e:\builds\tinderbox\XR-Trunk\WINNT_5.2_Depend\mozilla\obj-xulrunner\toolkit\mozapps\update\src\updater\updater.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ac39e97c62725c42661ff80825ffd96941620dd4cb5301c68effd8b6031698bd.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
ac39e97c62725c42661ff80825ffd96941620dd4cb5301c68effd8b6031698bd.exe
Resource
win10v2004-20240508-en
General
-
Target
ac39e97c62725c42661ff80825ffd96941620dd4cb5301c68effd8b6031698bd
-
Size
233KB
-
MD5
a547e74c6190800d4038f8a0a5041057
-
SHA1
75d26ed9e46f99a97b0ab31fb07e5b60714102b2
-
SHA256
ac39e97c62725c42661ff80825ffd96941620dd4cb5301c68effd8b6031698bd
-
SHA512
d3e28179dcee4b8cedb50dbe4dd268492cb55f3ca452177b1672a0f6842a04f0d886cb0513e0486fd8608909c6fe365c9afe760502cac62bd1b280ecbf9e825b
-
SSDEEP
3072:VJrBuCHjvd+bREXpZ3HCBXu823E1mzffQ5ck835vXhHFZqTTeTTTfqTTTJTTTTT/:VJrtvobREXpZ3Cr20kQ5ckGhHFZlxy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ac39e97c62725c42661ff80825ffd96941620dd4cb5301c68effd8b6031698bd
Files
-
ac39e97c62725c42661ff80825ffd96941620dd4cb5301c68effd8b6031698bd.exe windows:4 windows x86 arch:x86
18027da3508407cc05f7cb2d2324d374
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetPrivateProfileStringW
CreateFileW
Sleep
GetModuleFileNameW
GetModuleHandleW
CompareStringW
CompareStringA
GetStringTypeW
CopyFileW
OpenProcess
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoA
LCMapStringW
LCMapStringA
GetTimeZoneInformation
InitializeCriticalSection
LoadLibraryA
CreateProcessW
GetModuleHandleA
GetStringTypeA
GetProcAddress
IsValidCodePage
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
WaitForSingleObject
SetEndOfFile
CloseHandle
GetACP
GetCPInfo
FlushFileBuffers
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
FileTimeToSystemTime
FileTimeToLocalFileTime
GetFileInformationByHandle
PeekNamedPipe
GetLastError
GetFileType
FindClose
GetDriveTypeA
FindFirstFileA
DeleteFileA
CreateDirectoryA
GetFileAttributesA
DeleteFileW
SetEnvironmentVariableW
GetCurrentDirectoryW
SetCurrentDirectoryW
MultiByteToWideChar
ExitThread
GetCurrentThreadId
CreateThread
GetFileAttributesW
EnterCriticalSection
LeaveCriticalSection
ExitProcess
SetUnhandledExceptionFilter
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
GetCommandLineA
GetCommandLineW
SetHandleCount
GetStartupInfoA
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetStdHandle
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
GetFullPathNameA
GetCurrentDirectoryA
RtlUnwind
VirtualAlloc
HeapReAlloc
SetEnvironmentVariableA
WideCharToMultiByte
RaiseException
HeapSize
GetConsoleCP
GetConsoleMode
CreateFileA
SetFilePointer
ReadFile
SetFileAttributesA
user32
GetWindowTextW
DialogBoxParamW
EndDialog
SystemParametersInfoW
LoadIconW
SetTimer
SetWindowTextW
GetDesktopWindow
CopyRect
GetWindowThreadProcessId
GetDlgItem
OffsetRect
GetClientRect
GetDC
SendMessageW
DrawTextW
GetWindowRect
SetWindowPos
GetWindowPlacement
ReleaseDC
SendDlgItemMessageW
FindWindowA
gdi32
CreateFontIndirectW
SelectObject
DeleteObject
wsock32
ntohl
advapi32
OpenProcessToken
DuplicateTokenEx
comctl32
InitCommonControlsEx
shell32
ShellExecuteExW
ShellExecuteW
Sections
.text Size: 107KB - Virtual size: 106KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ