D:\Work\OpenSource\Github\MeshAgent\x86\Release\winhwapi.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-10_76a10201bd7dfa86a84169febf508e36_avoslocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-10_76a10201bd7dfa86a84169febf508e36_avoslocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-05-10_76a10201bd7dfa86a84169febf508e36_avoslocker
-
Size
1.7MB
-
MD5
76a10201bd7dfa86a84169febf508e36
-
SHA1
8375a85cb80898cd9a7cc3b7a4924d10cd2a2405
-
SHA256
e58fc3425cb2dea0788a1289a3c627b77ed0c289894e4118f70f652c3a4afb05
-
SHA512
e870ceeb1f4230d6134957a7ae0dd74579dbcdb95bd01195c8b3b1efc86b3e6fcd4d101e76bcd68756169446ee3ec77139d60a3f15c96fface84b483d6680f2d
-
SSDEEP
49152:jgGlzTusf0j2nnMbr3H/GwvSXxQsf0j2nnMbr3H/Gw:0czTug05Y+g05
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-10_76a10201bd7dfa86a84169febf508e36_avoslocker
Files
-
2024-05-10_76a10201bd7dfa86a84169febf508e36_avoslocker.exe windows:6 windows x86 arch:x86
9d2e870048535c02972cc7cee021a44e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCurrentProcess
WriteFile
Wow64DisableWow64FsRedirection
TerminateProcess
Module32Next
FindResourceA
CreateMutexA
WaitForSingleObject
Module32First
ReleaseMutex
GetModuleHandleA
OpenProcess
CreateToolhelp32Snapshot
Sleep
K32GetModuleFileNameExA
Wow64RevertWow64FsRedirection
GetLastError
GetFileAttributesA
MoveFileExA
WriteProcessMemory
GetSystemDirectoryA
LockResource
Process32Next
CloseHandle
GetWindowsDirectoryA
LoadResource
SetFileAttributesA
GetProcAddress
VirtualAllocEx
CreateRemoteThread
CreateProcessA
VirtualFreeEx
HeapSize
GetProcessHeap
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
Process32First
SizeofResource
CreateFileA
GetModuleFileNameA
GetCommandLineW
GetCommandLineA
LocalFree
FormatMessageA
CreateFileW
FindClose
FindFirstFileExW
FindNextFileW
SetEndOfFile
SetFilePointerEx
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
LCMapStringEx
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetModuleHandleW
GetStringTypeW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetCurrentProcessId
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwind
RaiseException
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
GetStdHandle
GetModuleFileNameW
ExitProcess
GetFileSizeEx
GetFileType
HeapAlloc
HeapFree
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
ReadFile
GetTimeZoneInformation
ReadConsoleW
HeapReAlloc
IsValidCodePage
GetACP
GetOEMCP
WriteConsoleW
user32
GetWindowLongA
GetWindowDisplayAffinity
FindWindowExA
GetWindowThreadProcessId
advapi32
LookupPrivilegeValueA
OpenProcessToken
AdjustTokenPrivileges
shlwapi
PathFileExistsA
Sections
.text Size: 184KB - Virtual size: 184KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ