Static task
static1
Behavioral task
behavioral1
Sample
2024-04-27_cd261fbf17e2a91e06c8a5a66d0f47ee_avoslocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-27_cd261fbf17e2a91e06c8a5a66d0f47ee_avoslocker.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-04-27_cd261fbf17e2a91e06c8a5a66d0f47ee_avoslocker
-
Size
10.0MB
-
MD5
cd261fbf17e2a91e06c8a5a66d0f47ee
-
SHA1
c7c889d6a04d206a099abdcba75a33dd051e822d
-
SHA256
e0ee5174120f3aac87e7c26301a960707e5dbcab7b33725bf9fc960e7cc08988
-
SHA512
6b23a9ab66510d8c5d896882ea29ce87f3a145c37302b082feb103587aabae8872799361d37e2b86544ede0f7fd045baf71cf6b3a67b8a7acb153ef755e89bf4
-
SSDEEP
196608:DbyPsGs+ct8cV8luwJsv6tWKFdu9C0DZE:Dby0ScV88wJsv6tWKFdu9C
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-04-27_cd261fbf17e2a91e06c8a5a66d0f47ee_avoslocker
Files
-
2024-04-27_cd261fbf17e2a91e06c8a5a66d0f47ee_avoslocker.exe windows:6 windows x86 arch:x86
57e1cb14ecd23c9d75fccf688bf189f8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetFontData
GetStockObject
AddFontResourceExW
RemoveFontResourceExW
AddFontMemResourceEx
RemoveFontMemResourceEx
GetTextMetricsW
GetObjectW
GetTextFaceW
ChoosePixelFormat
DescribePixelFormat
GetPixelFormat
SetPixelFormat
SwapBuffers
GetBitmapBits
GetCharABCWidthsW
GetCharABCWidthsFloatW
GetGlyphOutlineW
GetOutlineTextMetricsW
GetTextExtentPoint32W
GetCharABCWidthsI
SetBkMode
SetGraphicsMode
SetTextColor
SetTextAlign
SetWorldTransform
ExtTextOutW
CreateCompatibleDC
CreateRectRgn
DeleteDC
CombineRgn
CreateBitmap
GetDIBits
DeleteObject
GetRegionData
SelectClipRgn
SelectObject
CreateDIBSection
GdiFlush
BitBlt
OffsetRgn
GetDeviceCaps
CreateCompatibleBitmap
CreateDCW
EnumFontFamiliesExW
CreateFontIndirectW
ole32
StringFromGUID2
CoTaskMemAlloc
CoGetMalloc
ReleaseStgMedium
CoTaskMemFree
CoUninitialize
CoCreateInstance
OleIsCurrentClipboard
OleFlushClipboard
OleGetClipboard
OleSetClipboard
CoCreateGuid
CoInitialize
OleUninitialize
OleInitialize
RevokeDragDrop
RegisterDragDrop
CoLockObjectExternal
DoDragDrop
user32
TrackMouseEvent
GetClipboardFormatNameW
RegisterClassW
GetCursorInfo
GetIconInfo
CreateIconIndirect
CreateCursor
LoadCursorW
GetCursor
SetCursorPos
NotifyWinEvent
SetMenuItemInfoW
TrackPopupMenuEx
GetMenu
MapVirtualKeyW
ToUnicode
ToAscii
GetKeyboardState
GetKeyState
IsZoomed
PeekMessageW
SetCaretPos
HideCaret
DestroyCaret
CreateCaret
RegisterWindowMessageW
GetKeyboardLayout
GetAsyncKeyState
RegisterClipboardFormatW
ChangeClipboardChain
SetClipboardViewer
LoadIconW
EnumDisplayMonitors
GetMonitorInfoW
LoadImageW
GetSysColorBrush
ChildWindowFromPointEx
GetCursorPos
GetClientRect
GetFocus
RegisterClassExW
GetClassInfoW
UnregisterClassW
GetKeyboardLayoutList
GetAncestor
DestroyIcon
DestroyCursor
GetWindowThreadProcessId
SetParent
GetParent
SetWindowLongW
GetWindowLongW
ScreenToClient
ClientToScreen
SetCursor
AdjustWindowRectEx
GetWindowRect
SetWindowTextW
GetDC
ReleaseDC
GetMessageExtraInfo
GetSystemMenu
EnableMenuItem
InvalidateRect
GetUpdateRect
GetSystemMetrics
GetSysColor
MessageBoxW
DrawIconEx
TranslateMessage
DispatchMessageW
GetQueueStatus
MsgWaitForMultipleObjectsEx
SetTimer
KillTimer
SetWindowsHookExW
UnhookWindowsHookEx
CallNextHookEx
PostThreadMessageW
CharNextExA
GetWindowTextW
EnumWindows
RealGetWindowClassW
SystemParametersInfoW
DefWindowProcW
EndPaint
BeginPaint
SetForegroundWindow
GetForegroundWindow
ReleaseCapture
SetCapture
GetCapture
SetFocus
IsIconic
IsWindowVisible
SetWindowPlacement
GetWindowPlacement
SetWindowPos
MoveWindow
FlashWindowEx
ShowWindow
IsChild
CreateWindowExW
AttachThreadInput
PostMessageW
SendMessageW
GetDesktopWindow
GetCaretBlinkTime
MessageBeep
IsWindow
GetDoubleClickTime
SetWindowRgn
DestroyWindow
imm32
ImmSetCandidateWindow
ImmSetCompositionWindow
ImmNotifyIME
ImmGetCompositionStringW
ImmAssociateContext
ImmReleaseContext
ImmGetContext
ImmGetDefaultIMEWnd
ImmGetVirtualKey
winmm
PlaySoundW
oleaut32
SysAllocString
SysAllocStringLen
SystemTimeToVariantTime
VariantChangeType
VariantInit
SysStringLen
SysFreeString
shell32
CommandLineToArgvW
SHGetSpecialFolderPathW
SHGetMalloc
SHGetPathFromIDListW
SHBrowseForFolderW
ShellExecuteW
SHGetFileInfoW
advapi32
CopySid
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
OpenProcessToken
FreeSid
GetLengthSid
GetTokenInformation
RegCreateKeyExW
RegDeleteKeyW
RegDeleteValueW
RegEnumKeyExW
RegEnumValueW
RegFlushKey
RegQueryInfoKeyW
RegSetValueExW
kernel32
EncodePointer
RtlUnwind
InitializeSListHead
GetSystemTimeAsFileTime
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsProcessorFeaturePresent
VirtualFree
VirtualAlloc
CreateMutexW
ReleaseMutex
ReadConsoleW
GetConsoleOutputCP
SetFileAttributesW
SetStdHandle
HeapFree
HeapAlloc
DecodePointer
HeapReAlloc
EnumSystemLocalesW
GetFileSizeEx
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetUserGeoID
GetGeoInfoW
GetTimeZoneInformation
SetEnvironmentVariableW
GetModuleHandleA
SleepEx
CancelIo
PeekNamedPipe
ReadFileEx
GetModuleHandleExW
FreeLibrary
FindNextFileW
FindFirstFileExW
FindNextChangeNotification
FindFirstChangeNotificationW
FindCloseChangeNotification
RaiseException
GetModuleFileNameW
GetStartupInfoW
GetProcessId
GetExitCodeProcess
TerminateProcess
CreateNamedPipeW
ConnectNamedPipe
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
MoveFileExW
SetFilePointerEx
SetEndOfFile
GetFileType
FlushFileBuffers
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
MoveFileW
CopyFileW
DeviceIoControl
GetTempPathW
RemoveDirectoryW
GetLogicalDrives
GetFullPathNameW
GetFileInformationByHandle
GetFileAttributesW
FindFirstFileW
FindClose
DeleteFileW
CreateDirectoryW
GetCurrentDirectoryW
GetFileAttributesExW
GetUserDefaultUILanguage
GetCurrencyFormatW
GetTimeFormatW
GetDateFormatW
ResetEvent
GetSystemInfo
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
ResumeThread
TerminateThread
InitializeCriticalSectionAndSpinCount
LoadLibraryExW
SetLastError
GetCommandLineA
ExitThread
FreeLibraryAndExitThread
MultiByteToWideChar
GetConsoleMode
GetThreadPriority
SetThreadPriority
GetCurrentThread
CreateThread
SwitchToThread
GetCurrentProcess
WaitForMultipleObjects
Sleep
WaitForSingleObject
DuplicateHandle
LCMapStringW
GetLocalTime
GetSystemTime
LoadLibraryW
GetSystemDirectoryW
GetTickCount
GetProcessHeap
GetStringTypeW
WriteConsoleW
WriteFileEx
GetProcAddress
lstrcmpW
GetVolumeInformationW
GetLongPathNameW
GetDriveTypeW
GetLastError
GetCurrentThreadId
GetModuleHandleW
LocalFree
FormatMessageW
IsValidLanguageGroup
IsValidLocale
SetErrorMode
ExpandEnvironmentStringsW
CloseHandle
CreateProcessW
GetUserDefaultLangID
CheckRemoteDebuggerPresent
OpenProcess
GlobalAlloc
GlobalLock
GlobalUnlock
GetLocaleInfoW
LoadLibraryA
GlobalSize
GetCurrentProcessId
CreateFileW
ReadFile
SetFilePointer
WriteFile
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
WideCharToMultiByte
GetConsoleWindow
ExitProcess
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
CompareStringW
GetUserDefaultLCID
GetCommandLineW
OutputDebugStringW
SetEvent
WaitForSingleObjectEx
CreateEventW
QueryPerformanceCounter
QueryPerformanceFrequency
HeapSize
ws2_32
WSAAsyncSelect
Sections
.text Size: 6.6MB - Virtual size: 6.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3.0MB - Virtual size: 3.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 111KB - Virtual size: 150KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.qtmetad Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 13B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 340B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 1024B - Virtual size: 560B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 212KB - Virtual size: 212KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ