Static task
static1
Behavioral task
behavioral1
Sample
2024-05-09_1ab5d92c5e6339e4ef82cd1d5c491bf2_avoslocker_revil.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-09_1ab5d92c5e6339e4ef82cd1d5c491bf2_avoslocker_revil.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-09_1ab5d92c5e6339e4ef82cd1d5c491bf2_avoslocker_revil
-
Size
3.7MB
-
MD5
1ab5d92c5e6339e4ef82cd1d5c491bf2
-
SHA1
1de4d19cec3ddcd2cc4ea660d55a49502a4af51d
-
SHA256
2183d73d8c1b71dc8c09273e9b4739ce11811aaa508663f7312c11e248ccb903
-
SHA512
1d6cd6680f3f444162c23fbe76090acbfcc71329a429a992c30fa74a3fc01aeff5c68b2629423133e158ed1f2a42edf9e03efe3e7ec3267f9eafde8659ae591a
-
SSDEEP
98304:Ue5yJSTH38GgbFgyYIBFJwMljkWwC4BnB:UNo8GaCy5BFOMljkWwvFB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-09_1ab5d92c5e6339e4ef82cd1d5c491bf2_avoslocker_revil
Files
-
2024-05-09_1ab5d92c5e6339e4ef82cd1d5c491bf2_avoslocker_revil.exe windows:6 windows x86 arch:x86
1e2321ad6141717e4774fe83ce37c507
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
wtsapi32
WTSQueryUserToken
WTSQuerySessionInformationW
WTSEnumerateSessionsW
WTSFreeMemory
crypt32
CertOpenStore
CertCloseStore
CertEnumCertificatesInStore
CertFreeCertificateContext
CertFindCertificateInStore
CertGetCertificateContextProperty
CertGetEnhancedKeyUsage
CertGetIntendedKeyUsage
CertOpenSystemStoreW
CertDuplicateCertificateContext
ws2_32
getservbyport
gethostbyname
gethostbyaddr
inet_ntoa
inet_addr
shutdown
getpeername
getsockname
getservbyname
getsockopt
htons
send
WSACloseEvent
WSACreateEvent
WSAEnumNetworkEvents
WSAEventSelect
WSAResetEvent
WSAWaitForMultipleEvents
closesocket
WSAGetLastError
recv
bind
ntohs
ioctlsocket
freeaddrinfo
getaddrinfo
listen
htonl
accept
select
__WSAFDIsSet
WSACleanup
WSAStartup
inet_ntop
inet_pton
WSAIoctl
WSASetLastError
socket
setsockopt
connect
kernel32
CreateFiberEx
DeleteFiber
SwitchToFiber
VirtualFree
AcquireSRWLockShared
ReleaseSRWLockShared
InitializeSRWLock
CreateThread
WaitForSingleObject
CloseHandle
HeapDestroy
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
GetProcessHeap
SizeofResource
LockResource
LoadResource
FindResourceExW
FindResourceW
WideCharToMultiByte
GetModuleFileNameW
MultiByteToWideChar
CreateFileW
GetFileSize
ReadFile
LoadLibraryW
GetProcAddress
FreeLibrary
GetCurrentProcess
IsWow64Process
GetBinaryTypeW
GetFileTime
FileTimeToSystemTime
GetWindowsDirectoryW
CreateToolhelp32Snapshot
Process32FirstW
OpenProcess
QueryFullProcessImageNameW
Process32NextW
FindFirstFileW
FindNextFileW
FindClose
WTSGetActiveConsoleSessionId
GlobalMemoryStatusEx
GetDiskFreeSpaceExW
GetTickCount
Sleep
WriteFile
GetModuleFileNameA
DeleteFileA
CreateFileA
DeleteFileW
ConvertFiberToThread
GetProcessId
OpenEventA
CreateEventW
SetEvent
InitializeCriticalSectionEx
GetLastError
DecodePointer
DeleteCriticalSection
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
EnterCriticalSection
LeaveCriticalSection
SleepEx
QueryPerformanceFrequency
GetSystemDirectoryW
GetModuleHandleW
QueryPerformanceCounter
SetLastError
FormatMessageW
MoveFileExW
WaitForSingleObjectEx
CompareFileTime
GetSystemTimeAsFileTime
GetEnvironmentVariableA
VerSetConditionMask
GetModuleHandleA
VerifyVersionInfoW
GetTimeFormatW
GetDateFormatW
GetTimeZoneInformation
EnumSystemLocalesW
SetConsoleMode
GetEnvironmentVariableW
SystemTimeToFileTime
GetSystemTime
WriteConsoleW
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetSystemDirectoryA
ConvertThreadToFiberEx
CompareStringW
LCMapStringW
GetLocaleInfoW
GetConsoleOutputCP
ReadConsoleW
GetConsoleMode
GetACP
IsValidCodePage
FindFirstFileExW
GetStdHandle
ExitProcess
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
GetFileInformationByHandle
GetDriveTypeW
GetFileAttributesExW
SetConsoleCtrlHandler
GetFullPathNameW
IsValidLocale
GetUserDefaultLCID
CreateProcessW
ReadConsoleA
GetCurrentDirectoryW
SetEndOfFile
SetStdHandle
FlushFileBuffers
GetFileSizeEx
SetFilePointerEx
LoadLibraryA
IsDebuggerPresent
OutputDebugStringW
RaiseException
FormatMessageA
EncodePointer
LCMapStringEx
GetStringTypeW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
WakeAllConditionVariable
SleepConditionVariableSRW
GetStartupInfoW
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
RtlUnwind
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
GetFileType
user32
CharLowerW
MessageBoxW
GetProcessWindowStation
GetUserObjectInformationW
advapi32
CryptCreateHash
CryptSignHashW
CryptDecrypt
CryptExportKey
CryptGetUserKey
CryptGetProvParam
CryptSetHashParam
CryptDestroyKey
ReportEventW
RegisterEventSourceW
DeregisterEventSource
GetUserNameW
CryptDestroyHash
CryptHashData
CryptEnumProvidersW
CryptGetHashParam
CryptReleaseContext
CryptAcquireContextW
SetServiceStatus
RegisterServiceCtrlHandlerW
StartServiceCtrlDispatcherW
RegQueryValueExA
RegEnumValueW
RegEnumKeyW
RegQueryValueExW
RegCloseKey
RegEnumKeyExW
RegOpenKeyExW
shell32
SHGetFolderPathW
SHGetKnownFolderPath
ole32
CoCreateGuid
CoTaskMemFree
shlwapi
SHSetValueA
SHSetValueW
PathRemoveFileSpecA
PathFindFileNameW
PathFileExistsW
SHGetValueW
PathRemoveFileSpecW
SHDeleteValueA
SHGetValueA
PathAppendW
bcrypt
BCryptGenRandom
Sections
.text Size: 2.4MB - Virtual size: 2.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 630KB - Virtual size: 630KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 29KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 680KB - Virtual size: 684KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE