D:\gocart-client-build\win-intel\build\gocartclient\public\customhook\binaries\windows\release\gccustomhook.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-27_b4e24ee0b9b7177c70ccd1cfce28aa51_avoslocker_revil.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-27_b4e24ee0b9b7177c70ccd1cfce28aa51_avoslocker_revil.exe
Resource
win10v2004-20240419-en
General
-
Target
2024-04-27_b4e24ee0b9b7177c70ccd1cfce28aa51_avoslocker_revil
-
Size
3.9MB
-
MD5
b4e24ee0b9b7177c70ccd1cfce28aa51
-
SHA1
a4eec3616cdcd504965e0bf4dd719d6fb3d7312b
-
SHA256
b328963001d0dd4f71552df45d18b50ec6780ff1b0f4e4544df39ba01d3bffbe
-
SHA512
7c66a3f38bc7f558daa6820e0623e1ddf655547da3e6e02960b53587c56929247a4950425bcd3f2efa84b3a839bd323178888dd9f2cda246d61210cd98f53781
-
SSDEEP
98304:4+lOTr8SoMk9nlPs94KCCw5Vr+BXpdL3D527BWG:flO3klPi4zCwupVQBWG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-04-27_b4e24ee0b9b7177c70ccd1cfce28aa51_avoslocker_revil
Files
-
2024-04-27_b4e24ee0b9b7177c70ccd1cfce28aa51_avoslocker_revil.exe windows:5 windows x86 arch:x86
96b9c921f4f9ad81236383f855bb538c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
rpcrt4
UuidToStringW
RpcStringFreeW
UuidToStringA
RpcStringFreeA
UuidCreate
shell32
CommandLineToArgvW
SHCreateDirectoryExW
SHGetKnownFolderPath
SHGetFolderLocation
SHGetPathFromIDListW
SHGetFolderPathW
shlwapi
PathRemoveBackslashW
PathRenameExtensionW
PathIsDirectoryW
PathStripPathW
PathIsFileSpecW
PathAddExtensionW
PathRemoveExtensionW
PathRemoveFileSpecW
PathFindExtensionW
PathFindFileNameW
PathFileExistsW
PathAppendW
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
winhttp
WinHttpOpen
WinHttpReadData
WinHttpCrackUrl
WinHttpSetStatusCallback
WinHttpConnect
WinHttpCloseHandle
WinHttpSetOption
WinHttpOpenRequest
WinHttpAddRequestHeaders
WinHttpSendRequest
WinHttpSetCredentials
WinHttpReceiveResponse
WinHttpQueryHeaders
WinHttpGetProxyForUrl
WinHttpGetIEProxyConfigForCurrentUser
WinHttpQueryAuthSchemes
WinHttpQueryDataAvailable
WinHttpSetTimeouts
kernel32
CreateJobObjectW
AssignProcessToJobObject
SetInformationJobObject
GetModuleFileNameW
MultiByteToWideChar
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
FindClose
FindFirstFileW
FindNextFileW
SetLastError
CopyFileA
GetTickCount
GetCurrentProcessId
GetExitCodeProcess
GetCurrentThreadId
GetSystemTime
SystemTimeToFileTime
GetEnvironmentVariableA
QueryPerformanceCounter
QueryPerformanceFrequency
GetTempPathW
GetModuleHandleExW
WaitForMultipleObjects
GlobalFree
IsValidLocale
SetFilePointerEx
ReadConsoleW
OpenProcess
ResumeThread
TerminateProcess
GetCurrentProcess
CreateEventW
SetEvent
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
RaiseException
DuplicateHandle
DecodePointer
RemoveDirectoryW
CreateDirectoryW
SetEnvironmentVariableW
GetEnvironmentVariableW
WideCharToMultiByte
lstrlenW
CreateProcessW
WaitForSingleObject
GetCommandLineW
LocalFree
LocalAlloc
Sleep
CreateNamedPipeW
PeekNamedPipe
ConnectNamedPipe
GetLastError
CloseHandle
WriteFile
ReadFile
CreateFileW
GetUserDefaultLCID
EnumSystemLocalesW
GetCurrentDirectoryW
SetStdHandle
SetConsoleMode
ReadConsoleInputW
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
WriteConsoleW
GetConsoleMode
GetConsoleCP
FreeLibraryAndExitThread
ExitThread
MoveFileExW
SetConsoleCtrlHandler
ExitProcess
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetFileInformationByHandle
GetDriveTypeW
LoadLibraryExW
TerminateThread
GetFileAttributesW
InterlockedPushEntrySList
RtlUnwind
InitializeSListHead
GetStartupInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
GetLocaleInfoW
LCMapStringW
CompareStringW
EncodePointer
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetStringTypeW
CreateProcessA
FlushConsoleInputBuffer
CreateThread
ResetEvent
OutputDebugStringA
FreeLibrary
GetProcAddress
LoadLibraryW
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
ReleaseSemaphore
CreateSemaphoreW
GetLocalTime
GetDateFormatW
GetTimeFormatW
GetStdHandle
GetFileType
GetModuleHandleA
SetFilePointer
GetCurrentThread
GetTimeZoneInformation
LoadLibraryA
GlobalMemoryStatus
GetFileSizeEx
CreateMutexW
ReleaseMutex
OpenMutexW
FlushFileBuffers
GetFileSize
LockFileEx
SetEndOfFile
UnlockFileEx
GetFileAttributesExW
MapViewOfFile
CreateFileMappingW
FormatMessageA
GetSystemTimeAsFileTime
CreateFileMappingA
UnlockFile
HeapCompact
GetSystemInfo
DeleteFileW
DeleteFileA
WaitForSingleObjectEx
CreateFileA
FlushViewOfFile
OutputDebugStringW
GetFileAttributesA
GetDiskFreeSpaceA
FormatMessageW
GetTempPathA
HeapValidate
UnmapViewOfFile
GetFullPathNameA
LockFile
GetDiskFreeSpaceW
GetFullPathNameW
HeapCreate
AreFileApisANSI
GetACP
GetModuleHandleW
user32
GetProcessWindowStation
MessageBoxA
GetUserObjectInformationW
advapi32
EnumDependentServicesW
CryptGenRandom
CryptReleaseContext
CryptAcquireContextW
CopySid
OpenThreadToken
ReportEventA
RegisterEventSourceA
DeregisterEventSource
GetNamedSecurityInfoW
GetSecurityDescriptorSacl
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
SetEntriesInAclW
SetSecurityInfo
ConvertStringSecurityDescriptorToSecurityDescriptorW
RevertToSelf
RegCloseKey
ConvertSecurityDescriptorToStringSecurityDescriptorW
MakeAbsoluteSD
CreateWellKnownSid
QueryServiceStatus
SetNamedSecurityInfoW
GetExplicitEntriesFromAclW
ConvertStringSidToSidW
ConvertSidToStringSidA
QueryServiceStatusEx
OpenServiceW
OpenSCManagerW
AllocateAndInitializeSid
DeleteService
ControlService
CloseServiceHandle
LookupPrivilegeValueW
SetTokenInformation
SetSecurityDescriptorSacl
InitializeAcl
GetTokenInformation
GetSecurityDescriptorDacl
GetLengthSid
GetFileSecurityW
GetAclInformation
GetAce
FreeSid
EqualSid
DuplicateTokenEx
CreateRestrictedToken
AddMandatoryAce
OpenProcessToken
SetThreadToken
CreateProcessAsUserW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
ole32
CoTaskMemFree
CoUninitialize
CoSetProxyBlanket
CoInitializeSecurity
CoInitializeEx
CoCreateInstance
oleaut32
SysFreeString
VariantTimeToSystemTime
VariantInit
SysStringByteLen
SysAllocStringByteLen
SysAllocString
SysStringLen
VariantClear
setupapi
CM_Get_DevNode_Status
SetupDiEnumDeviceInfo
SetupDiDestroyDeviceInfoList
SetupDiGetClassDevsW
SetupDiGetDeviceRegistryPropertyW
SetupDiGetDeviceInstanceIdW
Exports
Exports
AGDServiceAllKeysInSubDomain
AGDServiceConvertAGDStatusTypeEnumToString
AGDServiceCountKeysInSubDomain
AGDServiceRemoveAllKeysInSubDomain
AGDServiceRemoveKeyInSubDomain
AGDServiceSetMultipleValueForKeyInSubDomain
AGDServiceSetValueForKeyInSubDomain
AGDServiceValueForKeyInSubDomain
AGDTruncateAdobeGenuineDataTable
CCDGetNGLAppID
CCDServiceSetAllRecords
CCDTruncateCCDataTable
IAL_CloseSession
IAL_CreateSession
IAL_DownloadAdobeGCClientFromPath
IAL_FetchRulesForLEIDs
IAL_GetAdobeGCClientAppDownloadPath
IAL_GetClientConfiguration
IAL_GetServerURLFromDispatch
IAL_GetVersion
IAL_PostRulesForLEIDs
IAL_SendCheckPatch
IAL_SendEventToETSHostfileMod
IAL_SendInAppEvents
IAL_SendMachineEvents
IAL_SendNotifAuditEvents
IAL_SendPHEvents
IAL_SendPatchAudit
IAL_SendUninstallationStatus
IAL_SetLoggingMethod
IAL_SetProxyDetails
LEDGetCachedGMEpoch
LEDServiceGetAllRecords
LEDServiceRecordEvent
LEDTruncateGCDataTable
RSDConvertPCDStatusTypeEnumToString
RSDServiceGetAllRecords
RSDServiceRecordStatus
RSDTruncateGCDataTable
Sections
.text Size: 2.5MB - Virtual size: 2.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 537KB - Virtual size: 536KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 145KB - Virtual size: 165KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 732KB - Virtual size: 736KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE