Static task
static1
Behavioral task
behavioral1
Sample
8a50da782bcaf3a375561edb0fb64fd0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8a50da782bcaf3a375561edb0fb64fd0N.exe
Resource
win10v2004-20240802-en
General
-
Target
8a50da782bcaf3a375561edb0fb64fd0N.exe
-
Size
430KB
-
MD5
8a50da782bcaf3a375561edb0fb64fd0
-
SHA1
95701630b190e7549f32334ab7b78bd9b944a332
-
SHA256
7ba109fa97029cd382eea6a0ad0321e66d327dc544a299dab53fd8bcdae02a41
-
SHA512
5e8ccb5223189c159a775ed676f0e79dade0a89fc8455c35d06ea1401bfda65d57195491fa6d62b1871388163073075699783f0826ed594d21d500f3eaa3407c
-
SSDEEP
6144:3qORZlAYgjHXbv9r/31o/ZrrDCI1ZVZPPzMNKh3PfcKrKywia:3qiZ9cHr9rf1qraIeKpdGyXa
Malware Config
Signatures
Files
-
8a50da782bcaf3a375561edb0fb64fd0N.exe.exe windows:5 windows x86 arch:x86
c51f33ed5e54a835a330d7e4c8fd52be
Code Sign
f3:75:f9:1d:3d:e5:d0:e2Certificate
IssuerCN=Mozilla Fake CANot Before25/09/2015, 14:02Not After12/06/2035, 14:02SubjectCN=Mozilla Fake SPCf8:d0:22:f2:ca:36:33:8d:aa:19:53:06:49:be:df:13:41:b6:7d:18Signer
Actual PE Digestf8:d0:22:f2:ca:36:33:8d:aa:19:53:06:49:be:df:13:41:b6:7d:18Digest Algorithmsha1PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
c:\builds\moz2_slave\m-in-w32-d-0000000000000000000\build\src\obj-firefox\toolkit\mozapps\update\updater\updater.pdb
Imports
kernel32
MoveFileExW
WideCharToMultiByte
LocalAlloc
SetLastError
GetCurrentProcess
FreeLibrary
LoadLibraryW
GetDriveTypeW
WriteFile
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
DeleteFileW
MoveFileW
GetTimeZoneInformation
WriteConsoleW
LCMapStringW
CopyFileW
GetTimeFormatW
GetDateFormatW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
OutputDebugStringW
SetConsoleCtrlHandler
FlushFileBuffers
GetFullPathNameW
SetEnvironmentVariableA
SetFilePointerEx
FatalAppExitA
HeapSize
CreateSemaphoreW
GetTickCount
TlsFree
TlsSetValue
FormatMessageW
GetPrivateProfileStringW
LocalFree
OpenProcess
CreateProcessW
WaitForSingleObject
GetLastError
CloseHandle
SetFilePointer
SetEndOfFile
GetTempFileNameW
GetLongPathNameW
GetFileAttributesW
FindNextFileW
FindFirstFileW
FindClose
CreateFileW
MultiByteToWideChar
DeactivateActCtx
ActivateActCtx
CreateActCtxW
GetModuleFileNameW
Sleep
SetDllDirectoryW
LoadLibraryExW
GetProcAddress
GetModuleHandleW
CompareStringW
GetSystemDirectoryW
TlsGetValue
TlsAlloc
TerminateProcess
CreateEventW
InitializeCriticalSectionAndSpinCount
SetUnhandledExceptionFilter
UnhandledExceptionFilter
SetStdHandle
ReadConsoleW
RtlUnwind
RaiseException
LoadLibraryExA
GetCommandLineW
HeapFree
HeapAlloc
FileTimeToLocalFileTime
GetFileInformationByHandle
GetFileType
PeekNamedPipe
FileTimeToSystemTime
IsDebuggerPresent
IsProcessorFeaturePresent
GetFileAttributesExW
EncodePointer
DecodePointer
EnterCriticalSection
LeaveCriticalSection
SetEnvironmentVariableW
SetCurrentDirectoryW
GetCurrentDirectoryW
CreateDirectoryW
RemoveDirectoryW
SetFileAttributesW
FindFirstFileExW
SystemTimeToTzSpecificLocalTime
CreateThread
GetCurrentThreadId
ExitThread
ReadFile
HeapReAlloc
ExitProcess
GetModuleHandleExW
AreFileApisANSI
GetCurrentThread
GetProcessHeap
GetStdHandle
DeleteCriticalSection
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetStringTypeW
GetConsoleCP
GetConsoleMode
GetFullPathNameA
user32
GetClientRect
wsprintfW
LoadIconW
GetParent
GetDesktopWindow
SetWindowLongW
SendMessageW
OffsetRect
CopyRect
ScreenToClient
GetWindowRect
GetWindowLongW
SetWindowTextW
ReleaseDC
GetDC
DrawTextW
SetTimer
GetDlgItem
EndDialog
DialogBoxParamW
SetWindowPos
gdi32
SelectObject
advapi32
QueryServiceStatusEx
QueryServiceConfigW
OpenServiceW
OpenSCManagerA
CloseServiceHandle
LookupPrivilegeValueA
GetTokenInformation
AdjustTokenPrivileges
OpenProcessToken
RegQueryInfoKeyW
RegEnumKeyExW
CryptDestroyHash
CryptGetHashParam
CryptReleaseContext
CryptVerifySignatureA
CryptHashData
CryptCreateHash
CryptDestroyKey
CryptAcquireContextA
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
CreateProcessAsUserW
StartServiceW
wintrust
WinVerifyTrust
shell32
ShellExecuteExW
shlwapi
PathRemoveFileSpecW
PathCommonPrefixW
PathAppendW
PathStripToRootW
PathUnquoteSpacesW
Sections
.text Size: 261KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 50KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 95KB - Virtual size: 95KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ