoleInputA
PeekNamedPipe
Process32First
Process32Next
QueryPerformanceCounter
ReadConsoleInputW
ReadDirectoryChangesW
ReadProcessMemory
ResetEvent
SetConsoleActiveScreenBuffer
SetConsoleCP
SetConsoleCtrlHandler
SetConsoleCursorPosition
SetConsoleMode
SetConsoleOutputCP
SetConsoleScreenBufferSize
SetConsoleTextAttribute
SetConsoleTitleA
SetEndOfFile
SetErrorMode
SetFileAttributesA
SetFilePointer
SetFileTime
SetHandleInformation
SetLastError
SetUnhandledExceptionFilter
Sleep
SleepEx
TerminateProcess
TlsGetValue
UnmapViewOfFile
VirtualProtect
VirtualQuery
WaitForMultipleObjects
WaitForSingleObject
WideCharToMultiByte
msvcrt
__getmainargs
__initenv
__p__acmdln
__lconv_init
__mb_cur_max
__p___argv
__p__commode
__p__fmode
__set_app_type
__setusermatherr
_access
_amsg_exit
_cexit
_chdir
_chmod
_close
_creat
_dup
_dup2
_environ
_errno
_exit
_fdopen
_fdopen
_fileno
_findclose
_findfirst
_findnext
_fstati64
_fullpath
_get_osfhandle
_getch
_getpid
_getcwd
_getche
_initterm
_iob
_isatty
_lock
_lseeki64
_onexit
_open_osfhandle
_mktemp
_open
_mkdir
_pipe
_putenv
time
localtime
mktime
gmtime
ctime
_read
_rmdir
_setjmp3
_setmode
_spawnve
_strdup
_stricmp
_stricmp
_strnicmp
_telli64
_timezone
_tzset
_tzset
_umask
_unlink
_unlock
_wcsnicmp
_write
abort
atof
atoi
bsearch
calloc
clearerr
clock
exit
fclose
feof
ferror
fflush
fgetc
fgets
fopen
fprintf
fputc
fputs
fread
free
freopen
fseek
fwrite
getc
getchar
getenv
isalnum
isalpha
iscntrl
isgraph
islower
isprint
ispunct
isspace
isupper
isxdigit
localeconv
longjmp
malloc
mbstowcs
memchr
memcmp
memcpy
memmove
putc
putchar
qsort
raise
rand
realloc
rename
setbuf
setlocale
signal
srand
strcat
strchr
strcmp
strcpy
strcspn
strerror
strftime
strlen
strncmp
strncpy
strpbrk
strrchr
strspn
strstr
strtok
strtol
strtoul
tolower
toupper
ungetc
vfprintf
wcslen
wcsncmp
wcstombs
user32
CharToOemA
DispatchMessageA
MsgWaitForMultipleObjects
PeekMessageA
TranslateMessage
ws2_32
WSACleanup
WSAEnumNetworkEvents
WSAEventSelect
WSAGetLastError
WSASetLastError
WSASocketA
WSAStartup
__WSAFDIsSet
accept
bind
closesocket
connect
freeaddrinfo
getaddrinfo
gethostbyaddr
gethostname
getnameinfo
getpeername
getservbyname
htonl
htons
inet_addr
inet_ntoa
listen
ntohl
ntohs
recv
select
setsockopt
shutdown
Sections
.text Size: 454KB - Virtual size: 454KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 67KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 4KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE