D:\jenkins\CI\CCHyperdrive\build\x64\main\ccd-hyperdrive\build\msvs_win32\Release\x86\sym\HDHelper\HDHelper\HDHelper.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-24_d97a4d0e3e6ce237bd0fb3cc4ee90c5c_avoslocker.exe
Resource
win7-20240221-en
General
-
Target
2024-05-24_d97a4d0e3e6ce237bd0fb3cc4ee90c5c_avoslocker
-
Size
1.8MB
-
MD5
d97a4d0e3e6ce237bd0fb3cc4ee90c5c
-
SHA1
549aa2a16e72a8b8ebd05c58b38cd57bdbf0b713
-
SHA256
95fbc8b14514dc1aca56fe62a07911225713790939728a09a25b692b04e8f01a
-
SHA512
239eda341bf5f6ccdbcdb3f4b8220be52fb93aa424491e406034038ef50b69e1aa7a0aacdd6c4dd33e2cd0f2cd764529cafd95405e92304036a6fb6804e1bf70
-
SSDEEP
24576:xVuSRNf1/KifqFfIDTt/3KuUm4rYGYmB1b/EQLnCd2bn:2SbRKiyFwDTt/3Kxm4CmXb/EQGd2T
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-24_d97a4d0e3e6ce237bd0fb3cc4ee90c5c_avoslocker
Files
-
2024-05-24_d97a4d0e3e6ce237bd0fb3cc4ee90c5c_avoslocker.exe windows:5 windows x86 arch:x86
4d6a06993c1a980ca38d0d6760d038d4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
lstrcmpW
GetCurrentProcess
WaitForSingleObject
GetModuleHandleW
GetExitCodeProcess
GetVersionExW
Sleep
GetUserDefaultLCID
LCMapStringW
FreeLibrary
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
MoveFileExW
CloseHandle
DeleteFileW
FormatMessageW
SetFileAttributesW
GetFileAttributesW
CreateFileW
FindClose
GetTempPathW
GetModuleFileNameW
FindNextFileW
SetLastError
FindFirstFileW
lstrcmpiW
TlsAlloc
ReadFile
GetProcessHeap
DeleteCriticalSection
LocalFree
GetProcAddress
DecodePointer
HeapAlloc
LoadLibraryW
RaiseException
GetLastError
SwitchToThread
InitializeCriticalSectionAndSpinCount
GetStringTypeW
GetUserDefaultUILanguage
OpenMutexW
ReleaseMutex
LocalAlloc
InitializeCriticalSectionEx
HeapFree
WriteConsoleW
SetEndOfFile
GetConsoleCP
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
SetFilePointerEx
ReadConsoleW
GetConsoleMode
SetStdHandle
EnumSystemLocalesW
IsValidLocale
GetCommandLineW
GetCommandLineA
GetModuleHandleExW
ExitProcess
GetStdHandle
GetTimeZoneInformation
GetFileType
LoadLibraryExW
RtlUnwind
GetStartupInfoW
InitializeSListHead
QueryPerformanceCounter
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WaitForSingleObjectEx
OutputDebugStringW
CreateMutexW
IsDebuggerPresent
GetCPInfo
GetLocaleInfoW
CompareStringW
WriteFile
FlushFileBuffers
MultiByteToWideChar
WideCharToMultiByte
CreateEventW
VerSetConditionMask
VerifyVersionInfoW
TerminateProcess
OpenProcess
HeapSize
CreateToolhelp32Snapshot
Process32NextW
SetEvent
Process32FirstW
HeapReAlloc
ResetEvent
GetCurrentProcessId
lstrcpyW
SetFilePointer
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
GetUserDefaultLangID
GetFileSizeEx
FileTimeToSystemTime
GetLocalTime
GetTimeFormatW
SystemTimeToFileTime
GetDateFormatW
EncodePointer
user32
AllowSetForegroundWindow
advapi32
DuplicateTokenEx
GetUserNameW
ConvertSidToStringSidW
CreateProcessAsUserW
ConvertStringSidToSidW
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
GetTokenInformation
SetSecurityDescriptorDacl
GetSecurityDescriptorDacl
RegGetKeySecurity
RegCloseKey
SetEntriesInAclW
CreateWellKnownSid
RegCreateKeyExW
RegSetKeySecurity
RegSetValueExW
InitializeSecurityDescriptor
RegOpenKeyExW
RegDeleteValueW
RegQueryValueExW
LookupAccountSidW
shell32
SHGetSpecialFolderPathW
SHCreateDirectoryExW
ole32
CLSIDFromProgID
OleRun
CoUninitialize
CoCreateInstance
CoInitialize
CLSIDFromString
oleaut32
SysFreeString
SysAllocString
VariantInit
VariantCopy
GetErrorInfo
VariantClear
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
shlwapi
PathStripPathW
PathRenameExtensionW
PathFileExistsW
PathFindFileNameW
PathRemoveFileSpecW
PathAddExtensionW
PathAppendW
PathIsDirectoryW
PathRemoveExtensionW
PathIsFileSpecW
Sections
.text Size: 323KB - Virtual size: 323KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 111KB - Virtual size: 111KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE