EasyAntiCheat_Setup.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-23_7e1f9c9f0b2f087b18bbbf1449872996_avoslocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-23_7e1f9c9f0b2f087b18bbbf1449872996_avoslocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-23_7e1f9c9f0b2f087b18bbbf1449872996_avoslocker
-
Size
1.6MB
-
MD5
7e1f9c9f0b2f087b18bbbf1449872996
-
SHA1
04e80d0e72338f4e6a619b0310a254a568c1679f
-
SHA256
ba20c05b0ec8a6c6417adb1a4c19c1030e85016fab91f1187af672f4e3b272cc
-
SHA512
c36143910aec7e0a97f8c3e19174935e55c20fbd16987e244992099950dfdc312083facb19b5245339ec46fc797534dfcd045226182ae8628340b31a0da691da
-
SSDEEP
49152:iIT4LzC2bPjAmCaiq+eKn36KcO8rDmg27RnWGj:ixLzVCa7+eK3sD527BWG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-23_7e1f9c9f0b2f087b18bbbf1449872996_avoslocker
Files
-
2024-05-23_7e1f9c9f0b2f087b18bbbf1449872996_avoslocker.exe windows:6 windows x86 arch:x86
e6167bd6125da649115259990e63d9dc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GlobalLock
GlobalUnlock
SetLastError
RemoveDirectoryW
GetTempPathW
MoveFileW
GetExitCodeProcess
HeapFree
HeapAlloc
GetProcessHeap
LoadResource
GlobalAlloc
LockResource
SizeofResource
K32EnumProcesses
SetFileAttributesW
OpenProcess
K32GetProcessImageFileNameW
WaitForMultipleObjects
TerminateProcess
WriteFile
IsWow64Process
GetLogicalDriveStringsW
QueryDosDeviceW
GetSystemDirectoryW
LocalAlloc
SetEndOfFile
WriteConsoleW
HeapSize
GetFileAttributesExW
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetTimeZoneInformation
FlushFileBuffers
SetStdHandle
GetCurrentDirectoryW
SetFilePointerEx
EnumSystemLocalesW
FileTimeToSystemTime
GetCurrentProcess
FormatMessageA
WideCharToMultiByte
LocalFree
MultiByteToWideChar
GetFullPathNameW
CreateThread
GetLastError
Sleep
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
ResetEvent
SetEvent
CreateEventW
WaitForSingleObject
GetLocaleInfoW
GetFileTime
GetModuleHandleW
DeleteFileW
GetFileInformationByHandle
GetFileAttributesW
FindClose
GetUserDefaultLCID
IsValidLocale
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
HeapReAlloc
GetConsoleOutputCP
ReadConsoleW
GetModuleFileNameW
ExpandEnvironmentStringsW
FindNextFileW
GetFileSizeEx
FindFirstFileW
ReadFile
CreateDirectoryW
GetSystemTimeAsFileTime
LoadLibraryW
MapViewOfFile
LoadLibraryA
CreateFileMappingW
CloseHandle
UnmapViewOfFile
CreateFileW
FreeLibrary
GetProcAddress
GlobalFree
FindResourceW
GetConsoleMode
GetStdHandle
ExitProcess
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
GetFileType
GetDriveTypeW
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SleepEx
InitializeCriticalSectionEx
ExpandEnvironmentStringsA
GetModuleHandleA
GetTickCount64
VerifyVersionInfoA
GetSystemDirectoryA
VerSetConditionMask
WaitForSingleObjectEx
CreateFileA
QueryPerformanceCounter
QueryPerformanceFrequency
EncodePointer
DecodePointer
LCMapStringEx
GetLocaleInfoEx
GetStringTypeW
CompareStringEx
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
RtlUnwind
RaiseException
InitializeCriticalSectionAndSpinCount
user32
SetForegroundWindow
ReleaseCapture
UpdateWindow
SystemParametersInfoW
PostQuitMessage
GetClientRect
ReleaseDC
LoadCursorW
LoadIconW
TranslateMessage
MoveWindow
GetMonitorInfoW
DispatchMessageW
ShowWindow
InvalidateRect
BeginPaint
EndPaint
SetCapture
CreateWindowExW
RegisterClassExW
PostMessageW
SetWindowPos
FillRect
SetWindowTextW
MapWindowPoints
IsWindowEnabled
SendMessageA
MapDialogRect
DrawTextW
GetClassInfoExW
EnableWindow
GetWindowTextW
GetMessageW
DefWindowProcW
GetWindowRect
DestroyWindow
GetDC
MessageBoxW
MonitorFromRect
SendMessageW
advapi32
RegDeleteKeyW
StartServiceW
DeleteService
OpenSCManagerW
CloseServiceHandle
CreateServiceW
GetTokenInformation
OpenProcessToken
ChangeServiceConfig2W
StartServiceCtrlDispatcherW
RegisterServiceCtrlHandlerW
SetServiceStatus
CryptAcquireContextA
CryptGenRandom
CryptCreateHash
CryptHashData
CryptDestroyHash
CryptGetHashParam
CryptReleaseContext
RegQueryValueExW
SetSecurityDescriptorDacl
GetSecurityDescriptorDacl
BuildExplicitAccessWithNameW
AllocateAndInitializeSid
SetEntriesInAclW
ConvertStringSidToSidW
SetServiceObjectSecurity
ControlService
FreeSid
CheckTokenMembership
InitializeSecurityDescriptor
OpenServiceW
LookupAccountSidW
QueryServiceObjectSecurity
RegCloseKey
RegOpenKeyExW
RegCreateKeyExW
RegSetValueExW
ConvertStringSecurityDescriptorToSecurityDescriptorW
shell32
SHFileOperationW
CommandLineToArgvW
ShellExecuteW
ShellExecuteExW
ole32
CoTaskMemFree
CoInitializeEx
CreateStreamOnHGlobal
gdi32
AddFontMemResourceEx
DeleteObject
RestoreDC
DeleteDC
GetDeviceCaps
CreateFontW
CreateCompatibleDC
SelectObject
CreateCompatibleBitmap
SaveDC
BitBlt
SetDCPenColor
RoundRect
SetDCBrushColor
SetBkMode
SetTextColor
GetTextExtentPoint32W
GetStockObject
RemoveFontMemResourceEx
gdiplus
GdiplusShutdown
GdipCreateLineBrushI
GdipDeleteBrush
GdipDrawImageRectI
GdipLoadImageFromStream
GdipFree
GdipDisposeImage
GdipAlloc
GdipCloneImage
GdipFillRectangleI
GdiplusStartup
GdipDeleteGraphics
GdipCreateFromHDC
crypt32
CertFreeCertificateContext
CryptStringToBinaryA
CertFindCertificateInStore
CertOpenStore
CertGetCertificateChain
CertFreeCertificateChainEngine
CertAddCertificateContextToStore
CryptQueryObject
CertFreeCertificateChain
CertGetNameStringA
CertCreateCertificateChainEngine
CertCloseStore
ws2_32
WSASetLastError
recv
send
setsockopt
htons
getsockopt
connect
ntohs
socket
getsockname
getpeername
WSAGetLastError
closesocket
WSAIoctl
bind
select
__WSAFDIsSet
ioctlsocket
freeaddrinfo
getaddrinfo
WSAStartup
WSACleanup
Sections
.text Size: 609KB - Virtual size: 609KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 133KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 324KB - Virtual size: 324KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 592KB - Virtual size: 596KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE