c:\jenkins\workspace\Client\Client\Windows\release\Bin\Release\NewInstaller.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-24_9ab4c95b8484439aef72617c7acd29bc_avoslocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-24_9ab4c95b8484439aef72617c7acd29bc_avoslocker.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-24_9ab4c95b8484439aef72617c7acd29bc_avoslocker
-
Size
1.3MB
-
MD5
9ab4c95b8484439aef72617c7acd29bc
-
SHA1
8787a50f12472cf29e2502e058047b85d25ed2b0
-
SHA256
e1d6f7f56394416fd6e547a81b371b088f51eb0e099dd68c097ff53f7c96ae03
-
SHA512
3502906708318498074ce57ba76c0f14c80a2c7dd9a16df199dff2cdecec3b636ff2604788de98b5ef6964d248fc1faad59f55d96a3f21c7152798a9ac102475
-
SSDEEP
24576:UxmnVAIzlys+iSV4XsVmhYWvHBpsqjnhMgeiCl7G0nehbGZpbD:qlAyjiSVWsYueHBtDmg27RnWGj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-24_9ab4c95b8484439aef72617c7acd29bc_avoslocker
Files
-
2024-05-24_9ab4c95b8484439aef72617c7acd29bc_avoslocker.exe windows:5 windows x86 arch:x86
34bc43db459150ad7a5c2ac7dba3e730
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
psapi
EnumProcesses
GetModuleFileNameExW
GetModuleBaseNameW
GetProcessImageFileNameW
EnumProcessModules
shlwapi
StrCmpNIW
PathFileExistsW
PathFileExistsA
PathRemoveFileSpecW
PathAddBackslashW
PathRemoveBackslashW
PathIsNetworkPathW
PathUnquoteSpacesW
PathIsPrefixW
PathAppendW
PathIsRelativeW
wintrust
WTHelperGetProvSignerFromChain
WTHelperProvDataFromStateData
WTHelperGetProvCertFromChain
WinVerifyTrust
crypt32
CertGetNameStringW
kernel32
GetCurrentThreadId
GetLocalTime
lstrlenW
FindFirstFileA
FindClose
GetVersionExW
MultiByteToWideChar
DeleteFileW
GetWindowsDirectoryA
WideCharToMultiByte
CreateDirectoryW
SetFileAttributesW
ReadFile
WriteFile
SetFilePointer
CreateFileA
TlsSetValue
SetLastError
SetFileTime
LocalFileTimeToFileTime
FreeLibrary
TlsGetValue
DosDateTimeToFileTime
GetTickCount
TlsAlloc
TlsFree
GetModuleFileNameW
IsBadStringPtrW
IsBadReadPtr
FindFirstFileW
FindNextFileW
ExpandEnvironmentStringsW
DeviceIoControl
RemoveDirectoryW
GetTempPathW
MoveFileExW
GetTempFileNameW
MoveFileW
CopyFileW
Sleep
CreateProcessW
SetDllDirectoryW
EnterCriticalSection
DecodePointer
InitializeCriticalSection
LocalFree
CreateMutexW
OpenMutexW
TerminateProcess
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetConsoleMode
ReadConsoleW
GetConsoleCP
SetFilePointerEx
GetFileType
GetFullPathNameW
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
GetStdHandle
GetStartupInfoW
GetFileSizeEx
InitializeCriticalSectionAndSpinCount
GetSystemTimeAsFileTime
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
SetStdHandle
SetEndOfFile
HeapReAlloc
GetDriveTypeW
ExitProcess
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetStringTypeW
WriteConsoleW
GetCurrentDirectoryW
EncodePointer
HeapSize
SetEvent
ResetEvent
CreateEventW
QueryPerformanceCounter
InitializeSListHead
LCMapStringEx
RtlUnwind
RaiseException
WaitForSingleObject
CreateDirectoryA
OutputDebugStringW
GetFileAttributesA
GetTempPathA
ExpandEnvironmentStringsA
OutputDebugStringA
GetModuleFileNameA
GetModuleHandleA
DeleteCriticalSection
InitializeCriticalSectionEx
LoadLibraryExW
VerifyVersionInfoW
GetProcessHeap
VerSetConditionMask
HeapAlloc
LoadLibraryW
GetLastError
GetFileAttributesW
CreateFileW
HeapFree
GetProcessTimes
GetModuleHandleW
GetCurrentProcessId
GetProcAddress
GetWindowsDirectoryW
CloseHandle
Process32FirstW
Process32NextW
CreateToolhelp32Snapshot
OpenProcess
K32GetProcessImageFileNameW
GetCurrentProcess
QueryDosDeviceW
FindFirstFileExW
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
LeaveCriticalSection
WaitForSingleObjectEx
user32
BeginPaint
EndPaint
ShowWindow
LoadCursorW
SetCursor
CopyRect
IntersectRect
GetSysColor
SetRect
GetMenuState
GetWindowLongW
EnumWindows
InflateRect
InvalidateRect
OffsetRect
wvsprintfW
SendMessageW
UnregisterClassW
GetWindowThreadProcessId
FindWindowW
GetSystemMenu
GetParent
SendMessageTimeoutW
DefWindowProcW
LoadStringW
ReleaseCapture
GetWindowRect
DestroyWindow
ReleaseDC
GetClientRect
SetCapture
GetUpdateRect
GetDC
DrawEdge
DrawTextW
IsRectEmpty
CharNextW
FillRect
TranslateMessage
DispatchMessageW
GetMessageW
EnableMenuItem
PostQuitMessage
MessageBoxW
PostMessageW
SetWindowPos
CreateWindowExW
RegisterClassExW
IsWindow
SetTimer
LoadIconW
PtInRect
SystemParametersInfoW
gdi32
ExtSelectClipRgn
SelectObject
CreateFontIndirectW
CreateSolidBrush
MoveToEx
GetObjectW
SetTextColor
CreatePen
LineTo
GetTextExtentPoint32W
TextOutW
GetTextMetricsW
GetStockObject
CreateCompatibleBitmap
CreateRectRgnIndirect
Rectangle
SetBkMode
SaveDC
CreateCompatibleDC
RestoreDC
SetBkColor
ExtTextOutW
SelectClipRgn
GetClipBox
GetObjectType
DeleteObject
advapi32
RegQueryValueExW
RegCloseKey
RegQueryValueExA
RegSetValueExA
RegOpenKeyExA
RegDeleteValueA
AllocateAndInitializeSid
FreeSid
GetUserNameW
RegUnLoadKeyW
RegLoadKeyW
ConvertSidToStringSidW
GetTokenInformation
CryptAcquireContextW
CryptCreateHash
CryptHashData
CryptDestroyHash
CryptGetHashParam
CryptReleaseContext
RegDeleteKeyW
RegEnumKeyExW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegDeleteValueW
CheckTokenMembership
OpenProcessToken
DuplicateTokenEx
RegCreateKeyA
shell32
ShellExecuteExW
SHFileOperationA
SHGetFolderPathA
SHFileOperationW
SHGetSpecialFolderPathA
SHGetSpecialFolderPathW
ShellExecuteW
SHChangeNotify
ole32
CoUninitialize
CoInitialize
CoCreateInstance
PropVariantClear
CoTaskMemAlloc
CoSetProxyBlanket
CoInitializeSecurity
CoInitializeEx
oleaut32
SysAllocString
SysFreeString
VariantInit
VariantChangeType
VariantClear
Sections
.text Size: 424KB - Virtual size: 424KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 136KB - Virtual size: 136KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 133KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 588KB - Virtual size: 592KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE