Static task
static1
Behavioral task
behavioral1
Sample
2024-05-22_53ffe0887689b34ff70b0aed60d00bdb_avoslocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-22_53ffe0887689b34ff70b0aed60d00bdb_avoslocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-05-22_53ffe0887689b34ff70b0aed60d00bdb_avoslocker
-
Size
8.4MB
-
MD5
53ffe0887689b34ff70b0aed60d00bdb
-
SHA1
5c7d376f5cfc23833a8df59030ad6bbb589fa37b
-
SHA256
3ace6e9ecce8137978033babfa031e2a14d1700b93b91ef624a3019ccd8961e1
-
SHA512
c38034fe243750e8c6c96e4b5b63a4c237deb9732f2560c818530b4d41790171f2777c800ac6609946473226682008a24bee2666c1b3133830acf8ad0b4253c9
-
SSDEEP
196608:O9pgQzlxXHlZ/7WgulY+UZ1MrNfnG1CRKDDcvK/U:O9Og1IfnG1MvKc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-22_53ffe0887689b34ff70b0aed60d00bdb_avoslocker
Files
-
2024-05-22_53ffe0887689b34ff70b0aed60d00bdb_avoslocker.exe windows:6 windows x86 arch:x86
c7ae6cb2e07ef36644f0f4d948a574f8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
dbghelp
SymInitialize
SymFromAddr
SymGetLineFromAddr64
advapi32
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
CryptAcquireContextW
CryptReleaseContext
CryptGenRandom
RegCreateKeyExW
RegEnumKeyExW
RegSetValueExW
RegDeleteValueW
RegEnumValueW
RegEnumKeyW
CryptAcquireContextA
CryptGetHashParam
CryptCreateHash
CryptHashData
CryptDestroyHash
CryptDestroyKey
CryptImportKey
CryptEncrypt
SystemFunction036
ws2_32
gethostname
gethostbyname
WSAStartup
WSACleanup
send
WSAEnumNetworkEvents
WSACreateEvent
freeaddrinfo
WSAEventSelect
shutdown
WSARecvFrom
WSARecv
WSASocketW
WSAResetEvent
getaddrinfo
ioctlsocket
listen
accept
select
__WSAFDIsSet
WSAIoctl
WSASetLastError
socket
setsockopt
ntohs
htons
getsockopt
getsockname
getpeername
connect
closesocket
bind
WSAGetLastError
recv
WSAWaitForMultipleEvents
WSACloseEvent
shell32
CommandLineToArgvW
ShellExecuteA
rpcrt4
UuidCreate
RpcStringFreeW
UuidToStringW
crypt32
CertFreeCertificateChain
CertGetCertificateChain
CertFreeCertificateChainEngine
CertCreateCertificateChainEngine
CryptQueryObject
CertGetNameStringA
CertFindExtension
CertAddCertificateContextToStore
CryptDecodeObjectEx
CryptStringToBinaryA
CertFindCertificateInStore
CertOpenStore
PFXIsPFXBlob
PFXImportCertStore
CertGetCertificateContextProperty
CertFreeCertificateContext
CertEnumCertificatesInStore
CertCloseStore
kernel32
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
SignalObjectAndWait
SetThreadAffinityMask
InitializeSListHead
IsDebuggerPresent
SetUnhandledExceptionFilter
GetThreadTimes
GetCPInfo
GetStringTypeW
GetLocaleInfoW
CompareStringW
CreateTimerQueue
DecodePointer
EncodePointer
InitializeCriticalSectionAndSpinCount
IsProcessorFeaturePresent
GetModuleHandleExW
RaiseException
GetCurrentThreadId
WaitForSingleObjectEx
FreeLibraryAndExitThread
VirtualProtect
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
RtlUnwind
ExitProcess
SystemTimeToTzSpecificLocalTime
ExitThread
GetCommandLineA
HeapFree
HeapAlloc
GetDateFormatW
GetTimeFormatW
IsValidLocale
GetUserDefaultLCID
UnhandledExceptionFilter
GetStdHandle
SetStdHandle
CreateFileW
GetFileAttributesW
GetFileSize
GetLongPathNameW
ReadFile
SetFileAttributesW
CloseHandle
DuplicateHandle
GetLastError
SetLastError
GetCurrentProcess
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleFileNameW
LocalFree
FormatMessageA
MoveFileExW
GetConsoleScreenBufferInfo
GetFileSizeEx
GetFileType
WriteFile
MultiByteToWideChar
WideCharToMultiByte
GetACP
GetConsoleCP
GetConsoleMode
ReadConsoleW
WriteConsoleW
FlushConsoleInputBuffer
GetVersionExW
GetFileTime
SetFileTime
GetOEMCP
GetCPInfoExW
IsDBCSLeadByteEx
IsWow64Process
LockFileEx
UnlockFileEx
FormatMessageW
GetFileAttributesExW
GetConsoleOutputCP
GetVolumeInformationA
GetSystemDirectoryA
GetWindowsDirectoryA
CreatePipe
GetCommandLineW
GetFullPathNameW
ExpandEnvironmentStringsW
CompareFileTime
DeleteFileW
FindClose
FindFirstFileW
GetTimeZoneInformation
GetShortPathNameW
RemoveDirectoryW
DeviceIoControl
Sleep
GetModuleHandleW
GetProcAddress
CreateSymbolicLinkW
SetCurrentDirectoryW
GetCurrentDirectoryW
GetHandleInformation
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
ReleaseSemaphore
WaitForSingleObject
WaitForMultipleObjects
CreateSemaphoreW
TerminateProcess
GetExitCodeProcess
CreateThread
ResumeThread
CreateProcessW
OpenProcess
SetConsoleCtrlHandler
GenerateConsoleCtrlEvent
SetConsoleTextAttribute
RtlCaptureStackBackTrace
QueryPerformanceCounter
QueryPerformanceFrequency
GlobalMemoryStatusEx
GetSystemInfo
FreeLibrary
LoadLibraryW
lstrcmpiW
LoadLibraryExW
CreateDirectoryW
SetEndOfFile
SetFilePointer
HeapReAlloc
GetTempPathW
FindNextFileW
GetDiskFreeSpaceW
GetDriveTypeW
GetVolumePathNameW
GetOverlappedResult
CancelIo
ResetEvent
CreateEventW
VirtualAlloc
VirtualFree
IsValidCodePage
CreateFileA
GetFileAttributesA
PeekNamedPipe
SearchPathA
SetHandleInformation
CreateProcessA
DeleteCriticalSection
InitializeConditionVariable
WakeConditionVariable
SleepConditionVariableCS
GetTickCount
SleepEx
GetModuleHandleA
MoveFileExA
GetEnvironmentVariableA
VerSetConditionMask
VerifyVersionInfoW
FlushFileBuffers
GetFinalPathNameByHandleW
SetFilePointerEx
MapViewOfFile
FlushViewOfFile
UnmapViewOfFile
CreateFileMappingA
ReOpenFile
CopyFileW
CreateHardLinkW
GetFileInformationByHandleEx
SetErrorMode
CreateIoCompletionPort
GetQueuedCompletionStatus
PostQueuedCompletionStatus
ConnectNamedPipe
SetNamedPipeHandleState
CreateNamedPipeW
CancelIoEx
CancelSynchronousIo
CreateEventA
SwitchToThread
GetCurrentThread
QueueUserWorkItem
CreateNamedPipeA
GetNamedPipeHandleStateA
RegisterWaitForSingleObject
UnregisterWait
DebugBreak
SetEvent
GetNumberOfConsoleInputEvents
ReadConsoleInputW
SetConsoleCursorPosition
WriteConsoleInputW
GetEnvironmentVariableW
UnregisterWaitEx
CreateJobObjectW
AssignProcessToJobObject
SetInformationJobObject
GetProcessAffinityMask
SetProcessAffinityMask
LCMapStringW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
FileTimeToSystemTime
CreateToolhelp32Snapshot
Process32First
Process32Next
TryEnterCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetNativeSystemInfo
CreateSemaphoreA
ReadDirectoryChangesW
GetStartupInfoW
GetProcessHeap
AreFileApisANSI
FindFirstFileExW
HeapSize
EnumSystemLocalesW
GetFileInformationByHandle
LoadLibraryA
user32
CharPrevExA
WaitForInputIdle
GetSystemMetrics
MapVirtualKeyW
DispatchMessageA
TranslateMessage
GetMessageA
ole32
CoCreateInstance
CoTaskMemFree
CoInitialize
CoInitializeEx
CoUninitialize
CreateBindCtx
GetRunningObjectTable
oleaut32
VariantClear
VariantInit
SysAllocString
SafeArrayDestroy
SysFreeString
Sections
.text Size: 7.0MB - Virtual size: 7.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 126KB - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 269KB - Virtual size: 268KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ