Static task
static1
Behavioral task
behavioral1
Sample
b7963740df6468a84b0eca8303d31ac1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b7963740df6468a84b0eca8303d31ac1.exe
Resource
win10v2004-20240226-en
General
-
Target
b7963740df6468a84b0eca8303d31ac1
-
Size
888KB
-
MD5
b7963740df6468a84b0eca8303d31ac1
-
SHA1
2184b099e664ef4d4f76dc5d4c71f3f53647b1de
-
SHA256
e92f53840a6efffa99815eee98c8606b8014fb8046ff8c6c2d177a4f70716fe6
-
SHA512
315223fb96a498fd34375aca3c969b66324cc6a3cc314f6cfa6aca2b458fd5614c10aae8809c7f7178e54d513ef1628e3e9e6419ccceb24ecffa3345ec689695
-
SSDEEP
24576:jnl8VVhVVVVVAVVMVt/V4VRVFV9VuDZ+zP39K/JfFeBSRwk0:Tl8VVhVVVVVAVVMVFV4VRVFV9VbzP39T
Malware Config
Signatures
-
Molebox Virtualization software 1 IoCs
Detects file using Molebox Virtualization software.
resource yara_rule sample molebox -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b7963740df6468a84b0eca8303d31ac1
Files
-
b7963740df6468a84b0eca8303d31ac1.exe windows:4 windows x86 arch:x86
70a5b804b1fccbc5894239810d2cd22c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
AddAtomA
ExitProcess
FindAtomA
GetAtomNameA
SetUnhandledExceptionFilter
msvcrt
__getmainargs
__p__environ
__p__fmode
__set_app_type
_assert
_cexit
_iob
_onexit
_setmode
abort
atexit
free
malloc
memcpy
memset
signal
strcpy
strlen
wcscpy
user32
AdjustWindowRectEx
AppendMenuW
BeginPaint
BringWindowToTop
CallNextHookEx
CallWindowProcW
CheckMenuItem
CheckMenuRadioItem
ChildWindowFromPoint
ClientToScreen
CopyRect
CreateDialogParamW
CreateIconIndirect
CreatePopupMenu
CreateWindowExW
DefFrameProcW
DefMDIChildProcW
DeferWindowPos
DestroyAcceleratorTable
DestroyCursor
DestroyIcon
DestroyMenu
DestroyWindow
DispatchMessageW
DrawEdge
DrawFocusRect
DrawFrameControl
DrawIcon
DrawMenuBar
DrawStateW
DrawTextW
EmptyClipboard
EnableMenuItem
EnableWindow
EndDeferWindowPos
EnumDisplaySettingsW
EnumWindows
FillRect
GetClassNameW
GetClipboardData
GetClipboardFormatNameW
GetCursorPos
GetDC
GetDlgItem
GetFocus
GetForegroundWindow
GetIconInfo
GetMenuItemCount
GetMenuItemInfoW
GetMenuState
GetMenuStringW
GetMessagePos
GetMessageTime
GetMessageW
GetParent
GetScrollInfo
GetSubMenu
GetSysColor
GetUpdateRect
GetWindow
GetWindowLongW
GetWindowRect
GetWindowTextW
GetWindowThreadProcessId
HideCaret
InflateRect
InsertMenuItemW
InsertMenuW
IsDialogMessageW
IsIconic
IsWindow
IsWindowVisible
KillTimer
LoadCursorFromFileW
LoadCursorW
LoadIconW
LoadImageW
MapWindowPoints
MessageBeep
MoveWindow
MsgWaitForMultipleObjects
OffsetRect
PeekMessageW
PostQuitMessage
PostThreadMessageW
PtInRect
RegisterClassW
RegisterHotKey
ReleaseCapture
RemoveMenu
ScrollWindow
SendMessageW
SetCapture
SetCursorPos
SetFocus
SetForegroundWindow
SetMenu
SetMenuItemInfoW
SetScrollInfo
SetWindowPos
SetWindowRgn
SetWindowTextW
ShowWindow
SystemParametersInfoW
TrackPopupMenu
TranslateAcceleratorW
UnhookWindowsHookEx
UnregisterHotKey
UpdateWindow
WaitForInputIdle
WindowFromPoint
Sections
.text Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 911KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 4KB - Virtual size: 20B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 516KB - Virtual size: 513KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ