C:\jenkins_slave\Daily\main_meta\Desktop\Win\dist\msvs_win32\Release\x86\sym\cosylib\customhook\customhook\CoreSyncCustomHook.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-02_f9be1aef5d6abaa2c5cff775db6a68f3_avoslocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-05-02_f9be1aef5d6abaa2c5cff775db6a68f3_avoslocker.exe
Resource
win10v2004-20240419-en
General
-
Target
2024-05-02_f9be1aef5d6abaa2c5cff775db6a68f3_avoslocker
-
Size
2.3MB
-
MD5
f9be1aef5d6abaa2c5cff775db6a68f3
-
SHA1
bfcc12e71d1a07e89ee67c25d036aee98bfb9a4e
-
SHA256
dc1d535727e870c7e639cb770c08aa1d32d38aed8e8343ada6b5265e1ecdff53
-
SHA512
edaa9a0872e378b3b0733d62369d1d29b510aa489610fe0598c3ed329c93bfc2c108f7ef93853fbe39b3566c69c37be7150cfeea70a7e44786bff2d2d3534330
-
SSDEEP
49152:xDmOOiI5ICnViyJtIkkPtar6fLsudoCizGXL5TgMZ++V6JaTzu:gJIC5JNWcudlizG7C/MT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-02_f9be1aef5d6abaa2c5cff775db6a68f3_avoslocker
Files
-
2024-05-02_f9be1aef5d6abaa2c5cff775db6a68f3_avoslocker.exe windows:6 windows x86 arch:x86
afd0c9b40924a1acb689fa4852e82912
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
Sleep
GetCurrentThread
GetUserDefaultLangID
WinExec
MoveFileExW
LocalAlloc
CreateProcessW
GetUserDefaultUILanguage
Process32FirstW
Process32NextW
CreateToolhelp32Snapshot
OpenProcess
WaitForSingleObject
GetTempPathW
TerminateProcess
lstrlenW
GetCommandLineW
DeleteCriticalSection
DecodePointer
RaiseException
GetLastError
InitializeCriticalSectionEx
FreeLibrary
MultiByteToWideChar
GetFileAttributesW
IsWow64Process
GetWindowsDirectoryW
HeapAlloc
GetProcessHeap
HeapFree
SetFileAttributesW
CreateDirectoryW
GetFullPathNameW
DeviceIoControl
SetEndOfFile
CreateFileW
GetFileInformationByHandle
GetFileAttributesExW
DeleteFileW
SetFilePointerEx
GetModuleHandleW
AreFileApisANSI
FindNextFileW
FindClose
ReadFile
TryEnterCriticalSection
HeapCreate
EnterCriticalSection
WriteFile
GetDiskFreeSpaceW
OutputDebugStringA
LockFile
LeaveCriticalSection
InitializeCriticalSection
SetFilePointer
GetFullPathNameA
UnlockFileEx
CreateMutexW
GetCurrentThreadId
UnmapViewOfFile
HeapValidate
HeapSize
GetTempPathA
GetDiskFreeSpaceA
GetFileAttributesA
OutputDebugStringW
FlushViewOfFile
CreateFileA
LoadLibraryA
DeleteFileA
HeapReAlloc
GetProcAddress
HeapCompact
HeapDestroy
UnlockFile
LockFileEx
GetFileSize
GetCurrentProcessId
SystemTimeToFileTime
GetSystemTimeAsFileTime
GetSystemTime
CreateFileMappingW
MapViewOfFile
QueryPerformanceCounter
GetTickCount
FlushFileBuffers
GetModuleFileNameW
GetLocaleInfoW
GetTimeZoneInformation
GetTimeFormatW
GetDateFormatW
GetVersionExW
GetStringTypeW
EncodePointer
LCMapStringEx
CompareStringEx
GetCPInfo
GetLocaleInfoEx
InitializeCriticalSectionAndSpinCount
ResetEvent
CreateEventW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwind
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
ExitProcess
GetModuleHandleExW
CreateThread
ExitThread
FreeLibraryAndExitThread
SetStdHandle
GetFileType
GetCommandLineA
GetFileSizeEx
CompareStringW
LCMapStringW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetConsoleOutputCP
GetConsoleMode
ReadConsoleW
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
WriteConsoleW
LoadLibraryW
GetStdHandle
GetCurrentProcess
CreateEventA
FormatMessageA
WideCharToMultiByte
LocalFree
CloseHandle
WaitForSingleObjectEx
SetEvent
GetSystemInfo
FormatMessageW
user32
GetWindowThreadProcessId
GetShellWindow
advapi32
CopySid
ConvertSidToStringSidW
RegSetValueExW
RegOpenKeyTransactedW
RegCreateKeyTransactedW
RegDeleteKeyValueW
GetLengthSid
RegDeleteTreeW
RegDeleteKeyTransactedW
RegDeleteValueW
RegEnumKeyExW
RegCreateKeyExW
RegDeleteKeyW
RegQueryInfoKeyW
CryptReleaseContext
CryptGetHashParam
LookupPrivilegeValueW
AdjustTokenPrivileges
ImpersonateSelf
OpenThreadToken
RegCloseKey
RegOpenKeyExW
CryptAcquireContextW
CryptCreateHash
CryptHashData
CryptDestroyHash
GetTokenInformation
DuplicateTokenEx
GetKernelObjectSecurity
FreeSid
OpenProcessToken
AllocateAndInitializeSid
EqualSid
RegQueryValueExW
shell32
SHGetKnownFolderPath
SHGetSpecialFolderPathW
SHGetFolderPathW
SHFileOperationW
SHChangeNotify
ord165
rstrtmgr
RmEndSession
RmShutdown
RmStartSession
RmRegisterResources
RmRestart
RmGetList
ktmw32
CreateTransaction
CommitTransaction
ole32
CoInitializeEx
CoTaskMemFree
CoUninitialize
CoCreateInstance
shlwapi
StrCmpNW
Sections
.text Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 224KB - Virtual size: 223KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 616KB - Virtual size: 620KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE