D:\apreltech\Sib\Sibl\Release\SibJS.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-03_5528d1d8c5bf17565cc9a0f5b8315459_avoslocker_cobalt-strike.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-03_5528d1d8c5bf17565cc9a0f5b8315459_avoslocker_cobalt-strike.exe
Resource
win10v2004-20240419-en
General
-
Target
2024-05-03_5528d1d8c5bf17565cc9a0f5b8315459_avoslocker_cobalt-strike
-
Size
461KB
-
MD5
5528d1d8c5bf17565cc9a0f5b8315459
-
SHA1
689bcd35331deaf9536ea93004edebfa3893bab2
-
SHA256
7ac89f19bf54809fb827bd2271a24436e25a1c1967dd29a82c338e6b0610514e
-
SHA512
7d2cc81366af0ed7e40f5e1ac7d54bc5587b835c360ca15878b475858fc37f8fec4466b0774e8712b9cb40d66d5df6abbdb44b892d7119a1dc1df6eef0f98479
-
SSDEEP
12288:5JufnybXNYbyH4g9lUYulf95tnwztboT6eSfEdn3pqe4Hs0:5JufnyWuH4ZlfxnwzY3pqnHs0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-03_5528d1d8c5bf17565cc9a0f5b8315459_avoslocker_cobalt-strike
Files
-
2024-05-03_5528d1d8c5bf17565cc9a0f5b8315459_avoslocker_cobalt-strike.exe windows:6 windows x86 arch:x86
cfbf747ae7ca0efeea8f5bb96e7f0454
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetLocaleInfoW
GetUserDefaultLCID
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
WriteConsoleW
ReadConsoleW
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
IsValidCodePage
FindFirstFileExW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
GetTimeZoneInformation
SetStdHandle
IsValidLocale
GetStdHandle
ExitProcess
GetCommandLineW
GetCommandLineA
HeapQueryInformation
GetModuleHandleExW
FreeLibraryAndExitThread
CreateThread
GetFileType
RtlUnwind
GetCPInfo
GetStringTypeW
LCMapStringEx
LCMapStringW
lstrlenW
MoveFileExW
FindNextFileW
RemoveDirectoryW
CreateDirectoryW
RaiseException
OutputDebugStringW
GlobalFlags
SystemTimeToTzSpecificLocalTime
GetFileTime
GetFileSizeEx
GetFileAttributesExW
FileTimeToLocalFileTime
ResumeThread
FileTimeToSystemTime
LocalReAlloc
LocalAlloc
GlobalHandle
GlobalReAlloc
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSection
CompareStringW
GlobalFindAtomW
GlobalAddAtomW
lstrcmpW
GlobalDeleteAtom
GetSystemDirectoryW
GetCurrentThreadId
EncodePointer
GetCurrentProcessId
LoadLibraryA
LoadLibraryExW
WriteFile
UnlockFile
SetEndOfFile
LockFile
GetVolumeInformationW
GetFullPathNameW
GetFileSize
FlushFileBuffers
FindFirstFileW
FindClose
lstrcmpA
GlobalLock
GlobalUnlock
GetModuleHandleA
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
SetLastError
OutputDebugStringA
GetACP
DeleteCriticalSection
InitializeCriticalSectionEx
HeapSize
HeapReAlloc
DecodePointer
SetConsoleOutputCP
GlobalFree
GlobalAlloc
WaitForSingleObject
DuplicateHandle
SetFileTime
SetFileAttributesW
SetCurrentDirectoryW
ExitThread
lstrcpynW
FormatMessageW
LocalFree
GetModuleHandleW
VirtualFree
VirtualAlloc
GetCurrentThread
GetCurrentProcess
GetProcessHeap
HeapFree
HeapAlloc
GetTempPathW
GetTempFileNameW
DeleteFileW
ExpandEnvironmentStringsW
CloseHandle
SetFilePointer
ReadFile
GetFileAttributesW
CreateFileW
WideCharToMultiByte
GetModuleFileNameW
MultiByteToWideChar
LoadLibraryW
FindResourceW
SizeofResource
LockResource
LoadResource
GetLastError
GetProcAddress
FreeLibrary
EnumSystemLocalesW
user32
GetMonitorInfoW
MonitorFromWindow
WinHelpW
LoadIconW
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExW
GetTopWindow
GetClassNameW
GetClassLongW
SetWindowLongW
PtInRect
CopyRect
GetSysColor
MapWindowPoints
ScreenToClient
AdjustWindowRectEx
GetWindowRect
GetPropW
SetPropW
wsprintfW
RedrawWindow
ValidateRect
EndPaint
BeginPaint
SetForegroundWindow
SetMenu
GetMenu
GetCapture
GetFocus
GetDlgCtrlID
GetDlgItem
IsIconic
EndDeferWindowPos
SetWindowTextW
GetDC
ReleaseDC
GetSysColorBrush
LoadCursorW
DrawTextW
DrawTextExW
GrayStringW
TabbedTextOutW
ClientToScreen
RemovePropW
GetClientRect
SetRectEmpty
OffsetRect
GetParent
GetSubMenu
GetMenuItemID
GetMenuItemCount
CharUpperW
GetSystemMetrics
SendMessageW
EnableWindow
IsWindowEnabled
MessageBoxW
GetWindowLongW
GetWindowThreadProcessId
GetLastActivePopup
GetScrollPos
GetWindowTextW
GetWindow
RegisterWindowMessageW
DispatchMessageW
RealChildWindowFromPoint
DestroyMenu
CheckMenuItem
EnableMenuItem
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
SetMenuItemInfoW
LoadBitmapW
PostQuitMessage
GetForegroundWindow
PeekMessageW
GetMessagePos
GetMessageTime
PostMessageW
DefWindowProcW
CallWindowProcW
RegisterClassW
GetClassInfoW
GetClassInfoExW
CreateWindowExW
IsWindow
IsMenu
DestroyWindow
SetWindowPos
BeginDeferWindowPos
GetKeyState
DeferWindowPos
gdi32
GetStockObject
PtVisible
RectVisible
RestoreDC
SaveDC
SelectObject
SetMapMode
TextOutW
ExtTextOutW
SetViewportExtEx
SetViewportOrgEx
SetWindowExtEx
OffsetViewportOrgEx
ScaleViewportExtEx
ScaleWindowExtEx
GetClipBox
Escape
DeleteObject
CreateBitmap
SetTextColor
SetBkColor
GetDeviceCaps
DeleteDC
winspool.drv
OpenPrinterW
ClosePrinter
DocumentPropertiesW
advapi32
ReportEventW
RegisterEventSourceW
DeregisterEventSource
GetTokenInformation
GetLengthSid
CopySid
OpenThreadToken
OpenProcessToken
shell32
SHGetFolderPathW
shlwapi
PathIsUNCW
PathStripToRootW
PathFindFileNameW
ole32
CoInitializeEx
CoUninitialize
CoCreateInstance
CoInitialize
oleaut32
SysFreeString
SafeArrayDestroy
SafeArrayPutElement
SysAllocString
VariantChangeType
VarBstrFromDate
VariantTimeToSystemTime
SystemTimeToVariantTime
VariantClear
VariantInit
SafeArrayCreateVector
rpcrt4
UuidCreate
UuidToStringW
RpcStringFreeW
oleacc
LresultFromObject
CreateStdAccessibleObject
Sections
.text Size: 346KB - Virtual size: 345KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 82KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ