z:\build\build\src\obj-firefox\toolkit\mozapps\update\updater\updater.pdb
Static task
static1
Behavioral task
behavioral1
Sample
431b2caac6362a0c2e8674d7c2df8970N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
431b2caac6362a0c2e8674d7c2df8970N.exe
Resource
win10v2004-20240802-en
General
-
Target
431b2caac6362a0c2e8674d7c2df8970N.exe
-
Size
1.5MB
-
MD5
431b2caac6362a0c2e8674d7c2df8970
-
SHA1
ca05268de6c99e513e67f91e5b85c7c92092f0f5
-
SHA256
d4cbd8e47ed47e3bda14771713b087cce1d66e3f1517d68e64fc9ffbf9ebd6f8
-
SHA512
d4d4f77764ba4433e32d37e99685de0061a3e18bed3f18b9a4bee4ff61f8c08c9baff13ba6c0510641ac559e6a2c4419a6f4ae9d5ab23ee4194d124b5e958c59
-
SSDEEP
24576:pKVcbZKCDJ+RkRPWxNs298r3OCDIjG3gE9ow+8xA+:ckZqkR+ft983Dl3gEe8xA+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 431b2caac6362a0c2e8674d7c2df8970N.exe
Files
-
431b2caac6362a0c2e8674d7c2df8970N.exe.exe windows:6 windows x86 arch:x86
616dde5dbcd6c59c9ae1f7f2260effcd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateProcessW
CopyFileW
WideCharToMultiByte
GetTempFileNameW
LocalAlloc
SetLastError
GetCurrentProcess
FreeLibrary
GetFullPathNameW
DeleteFileW
MoveFileW
WriteFile
GetDriveTypeW
WriteConsoleW
HeapSize
GetTimeZoneInformation
MoveFileExW
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
IsValidCodePage
FindFirstFileExW
FlushFileBuffers
HeapReAlloc
SetFilePointerEx
LCMapStringW
CompareStringW
UnlockFile
LocalFree
CloseHandle
GetLastError
FormatMessageW
GetPrivateProfileStringW
OpenProcess
GetFileAttributesW
CreateFileW
WaitForSingleObject
FindClose
SetEndOfFile
SetFilePointer
LockFile
GetLongPathNameW
FindNextFileW
FindFirstFileW
Sleep
MultiByteToWideChar
DeactivateActCtx
GetModuleFileNameW
ActivateActCtx
CreateActCtxW
LoadLibraryExW
SetDllDirectoryW
GetModuleHandleW
GetProcAddress
GetSystemDirectoryW
ReadConsoleW
DecodePointer
GetConsoleMode
GetConsoleCP
GetStringTypeW
HeapAlloc
HeapFree
GetACP
RaiseException
GetSystemInfo
VirtualProtect
VirtualQuery
LoadLibraryExA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
RtlUnwind
GetFileInformationByHandle
GetFileType
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetFileAttributesExW
CreateDirectoryW
SetStdHandle
RemoveDirectoryW
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
SetFileAttributesW
SetEnvironmentVariableA
SetEnvironmentVariableW
SetCurrentDirectoryW
GetCurrentDirectoryW
ReadFile
GetStdHandle
ExitProcess
GetCommandLineA
GetCommandLineW
user32
SetTimer
wsprintfW
WaitForInputIdle
GetWindowLongW
GetWindowRect
GetDC
SetWindowPos
ReleaseDC
SendMessageW
EndDialog
SetWindowTextW
OffsetRect
ScreenToClient
CopyRect
LoadIconW
SetWindowLongW
GetClientRect
GetDlgItem
DrawTextW
GetDesktopWindow
GetParent
DialogBoxParamW
gdi32
SelectObject
advapi32
CloseServiceHandle
OpenSCManagerA
StartServiceW
QueryServiceConfigW
OpenServiceW
QueryServiceStatusEx
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
GetTokenInformation
RegQueryInfoKeyW
RegEnumKeyExW
RegQueryValueExW
CryptDestroyHash
CryptGetHashParam
CryptReleaseContext
CryptDestroyKey
CryptVerifySignatureA
CryptAcquireContextA
CryptCreateHash
CryptHashData
RegCloseKey
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
wintrust
WinVerifyTrust
shell32
ShellExecuteExW
shlwapi
PathUnquoteSpacesW
PathStripToRootW
PathCommonPrefixW
PathIsUNCServerShareW
PathCanonicalizeW
PathAppendW
PathRemoveFileSpecW
Sections
.text Size: 147KB - Virtual size: 147KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 96KB - Virtual size: 95KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.2MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE