EasyAntiCheat_EOS_Setup.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-02_35f0e8c9159a94b434c9750fd49e11f4_avoslocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-02_35f0e8c9159a94b434c9750fd49e11f4_avoslocker.exe
Resource
win10v2004-20240419-en
General
-
Target
2024-05-02_35f0e8c9159a94b434c9750fd49e11f4_avoslocker
-
Size
1.1MB
-
MD5
35f0e8c9159a94b434c9750fd49e11f4
-
SHA1
9143ff08fe3f990d360b178765da3650684071ed
-
SHA256
c459f68efe13ea848f767d43f77fb9349685de9990a257b966494e15dfe0aedb
-
SHA512
252ea59e8e91264eb60d77f0f0d5c20a98daa0010531bb0d5e65788cb194e1c29e9b2b324464c95d2abe61a8c74077720d89b01466a315b0aaceac13f04dd30a
-
SSDEEP
24576:HaCqKsMlUNXnUzhZ3DSKvmbgXe4i7ojhsP5Lgrk1TWb4AN5:6J6lUNXnUzh5DSKvve30jaNf1TWbdz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-02_35f0e8c9159a94b434c9750fd49e11f4_avoslocker
Files
-
2024-05-02_35f0e8c9159a94b434c9750fd49e11f4_avoslocker.exe windows:6 windows x86 arch:x86
719fbda806a3be5fc87e2c17dad2ab3f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
version
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
kernel32
ResumeThread
Sleep
GetLastError
CreateThread
SwitchToThread
MultiByteToWideChar
LocalFree
WideCharToMultiByte
GetLocalTime
ExitProcess
GetSystemTimeAsFileTime
LocalAlloc
GetSystemDirectoryW
LoadLibraryW
IsWow64Process
RemoveDirectoryW
GetTempPathW
SetFileAttributesW
GetCurrentProcessId
CopyFileW
MoveFileW
GetExitCodeProcess
WriteFile
TerminateProcess
WaitForMultipleObjects
K32GetProcessImageFileNameW
UnmapViewOfFile
OpenProcess
K32EnumProcesses
CreateFileMappingW
MapViewOfFile
MoveFileExW
HeapFree
HeapAlloc
GetProcessHeap
SetStdHandle
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
ResetEvent
SetEvent
CreateEventW
WaitForSingleObject
SetEndOfFile
GetLocaleInfoW
GetModuleHandleW
GetProcAddress
CloseHandle
DeleteFileW
GetFileInformationByHandle
GetFileAttributesW
CreateFileW
FindClose
GetModuleFileNameW
FindNextFileW
CompareStringW
GetFileSizeEx
FindFirstFileW
ReadFile
CreateDirectoryW
ReadConsoleW
HeapSize
WriteConsoleW
GetCurrentProcess
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
GetACP
IsValidCodePage
QueryPerformanceCounter
GetStringTypeW
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
EncodePointer
DecodePointer
LCMapStringW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetCurrentThreadId
InitializeSListHead
RtlUnwind
RaiseException
FreeLibrary
LoadLibraryExW
GetModuleHandleExW
GetStdHandle
GetCommandLineA
GetCommandLineW
GetFileType
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
SetFilePointerEx
GetDateFormatW
GetTimeFormatW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
HeapReAlloc
GetTimeZoneInformation
FindFirstFileExW
advapi32
StartServiceCtrlDispatcherW
SetSecurityDescriptorDacl
GetSecurityDescriptorDacl
BuildExplicitAccessWithNameW
SetEntriesInAclW
ConvertStringSidToSidW
SetServiceObjectSecurity
ControlService
InitializeSecurityDescriptor
QueryServiceConfigW
OpenServiceW
LookupAccountSidW
QueryServiceObjectSecurity
RegCloseKey
RegDeleteKeyW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
RegisterServiceCtrlHandlerExW
SetServiceStatus
DeleteService
StartServiceW
ConvertStringSecurityDescriptorToSecurityDescriptorW
CreateServiceW
CloseServiceHandle
OpenSCManagerW
ChangeServiceConfig2W
OpenProcessToken
GetTokenInformation
shell32
SHFileOperationW
SHGetKnownFolderPath
ShellExecuteExW
SHGetFolderPathW
ole32
CoTaskMemFree
Sections
.text Size: 322KB - Virtual size: 322KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 136KB - Virtual size: 136KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 580KB - Virtual size: 584KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE