EasyAntiCheat_Setup.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-09_4cf265c7510fbf774aea9d7bdf10fcc9_avoslocker.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-05-09_4cf265c7510fbf774aea9d7bdf10fcc9_avoslocker.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-09_4cf265c7510fbf774aea9d7bdf10fcc9_avoslocker
-
Size
1.6MB
-
MD5
4cf265c7510fbf774aea9d7bdf10fcc9
-
SHA1
302de90775551c1b594267853771f13afd3dbd46
-
SHA256
aa1e0ace36cccc0e6119a7d1eb9bc91e9e85ea529ff05b709058c60c35b46a49
-
SHA512
b674156e9530d88899eb934ae08338d6b34ef375e83685b9eabe1059bd959e7d81f8c88f99d0e17db7987fbd2b73fab1d53e87ac104617ca29e00475930922da
-
SSDEEP
49152:IMj/D/zsoyj2cWO3Ey+YiFKfO6Ncq0re0d37JWyAqAu:IM3/zxO3p+twSqOe0bWG9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-09_4cf265c7510fbf774aea9d7bdf10fcc9_avoslocker
Files
-
2024-05-09_4cf265c7510fbf774aea9d7bdf10fcc9_avoslocker.exe windows:6 windows x86 arch:x86
e4bb1d0c30e1f7c9577f2db0239ee7f5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
LoadResource
FindResourceW
GlobalLock
GlobalUnlock
RemoveDirectoryW
GetModuleFileNameW
GetTempPathW
CopyFileW
MoveFileW
GetExitCodeProcess
CreateDirectoryW
HeapFree
SetLastError
HeapAlloc
GetProcessHeap
LockResource
SizeofResource
K32EnumProcesses
OutputDebugStringW
SetFileAttributesW
OpenProcess
K32GetProcessImageFileNameW
WaitForMultipleObjects
TerminateProcess
OutputDebugStringA
WriteFile
IsWow64Process
GetLogicalDriveStringsW
QueryDosDeviceW
GetSystemDirectoryW
LocalAlloc
ExitProcess
SetEndOfFile
WriteConsoleW
HeapSize
GetFileAttributesExW
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetTimeZoneInformation
FlushFileBuffers
SetStdHandle
GetCurrentDirectoryW
SetFilePointerEx
EnumSystemLocalesW
GetUserDefaultLCID
FileTimeToSystemTime
GetCurrentProcess
FormatMessageA
WideCharToMultiByte
LocalFree
MultiByteToWideChar
GetFullPathNameW
CreateThread
GetLastError
Sleep
ResumeThread
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
ResetEvent
SetEvent
CreateEventW
WaitForSingleObject
GetLocaleInfoW
GetFileTime
GetModuleHandleW
DeleteFileW
GetFileInformationByHandle
IsValidLocale
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
HeapReAlloc
GetConsoleOutputCP
ReadConsoleW
GetConsoleMode
FindClose
ExpandEnvironmentStringsW
FindNextFileW
GetFileSizeEx
FindFirstFileW
LoadLibraryA
ReadFile
GetSystemTimeAsFileTime
LoadLibraryW
MapViewOfFile
CreateFileMappingW
CloseHandle
UnmapViewOfFile
CreateFileW
FreeLibrary
GetProcAddress
GlobalFree
GlobalAlloc
GetStdHandle
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
GetFileType
GetDriveTypeW
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
SleepEx
InitializeCriticalSectionEx
ExpandEnvironmentStringsA
GetModuleHandleA
GetTickCount64
VerifyVersionInfoA
GetSystemDirectoryA
VerSetConditionMask
WaitForSingleObjectEx
CreateFileA
QueryPerformanceCounter
QueryPerformanceFrequency
EncodePointer
DecodePointer
LCMapStringEx
GetLocaleInfoEx
GetStringTypeW
CompareStringEx
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
RtlUnwind
RaiseException
user32
SetForegroundWindow
ReleaseCapture
UpdateWindow
SystemParametersInfoW
PostQuitMessage
GetClientRect
ReleaseDC
LoadCursorW
LoadIconW
TranslateMessage
MoveWindow
GetMonitorInfoW
DispatchMessageW
ShowWindow
InvalidateRect
BeginPaint
EndPaint
SetCapture
CreateWindowExW
RegisterClassExW
PostMessageW
SetWindowPos
FillRect
SetWindowTextW
MapWindowPoints
IsWindowEnabled
SendMessageA
MapDialogRect
DrawTextW
GetClassInfoExW
EnableWindow
GetWindowTextW
GetMessageW
DefWindowProcW
GetWindowRect
DestroyWindow
GetDC
MessageBoxW
MonitorFromRect
SendMessageW
advapi32
RegDeleteKeyW
StartServiceW
DeleteService
OpenSCManagerW
CloseServiceHandle
CreateServiceW
GetTokenInformation
OpenProcessToken
ChangeServiceConfig2W
StartServiceCtrlDispatcherW
RegisterServiceCtrlHandlerW
SetServiceStatus
CryptAcquireContextA
CryptGenRandom
CryptCreateHash
CryptHashData
CryptDestroyHash
CryptGetHashParam
CryptReleaseContext
RegQueryValueExW
SetSecurityDescriptorDacl
GetSecurityDescriptorDacl
BuildExplicitAccessWithNameW
AllocateAndInitializeSid
SetEntriesInAclW
ConvertStringSidToSidW
SetServiceObjectSecurity
ControlService
FreeSid
CheckTokenMembership
InitializeSecurityDescriptor
OpenServiceW
LookupAccountSidW
QueryServiceObjectSecurity
RegCloseKey
RegOpenKeyExW
RegCreateKeyExW
RegSetValueExW
ConvertStringSecurityDescriptorToSecurityDescriptorW
shell32
SHFileOperationW
CommandLineToArgvW
ShellExecuteW
ShellExecuteExW
ole32
CoTaskMemFree
CoInitializeEx
CreateStreamOnHGlobal
gdi32
AddFontMemResourceEx
DeleteObject
RestoreDC
DeleteDC
GetDeviceCaps
CreateCompatibleDC
SelectObject
SaveDC
CreateCompatibleBitmap
BitBlt
CreateFontW
SetDCPenColor
RoundRect
SetDCBrushColor
SetBkMode
SetTextColor
GetTextExtentPoint32W
GetStockObject
RemoveFontMemResourceEx
gdiplus
GdiplusShutdown
GdipCreateLineBrushI
GdipDeleteBrush
GdipDrawImageRectI
GdipLoadImageFromStream
GdipFree
GdipDisposeImage
GdipAlloc
GdipCloneImage
GdipFillRectangleI
GdiplusStartup
GdipDeleteGraphics
GdipCreateFromHDC
crypt32
CertFreeCertificateContext
CryptStringToBinaryA
CertCloseStore
CertFindCertificateInStore
CertGetCertificateChain
CertFreeCertificateChainEngine
CertAddCertificateContextToStore
CryptQueryObject
CertFreeCertificateChain
CertGetNameStringA
CertCreateCertificateChainEngine
CertOpenStore
ws2_32
WSASetLastError
recv
send
setsockopt
htons
getsockopt
connect
ntohs
socket
getsockname
getpeername
WSAGetLastError
closesocket
WSAIoctl
bind
select
__WSAFDIsSet
ioctlsocket
freeaddrinfo
getaddrinfo
WSAStartup
WSACleanup
Sections
.text Size: 609KB - Virtual size: 608KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 133KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 324KB - Virtual size: 324KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 592KB - Virtual size: 596KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE