Static task
static1
Behavioral task
behavioral1
Sample
2024-05-23_8f8e90f20c73fb46beff2c1b4e7f074e_avoslocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-23_8f8e90f20c73fb46beff2c1b4e7f074e_avoslocker.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-23_8f8e90f20c73fb46beff2c1b4e7f074e_avoslocker
-
Size
1.4MB
-
MD5
8f8e90f20c73fb46beff2c1b4e7f074e
-
SHA1
3ff1722e678d7c0a742f8eabf9d101cef3ed51d7
-
SHA256
a5f1568e69ac4e53081013edf8b57078aa9358a5b9c9e356f72391713a97eed8
-
SHA512
c7c87f1845c3b30478697c16464dd0da8a73091959fac8cc99d9f6ac6991794d8db5063d2091cdd30e2f8953fab0fded63040da5d00e0198e8957e7ecd468acf
-
SSDEEP
24576:rgmi4GIGudnAefovpD9HPdNuDFHUUbGLb3cAPau8kWG:GefoRDFl8qLg1u84
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 2024-05-23_8f8e90f20c73fb46beff2c1b4e7f074e_avoslocker
Files
-
2024-05-23_8f8e90f20c73fb46beff2c1b4e7f074e_avoslocker.exe windows:6 windows x86 arch:x86
5954fb791587a410294f19bf42130380
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MultiByteToWideChar
WideCharToMultiByte
GetCurrentProcessId
SetEvent
ResetEvent
CreateEventA
Sleep
FindClose
FindFirstFileA
FindNextFileA
GetSystemWindowsDirectoryA
GetTickCount
GetProcessTimes
GetCurrentProcess
VirtualAlloc
VirtualFree
GetDriveTypeA
GetVolumeInformationA
SetLastError
FindFirstFileW
FindNextFileW
GetSystemTimeAsFileTime
CreateFileA
DeviceIoControl
ReadFile
WriteFile
SetNamedPipeHandleState
SleepEx
WaitNamedPipeA
DefineDosDeviceA
QueryDosDeviceA
LoadLibraryExA
DuplicateHandle
RaiseException
ReleaseSemaphore
WaitForMultipleObjects
GetCurrentThread
GetCurrentThreadId
SetThreadPriority
GetThreadPriority
SuspendThread
ResumeThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetThreadContext
SetThreadContext
OpenProcess
GetSystemDirectoryA
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
CreateSemaphoreA
RtlUnwind
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
ExitProcess
TerminateProcess
GetModuleHandleW
GetModuleHandleExW
GetEnvironmentVariableW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
CreateFileW
GetDriveTypeW
GetFileInformationByHandle
GetFileType
PeekNamedPipe
DeleteFileW
GetFileAttributesExW
MoveFileExW
CreateThread
ExitThread
FreeLibraryAndExitThread
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapAlloc
HeapFree
InitializeCriticalSectionAndSpinCount
LoadLibraryExW
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetStdHandle
GetStartupInfoW
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
HeapReAlloc
SetCurrentDirectoryW
GetCurrentDirectoryW
GetFullPathNameW
SetStdHandle
SetFilePointerEx
SetEndOfFile
ReadConsoleW
SetEnvironmentVariableW
SetConsoleCtrlHandler
GetProcessHeap
GetCPInfo
IsValidCodePage
GetACP
GetOEMCP
GetFileSizeEx
GetStringTypeW
GetModuleFileNameW
GetEnvironmentStringsW
FreeEnvironmentStringsW
HeapSize
WriteConsoleW
OutputDebugStringW
EncodePointer
DecodePointer
InterlockedFlushSList
InterlockedPushEntrySList
InitializeSListHead
QueryPerformanceCounter
GetEnvironmentVariableA
GetCommandLineW
FreeLibrary
CreateMutexA
WaitForSingleObject
ReleaseMutex
GetLastError
CloseHandle
GetModuleHandleA
GetTimeZoneInformation
GetLocalTime
lstrlenA
GetVersionExA
FreeEnvironmentStringsA
GetEnvironmentStrings
GetWindowsDirectoryA
FormatMessageA
LoadLibraryA
GetProcAddress
GetVersion
SetErrorMode
FindFirstFileExW
SetHandleInformation
GetCommandLineA
user32
SetWindowTextA
GetDlgItemTextA
GetWindowRect
MessageBeep
ScreenToClient
EnableWindow
GetFocus
GetDlgItemTextW
SetDlgItemTextA
GetDlgItem
EndDialog
MoveWindow
ShowWindow
SetFocus
GetWindowLongA
SendMessageA
MessageBoxA
GetClientRect
DialogBoxIndirectParamA
wsprintfA
GetActiveWindow
GetParent
GetSystemMetrics
CreateDialogIndirectParamA
netapi32
Netbios
comdlg32
GetOpenFileNameA
comctl32
ord17
wsock32
inet_addr
ioctlsocket
WSACleanup
WSAStartup
getsockname
getpeername
gethostname
htonl
WSAGetLastError
socket
setsockopt
send
select
recv
inet_ntoa
connect
closesocket
__WSAFDIsSet
getsockopt
shell32
ord680
oleaut32
VariantClear
VariantInit
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayDestroy
SysFreeString
SysAllocStringLen
SysAllocString
ole32
CoSetProxyBlanket
CoCreateInstance
CoInitializeEx
CoInitializeSecurity
CoUninitialize
ws2_32
inet_ntop
getaddrinfo
getnameinfo
freeaddrinfo
advapi32
RegQueryValueExW
RegQueryInfoKeyA
StartServiceA
RegCloseKey
RegDeleteValueA
RegEnumValueA
RegOpenKeyExA
RegCreateKeyExA
GetUserNameA
GetUserNameW
RegQueryValueExA
OpenServiceA
RegSetValueExA
RegSetValueExW
RegEnumKeyExA
CloseServiceHandle
OpenSCManagerA
QueryServiceStatus
shlwapi
PathRemoveBackslashW
userenv
GetProfilesDirectoryA
Sections
.text Size: 558KB - Virtual size: 557KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.textidx Size: 675KB - Virtual size: 675KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 118KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ