z:\task_1579288126\build\src\obj-firefox\ipc\app\plugin-container.pdb
Static task
static1
Behavioral task
behavioral1
Sample
10de9a6ad1b32e0a5509aff5d06ad3a5cd05805295f47919c99e2474d02a63c5.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
10de9a6ad1b32e0a5509aff5d06ad3a5cd05805295f47919c99e2474d02a63c5.exe
Resource
win10v2004-20240426-en
General
-
Target
10de9a6ad1b32e0a5509aff5d06ad3a5cd05805295f47919c99e2474d02a63c5
-
Size
830KB
-
MD5
e2f883f4c9e289b7813af559755429e1
-
SHA1
733eeacdef8099f26e4ee35ab4823dfc7b04d643
-
SHA256
10de9a6ad1b32e0a5509aff5d06ad3a5cd05805295f47919c99e2474d02a63c5
-
SHA512
a0bb3eccef0f6c07123f5d0d47897aa4696fb644e4c53b49502ea2ded5af9b8742c98e35181f7135aeb3aa99b90e3e0ef93d4c9142af6e4c9edfeb08c0d4f1c1
-
SSDEEP
12288:kK6x4JZVIiJjIXHYlc+pFByStv9JRa//inz86NRo1qiRlUWC4kXzVC3:kK6x4DRIXSc+pFB5z+//ufNRoZW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 10de9a6ad1b32e0a5509aff5d06ad3a5cd05805295f47919c99e2474d02a63c5
Files
-
10de9a6ad1b32e0a5509aff5d06ad3a5cd05805295f47919c99e2474d02a63c5.exe windows:6 windows x64 arch:x64
fc2093461420dd3286a6dc55f229b578
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
mozglue
??2@YAPEAX_K@Z
??3@YAXPEAX@Z
??3@YAXPEAX_K@Z
??_U@YAPEAX_K@Z
??_V@YAXPEAX@Z
?DllBlocklist_Initialize@@YAXI@Z
?IsWin32kLockedDown@mozilla@@YA_NXZ
_wcsdup
free
malloc
moz_xmalloc
mozalloc_abort
realloc
advapi32
AccessCheck
ConvertSidToStringSidW
ConvertStringSecurityDescriptorToSecurityDescriptorW
ConvertStringSidToSidW
CopySid
CreateProcessAsUserW
CreateRestrictedToken
CreateWellKnownSid
DuplicateToken
DuplicateTokenEx
EqualSid
FreeSid
GetAce
GetKernelObjectSecurity
GetLengthSid
GetNamedSecurityInfoW
GetSecurityDescriptorSacl
GetSecurityInfo
GetSidSubAuthority
GetTokenInformation
ImpersonateLoggedOnUser
InitializeSid
IsValidSid
LookupPrivilegeValueW
MapGenericMask
OpenProcessToken
RegCloseKey
RegCreateKeyExW
RegDisablePredefinedCache
RegOpenKeyExW
RevertToSelf
SetEntriesInAclW
SetKernelObjectSecurity
SetSecurityInfo
SetThreadToken
SetTokenInformation
SystemFunction036
msvcp140
??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ
??0ios_base@std@@IEAA@XZ
??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ
??1ios_base@std@@UEAA@XZ
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@PEBX@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_J@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z
?_Lock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ
?_Unlock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ
?_Xlength_error@std@@YAXPEBD@Z
?_Xout_of_range@std@@YAXPEBD@Z
?clear@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ
?good@ios_base@std@@QEBA_NXZ
?imbue@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAXAEBVlocale@2@@Z
?init@?$basic_ios@DU?$char_traits@D@std@@@std@@IEAAXPEAV?$basic_streambuf@DU?$char_traits@D@std@@@2@_N@Z
?setbuf@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAPEAV12@PEAD_J@Z
?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JXZ
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z
?sync@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ
?uflow@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ
?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J@Z
?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J@Z
kernel32
AcquireSRWLockExclusive
AssignProcessToJobObject
CloseHandle
CreateEventW
CreateFileMappingW
CreateFileW
CreateIoCompletionPort
CreateJobObjectW
CreateMutexW
CreateNamedPipeW
CreateProcessW
CreateRemoteThread
CreateThread
DebugBreak
DeleteCriticalSection
DuplicateHandle
EncodePointer
EnterCriticalSection
EnumSystemLocalesEx
ExpandEnvironmentStringsW
FlushInstructionCache
FreeEnvironmentStringsW
FreeLibrary
GetCurrentDirectoryW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetEnvironmentStringsW
GetEnvironmentVariableW
GetFileAttributesW
GetFileType
GetLastError
GetLongPathNameW
GetModuleHandleA
GetModuleHandleW
GetNativeSystemInfo
GetProcAddress
GetProcessHandleCount
GetProcessHeaps
GetProcessId
GetQueuedCompletionStatus
GetSystemInfo
GetSystemTimeAsFileTime
GetThreadId
GetTickCount
GetUserDefaultLCID
GetUserDefaultLangID
GetUserDefaultLocaleName
GetVersionExW
GetVolumePathNameW
HeapDestroy
HeapSetInformation
InitOnceExecuteOnce
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
InitializeCriticalSectionEx
InitializeSListHead
IsDebuggerPresent
IsProcessorFeaturePresent
LeaveCriticalSection
LoadLibraryExA
LoadLibraryW
LocalFree
MapViewOfFile
OpenProcess
PostQueuedCompletionStatus
ProcessIdToSessionId
QueryPerformanceCounter
QueryPerformanceFrequency
RaiseException
ReadProcessMemory
RegisterWaitForSingleObject
ReleaseSRWLockExclusive
ResetEvent
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
SearchPathW
SetDllDirectoryW
SetEnvironmentVariableW
SetEvent
SetHandleInformation
SetInformationJobObject
SetLastError
SetUnhandledExceptionFilter
SignalObjectAndWait
Sleep
TerminateJobObject
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
UnmapViewOfFile
UnregisterWaitEx
VirtualAlloc
VirtualAllocEx
VirtualFree
VirtualFreeEx
VirtualProtect
VirtualProtectEx
VirtualQuery
VirtualQueryEx
WaitForSingleObject
WaitForSingleObjectEx
WideCharToMultiByte
WriteProcessMemory
lstrlenW
vcruntime140
__C_specific_handler
__CxxFrameHandler3
__std_terminate
_purecall
memcmp
memcpy
memmove
memset
api-ms-win-crt-stdio-l1-1-0
__p__commode
__stdio_common_vsnwprintf_s
__stdio_common_vswprintf
_set_fmode
api-ms-win-crt-runtime-l1-1-0
__p___argc
__p___wargv
_c_exit
_cexit
_configure_wide_argv
_crt_atexit
_errno
_exit
_get_initial_wide_environment
_initialize_onexit_table
_initialize_wide_environment
_initterm
_initterm_e
_invalid_parameter_noinfo_noreturn
_register_onexit_function
_register_thread_local_exe_atexit_callback
_seh_filter_exe
_set_app_type
exit
terminate
api-ms-win-crt-string-l1-1-0
_wcsicmp
_wcsnicmp
strlen
towupper
wcscmp
wcslen
wcsncmp
api-ms-win-crt-environment-l1-1-0
getenv
api-ms-win-crt-utility-l1-1-0
rand_s
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
api-ms-win-crt-heap-l1-1-0
_set_new_mode
Exports
Exports
GetHandleVerifier
IsSandboxedProcess
TargetConfigureOPMProtectedOutput
TargetConfigureOPMProtectedOutput64
TargetCreateNamedPipeW
TargetCreateNamedPipeW64
TargetCreateOPMProtectedOutputs
TargetCreateOPMProtectedOutputs64
TargetCreateProcessA
TargetCreateProcessA64
TargetCreateProcessW
TargetCreateProcessW64
TargetCreateThread
TargetCreateThread64
TargetDestroyOPMProtectedOutput
TargetDestroyOPMProtectedOutput64
TargetEnumDisplayDevicesA
TargetEnumDisplayDevicesA64
TargetEnumDisplayMonitors
TargetEnumDisplayMonitors64
TargetGdiDllInitialize
TargetGdiDllInitialize64
TargetGetCertificate
TargetGetCertificate64
TargetGetCertificateByHandle
TargetGetCertificateByHandle64
TargetGetCertificateSize
TargetGetCertificateSize64
TargetGetCertificateSizeByHandle
TargetGetCertificateSizeByHandle64
TargetGetMonitorInfoA
TargetGetMonitorInfoA64
TargetGetMonitorInfoW
TargetGetMonitorInfoW64
TargetGetOPMInformation
TargetGetOPMInformation64
TargetGetOPMRandomNumber
TargetGetOPMRandomNumber64
TargetGetStockObject
TargetGetStockObject64
TargetGetSuggestedOPMProtectedOutputArraySize
TargetGetSuggestedOPMProtectedOutputArraySize64
TargetNtCreateEvent
TargetNtCreateEvent64
TargetNtCreateFile
TargetNtCreateFile64
TargetNtCreateKey
TargetNtCreateKey64
TargetNtMapViewOfSection
TargetNtMapViewOfSection64
TargetNtOpenEvent
TargetNtOpenEvent64
TargetNtOpenFile
TargetNtOpenFile64
TargetNtOpenKey
TargetNtOpenKey64
TargetNtOpenKeyEx
TargetNtOpenKeyEx64
TargetNtOpenProcess
TargetNtOpenProcess64
TargetNtOpenProcessToken
TargetNtOpenProcessToken64
TargetNtOpenProcessTokenEx
TargetNtOpenProcessTokenEx64
TargetNtOpenThread
TargetNtOpenThread64
TargetNtOpenThreadToken
TargetNtOpenThreadToken64
TargetNtOpenThreadTokenEx
TargetNtOpenThreadTokenEx64
TargetNtQueryAttributesFile
TargetNtQueryAttributesFile64
TargetNtQueryFullAttributesFile
TargetNtQueryFullAttributesFile64
TargetNtSetInformationFile
TargetNtSetInformationFile64
TargetNtSetInformationThread
TargetNtSetInformationThread64
TargetNtUnmapViewOfSection
TargetNtUnmapViewOfSection64
TargetRegisterClassW
TargetRegisterClassW64
TargetSetOPMSigningKeyAndSequenceNumbers
TargetSetOPMSigningKeyAndSequenceNumbers64
g_handles_to_close
g_interceptions
g_nt
g_originals
g_shared_IPC_size
g_shared_delayed_integrity_level
g_shared_delayed_mitigations
g_shared_policy_size
g_shared_section
Sections
.text Size: 215KB - Virtual size: 215KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.00cfg Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 568KB - Virtual size: 572KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE