Static task
static1
Behavioral task
behavioral1
Sample
400a96cca51454dba11aa1b7d48955d21950345c3b330845e2ad25cdb2248410.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
400a96cca51454dba11aa1b7d48955d21950345c3b330845e2ad25cdb2248410.exe
Resource
win10v2004-20240802-en
General
-
Target
400a96cca51454dba11aa1b7d48955d21950345c3b330845e2ad25cdb2248410
-
Size
459KB
-
MD5
cba3942509f8e4f722bb6a2a782ccb93
-
SHA1
7e583aca544c9816fe9ff40ff613b027cec3c1c5
-
SHA256
400a96cca51454dba11aa1b7d48955d21950345c3b330845e2ad25cdb2248410
-
SHA512
d3cd5ac419c46724c13366dc045b86ed2f599aeedf0caa8229ce53c25161edae54d65d568c32ac04c56813df56ff48470d14ac783752f915bbd9d7998b67cebe
-
SSDEEP
12288:UbZ2zkPaCxpmGe1GBJN0u/JOtPCtV7JAI1E:UbZOkla1ftKtAsE
Malware Config
Signatures
-
Molebox Virtualization software 1 IoCs
Detects file using Molebox Virtualization software.
resource yara_rule sample molebox -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 400a96cca51454dba11aa1b7d48955d21950345c3b330845e2ad25cdb2248410
Files
-
400a96cca51454dba11aa1b7d48955d21950345c3b330845e2ad25cdb2248410.exe windows:4 windows x86 arch:x86
f7b7e921a8b8421a5042cead7c02073b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
RegCloseKey
RegCreateKeyExW
RegEnumValueW
RegOpenKeyW
RegQueryValueExA
RegQueryValueW
RegSetValueA
RegSetValueExW
RegSetValueW
kernel32
CloseHandle
CreateFileA
CreateFileW
ExitProcess
InitializeCriticalSection
ReadFile
SetUnhandledExceptionFilter
msvcrt
__getmainargs
__p__environ
__p__fmode
__set_app_type
_cexit
_iob
_onexit
_setmode
abort
atexit
free
malloc
memcpy
signal
sprintf
sscanf
strcpy
wcscpy
user32
AdjustWindowRectEx
AppendMenuW
BeginPaint
BringWindowToTop
CallNextHookEx
CallWindowProcW
CheckMenuRadioItem
ChildWindowFromPoint
CloseClipboard
CreateDialogIndirectParamW
CreateDialogParamW
CreateIconIndirect
CreateMenu
CreatePopupMenu
CreateWindowExW
DefFrameProcW
DefWindowProcW
DestroyCursor
DestroyIcon
DestroyMenu
DestroyWindow
DispatchMessageW
DrawFrameControl
DrawIcon
EmptyClipboard
EnableWindow
EndPaint
FlashWindow
GetAsyncKeyState
GetCapture
GetClassInfoW
GetClassNameW
GetClipboardData
GetDC
GetDlgItem
GetFocus
GetIconInfo
GetMenuItemCount
GetMenuItemInfoW
GetMenuState
GetMenuStringW
GetMessageTime
GetMessageW
GetParent
GetSystemMetrics
GetUpdateRect
GetWindow
GetWindowLongW
GetWindowTextLengthW
GetWindowTextW
HideCaret
InsertMenuItemW
InsertMenuW
InvalidateRect
IsClipboardFormatAvailable
IsWindowEnabled
IsWindowVisible
KillTimer
LoadBitmapW
LoadCursorW
LoadIconW
LoadImageW
MessageBeep
MessageBoxW
ModifyMenuW
MoveWindow
OpenClipboard
PeekMessageW
PostMessageW
PostQuitMessage
PostThreadMessageW
RedrawWindow
RegisterClassW
RegisterClipboardFormatW
RegisterHotKey
ReleaseCapture
ReleaseDC
RemoveMenu
SendMessageW
SetCapture
SetCursor
SetCursorPos
SetFocus
SetMenu
SetMenuItemInfoW
SetTimer
SetWindowLongW
SetWindowPos
SetWindowRgn
SetWindowTextW
SetWindowsHookExW
ShowCaret
ShowWindow
SystemParametersInfoW
TrackPopupMenu
TranslateAcceleratorW
TranslateMessage
UnhookWindowsHookEx
UnionRect
UnregisterClassW
UnregisterHotKey
UpdateWindow
WaitForInputIdle
Sections
.text Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 112B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 608B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 323KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 2KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 237KB - Virtual size: 237KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ