C:\zoomcode\EP_2017\Bin\Release\NewInstaller.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-05_008fe7f1062196408b61eaf56bc54f63_avoslocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-05-05_008fe7f1062196408b61eaf56bc54f63_avoslocker.exe
Resource
win10v2004-20240419-en
General
-
Target
2024-05-05_008fe7f1062196408b61eaf56bc54f63_avoslocker
-
Size
1.2MB
-
MD5
008fe7f1062196408b61eaf56bc54f63
-
SHA1
c836c975a773d255f9901a38904242df4893afed
-
SHA256
82507777357bf7cb407f2e247e728aaf8f4ae31be416a1b08fa8d186e4e8173f
-
SHA512
42c2c257f5cd1100d168ffcc13e12e3a886ce057a1f2f335d8639160720febb9d9939cb1a896316a1612a2d2276c005d0bbd5fe0fda59fbdefca2fe96689badb
-
SSDEEP
24576:y16zoIm2lh69Hjlb9EQyQQ038ffNgNeNELXK/pIDVxIc8sE:70P2lh69DviQF8ffNgwNELXC+LZW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-05_008fe7f1062196408b61eaf56bc54f63_avoslocker
Files
-
2024-05-05_008fe7f1062196408b61eaf56bc54f63_avoslocker.exe windows:5 windows x86 arch:x86
7b22dc0227a5fb316ff3655970b23463
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
psapi
GetModuleBaseNameW
GetModuleFileNameExW
EnumProcessModules
EnumProcesses
shlwapi
PathFileExistsW
PathRemoveFileSpecW
PathAppendW
PathIsNetworkPathW
PathUnquoteSpacesW
PathAddBackslashW
PathIsPrefixW
PathIsRelativeW
StrCmpNIW
PathFileExistsA
wintrust
WTHelperGetProvSignerFromChain
WTHelperProvDataFromStateData
WTHelperGetProvCertFromChain
WinVerifyTrust
crypt32
CertGetNameStringW
kernel32
WideCharToMultiByte
InitializeCriticalSectionEx
RaiseException
DecodePointer
DeleteCriticalSection
GetModuleHandleW
CreateDirectoryW
SetFileAttributesW
ReadFile
WriteFile
SetFilePointer
TlsSetValue
SetLastError
SetFileTime
LocalFileTimeToFileTime
FreeLibrary
TlsGetValue
DosDateTimeToFileTime
GetTickCount
TlsAlloc
TlsFree
GetModuleFileNameW
IsBadStringPtrW
OpenProcess
IsBadReadPtr
CopyFileW
GetTempPathW
WaitForSingleObject
Sleep
MoveFileExW
CreateProcessW
GetTempFileNameW
SetDllDirectoryW
MoveFileW
LoadLibraryExW
ExpandEnvironmentStringsW
LocalFree
CreateMutexW
OpenMutexW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
FindNextFileW
RemoveDirectoryW
TerminateProcess
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
IsProcessorFeaturePresent
GetConsoleMode
ReadConsoleW
GetConsoleCP
SetFilePointerEx
GetFileType
GetFullPathNameW
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
GetStdHandle
GetStartupInfoW
GetFileSizeEx
InitializeCriticalSectionAndSpinCount
GetSystemTimeAsFileTime
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
SetStdHandle
SetEndOfFile
HeapReAlloc
GetDriveTypeW
ExitProcess
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetStringTypeW
WriteConsoleW
GetCurrentDirectoryW
EncodePointer
HeapSize
ResetEvent
WaitForSingleObjectEx
CreateEventW
QueryPerformanceCounter
InitializeSListHead
SwitchToThread
RtlUnwind
DeleteFileW
MultiByteToWideChar
GetWindowsDirectoryA
GetVersionExW
FindClose
FindFirstFileA
lstrlenW
GetCurrentProcessId
GetLocalTime
GetCurrentThreadId
CreateDirectoryA
OutputDebugStringW
GetFileAttributesA
GetTempPathA
OutputDebugStringA
GetModuleFileNameA
GetProcessHeap
GetProcAddress
HeapAlloc
CloseHandle
GetModuleHandleA
CreateFileW
HeapFree
VerifyVersionInfoW
VerSetConditionMask
GetLastError
GetFileAttributesW
FindFirstFileExW
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
FindFirstFileW
SetEvent
user32
ReleaseDC
BeginPaint
EndPaint
ShowWindow
LoadCursorW
SetCursor
CopyRect
IntersectRect
GetSysColor
CreateWindowExW
PtInRect
GetWindowLongW
ReleaseCapture
InflateRect
OffsetRect
wvsprintfW
UnregisterClassW
SendMessageW
RegisterClassExW
IsWindow
SetTimer
LoadStringW
GetClientRect
SetCapture
LoadIconW
SystemParametersInfoW
InvalidateRect
GetUpdateRect
GetDC
DrawEdge
DrawTextW
IsRectEmpty
EnumWindows
CharNextW
FillRect
TranslateMessage
SetWindowPos
SendMessageTimeoutW
DefWindowProcW
GetWindowRect
GetWindowThreadProcessId
DestroyWindow
GetParent
PostMessageW
MessageBoxW
PostQuitMessage
FindWindowW
GetMessageW
SetRect
DispatchMessageW
gdi32
SetBkColor
ExtTextOutW
RestoreDC
CreateCompatibleDC
SaveDC
CreateCompatibleBitmap
SelectClipRgn
SetBkMode
SetTextColor
CreateRectRgnIndirect
GetClipBox
SelectObject
CreateFontIndirectW
CreateSolidBrush
MoveToEx
GetObjectW
Rectangle
CreatePen
LineTo
GetTextExtentPoint32W
TextOutW
GetTextMetricsW
GetStockObject
ExtSelectClipRgn
GetObjectType
DeleteObject
advapi32
RegOpenKeyExA
RegDeleteValueA
RegSetValueExA
RegQueryValueExA
RegCloseKey
RegCreateKeyA
RegQueryValueExW
RegDeleteValueW
GetUserNameW
RegUnLoadKeyW
RegLoadKeyW
ConvertSidToStringSidW
RegDeleteKeyW
RegCreateKeyExW
RegEnumKeyExW
RegSetValueExW
RegOpenKeyExW
shell32
SHGetFolderPathA
SHFileOperationW
SHGetSpecialFolderPathA
SHGetSpecialFolderPathW
ShellExecuteW
SHFileOperationA
SHChangeNotify
ole32
PropVariantClear
CoInitialize
CoTaskMemAlloc
CoUninitialize
CoCreateInstance
CoSetProxyBlanket
CoInitializeSecurity
CoInitializeEx
oleaut32
SysAllocString
SysFreeString
VariantChangeType
VariantInit
VariantClear
Sections
.text Size: 394KB - Virtual size: 394KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 130KB - Virtual size: 129KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 133KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 588KB - Virtual size: 592KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE