d:\prime\release\procr8\procr8.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-02_9be6db275f5ce3dac012ee69fe4c3c2a_avoslocker.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-05-02_9be6db275f5ce3dac012ee69fe4c3c2a_avoslocker.exe
Resource
win10v2004-20240419-en
General
-
Target
2024-05-02_9be6db275f5ce3dac012ee69fe4c3c2a_avoslocker
-
Size
1.1MB
-
MD5
9be6db275f5ce3dac012ee69fe4c3c2a
-
SHA1
6e1101f503989f0d2967e8baa99fdf09ce840bf7
-
SHA256
af0e0c7e46e8cf4e982697ee806f04dc5bb805a52ae21614b40a8646cdfb2c94
-
SHA512
97e857b1806531867fc470edf8ab44123c20a3337975c588a4a3bc277b14d02d5fc8b382bb3c54f1ff00efc640913e25aa628c3af82b6f8ca15953106ca93801
-
SSDEEP
24576:Jp4ffqzKdRNBbC4H8XJsY7o318bBluSAurDUN3D53/:fcC4H8XBFluS76DR/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-02_9be6db275f5ce3dac012ee69fe4c3c2a_avoslocker
Files
-
2024-05-02_9be6db275f5ce3dac012ee69fe4c3c2a_avoslocker.exe windows:6 windows x86 arch:x86
22c7e746039a1b561962fc396eda9f3f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
Process32First
Process32Next
GetCurrentProcess
GetVersionExA
GetModuleHandleA
LoadLibraryA
GetFileAttributesExA
FileTimeToSystemTime
CreateProcessA
WritePrivateProfileStringA
WriteConsoleW
HeapSize
OutputDebugStringW
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
CreateToolhelp32Snapshot
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
MapViewOfFile
SetConsoleCtrlHandler
HeapReAlloc
CreateDirectoryW
ReadConsoleW
SetFilePointerEx
GetFileSizeEx
ReadFile
GetConsoleMode
GetConsoleOutputCP
OpenProcess
TerminateProcess
UnmapViewOfFile
CreateFileMappingA
GetEnvironmentStringsW
FlushFileBuffers
MoveFileExW
DeleteFileW
GetFileAttributesExW
SetStdHandle
GetFullPathNameW
GetCurrentDirectoryW
SetCurrentDirectoryW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetPrivateProfileStringA
LoadLibraryW
GetProcAddress
FreeLibrary
GetPrivateProfileIntA
WriteFile
MoveFileA
CopyFileA
GetWindowsDirectoryA
GetSystemTimeAsFileTime
GetSystemInfo
GetProcessTimes
Sleep
GetLastError
CloseHandle
GetFileTime
GetDiskFreeSpaceA
FindNextFileA
FindFirstFileA
FindClose
CreateFileA
FindFirstFileExW
SearchPathA
GetDateFormatW
HeapAlloc
HeapFree
GetCurrentThread
GetStdHandle
GetModuleFileNameW
GetModuleHandleExW
ExitProcess
SetEndOfFile
GetTimeZoneInformation
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
GetFileType
GetFileInformationByHandle
GetDriveTypeW
CreateFileW
GetLocalTime
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
SetLastError
InterlockedFlushSList
InterlockedPushEntrySList
RtlUnwind
RaiseException
InitializeSListHead
GetCurrentThreadId
FormatMessageA
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
LocalFree
EncodePointer
DecodePointer
LCMapStringEx
GetLocaleInfoEx
CompareStringEx
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
user32
wsprintfA
TranslateMessage
DispatchMessageA
PeekMessageA
MessageBoxA
GetMessageA
SendMessageA
DefWindowProcA
PostQuitMessage
RegisterClassA
CreateWindowExA
ShowWindow
UpdateWindow
FindWindowA
GetWindowThreadProcessId
GetDC
ReleaseDC
BeginPaint
EndPaint
SetRect
WaitForInputIdle
gdi32
SelectObject
CreateCompatibleDC
CreateBitmap
DeleteDC
xpdfrasterizer
pdfCloseLibrary
pdfSetConfig
pdfLoadFile
pdfGetNumEmbeddedFiles
pdfLoadFileWithPassword
pdfFree
pdfGetNumPages
pdfConvertPageToBitmap2
pdfCheckPageColorUsage
pdfFreeMemory
pdfGetEmbeddedFileName
pdfGetPageWidth
pdfGetPageRotation
pdfGetPageHeight
ff20m32l
ord77
ord76
ord75
ord74
ord73
ord2
ord1
ord33
ord24
ord18
ord28
ord21
ord22
ord23
ord20
ord15
ord19
ord14
ord10
ord6
ord4
ord3
pixdfltn
ord71
ord39
ord73
ord115
ord70
ord28
ord29
ord30
ord72
ord122
ord123
ord35
ord120
ord74
pixmdln
ord20
ord21
ord22
ord113
ord5
ord4
ord10
ord11
ord12
ord13
ord19
ord15
ord41
ord42
Sections
.text Size: 897KB - Virtual size: 897KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 176KB - Virtual size: 176KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ