mdmerge.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-13_23e37088be72b2a9546605fdc6cf43f1_avoslocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-13_23e37088be72b2a9546605fdc6cf43f1_avoslocker
-
Size
1.6MB
-
MD5
23e37088be72b2a9546605fdc6cf43f1
-
SHA1
1daf0228abefcaa86222ae302fc969fbb24772be
-
SHA256
17375c5030d8a2c0ecaa85b1740fee96625931045eaaaaddce8faeb153be5d6f
-
SHA512
878472e2af263337b0d1f963f68f8267b6d7b8c695702237b7da247adc07436dbbe223bf894e3d6e7372a710c50903170803cf57abb0492570c680198ff3a55c
-
SSDEEP
24576:4oLyj95+VmcPprGFig5jm6tapg+DCLgocaafzi:4ozVXdGFJxm6tZ+Dvaafz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-13_23e37088be72b2a9546605fdc6cf43f1_avoslocker
Files
-
2024-05-13_23e37088be72b2a9546605fdc6cf43f1_avoslocker.exe windows:10 windows x86 arch:x86
d35f09ffa2c37327caf4d3c5a751464c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCommandLineW
WaitForSingleObjectEx
ResetEvent
SetEvent
SetEndOfFile
GetCurrentProcess
ExitProcess
TerminateProcess
FreeLibrary
GetModuleHandleW
GetModuleHandleExW
GetProcAddress
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetLastError
SetLastError
GetCurrentThreadId
HeapFree
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
LoadLibraryExW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
HeapAlloc
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetProcessHeap
HeapSize
HeapReAlloc
GetStringTypeW
MultiByteToWideChar
WideCharToMultiByte
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
InitializeSListHead
RtlUnwind
RaiseException
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
EncodePointer
InitializeCriticalSectionEx
FormatMessageW
LocalFree
DebugBreak
SizeofResource
GetFileAttributesW
LockResource
FindResourceExW
LoadResource
CreateDirectoryW
FindFirstFileExW
GetFullPathNameW
FindNextFileW
FindClose
DeleteFileW
GetCurrentDirectoryW
GetLocaleInfoEx
RaiseFailFastException
GetTempPathW
MoveFileExW
CopyFileW
GetTempFileNameW
WriteConsoleW
CreateFileW
ReadConsoleW
ReadFile
SetFilePointerEx
GetFileSizeEx
CloseHandle
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
GetFileType
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
InitOnceExecuteOnce
DecodePointer
LCMapStringEx
GetStdHandle
WriteFile
GetModuleFileNameW
GetCommandLineA
GetEnvironmentStringsW
CreateEventW
ole32
CoUninitialize
CoInitializeEx
CoCreateInstance
oleaut32
VariantClear
SysFreeString
SysAllocString
shlwapi
PathFileExistsW
SHCreateStreamOnFileEx
SHCreateStreamOnFileW
api-ms-win-core-path-l1-1-0
PathCchRemoveFileSpec
PathCchCanonicalizeEx
midlrtmd
CreatePEFile
MetaDataGetDispenser
Sections
.text Size: 387KB - Virtual size: 386KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.2MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE