c:\jenkins\workspace\Client\Client\Windows\release\Bin\Release\NewInstaller.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-24_05dc5e06b20cdaddb0760762279aff59_avoslocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-24_05dc5e06b20cdaddb0760762279aff59_avoslocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-24_05dc5e06b20cdaddb0760762279aff59_avoslocker
-
Size
1.4MB
-
MD5
05dc5e06b20cdaddb0760762279aff59
-
SHA1
0656943e685e9ed3a05c9c3b0fbb44eba1371711
-
SHA256
d7fc12cf842b457151d80d751a0b5ea4f9041541d38b9aa89496e677be76795c
-
SHA512
97ea021a1714e10de02327aaa799e71245665282b3897bab52eb7395516418a4452a2aa09b5cae937da48533379217827df1ff364171db9ff99a9c599861293e
-
SSDEEP
24576:N6+YHL11oOerFLq4oA9v3fgOsqjnhMgeiCl7G0nehbGZpbD:NeL1FerFL9VgiDmg27RnWGj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-24_05dc5e06b20cdaddb0760762279aff59_avoslocker
Files
-
2024-05-24_05dc5e06b20cdaddb0760762279aff59_avoslocker.exe windows:5 windows x86 arch:x86
8e75f959414bcef8ea2416a5d7ba742e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
psapi
EnumProcesses
GetModuleFileNameExW
GetModuleBaseNameW
GetProcessImageFileNameW
EnumProcessModules
shlwapi
PathAppendW
PathFileExistsA
StrCmpNIW
PathIsRelativeW
PathAddBackslashW
PathCombineW
PathFileExistsW
PathIsNetworkPathW
PathUnquoteSpacesW
PathIsPrefixW
PathRemoveFileSpecW
PathRemoveBackslashW
kernel32
TlsFree
GetModuleFileNameW
IsBadStringPtrW
OpenProcess
IsBadReadPtr
FindFirstFileW
FindNextFileW
ExpandEnvironmentStringsW
DeviceIoControl
RemoveDirectoryW
GetTempPathW
CreateToolhelp32Snapshot
Process32NextW
Process32FirstW
LoadLibraryW
MoveFileExW
VerSetConditionMask
VerifyVersionInfoW
GetTempFileNameW
MoveFileW
LoadLibraryExW
CopyFileW
Sleep
OutputDebugStringW
CreateProcessW
SetDllDirectoryW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
LocalFree
CreateMutexW
OpenMutexW
TerminateProcess
QueryFullProcessImageNameW
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetConsoleMode
ReadConsoleW
GetConsoleCP
SetFilePointerEx
GetFileType
GetFullPathNameW
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
GetTickCount
GetStdHandle
GetStartupInfoW
InitializeCriticalSectionAndSpinCount
GetSystemTimeAsFileTime
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
GetFileSizeEx
SetStdHandle
SetEndOfFile
HeapReAlloc
GetDriveTypeW
ExitProcess
GetCPInfo
IsValidCodePage
GetACP
GetOEMCP
GetStringTypeW
WriteConsoleW
SetCurrentDirectoryW
GetCurrentDirectoryW
EncodePointer
HeapSize
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
QueryPerformanceCounter
InitializeSListHead
LCMapStringEx
RtlUnwind
GetModuleFileNameA
ExpandEnvironmentStringsA
GetTempPathA
GetFileAttributesA
GlobalAlloc
GlobalFree
QueryDosDeviceW
LoadLibraryExA
GetWindowsDirectoryW
GetProcessTimes
DosDateTimeToFileTime
TlsGetValue
FreeLibrary
LocalFileTimeToFileTime
SetFileTime
SetLastError
TlsSetValue
GetProcessHeap
HeapAlloc
CreateFileA
SetFilePointer
WriteFile
HeapFree
ReadFile
SetFileAttributesW
CreateDirectoryW
GetSystemDirectoryW
MapViewOfFile
CreateFileMappingW
GetFileSize
UnmapViewOfFile
CreateFileW
CreateDirectoryA
WideCharToMultiByte
GetWindowsDirectoryA
DeleteFileW
MultiByteToWideChar
TlsAlloc
GetModuleHandleA
GetVersionExW
FindClose
OutputDebugStringA
GetCurrentProcess
FindFirstFileA
lstrlenW
GetCurrentProcessId
GetLocalTime
GetCurrentThreadId
GetModuleHandleW
DeleteCriticalSection
GetProcAddress
DecodePointer
RaiseException
CloseHandle
GetFileAttributesW
WaitForSingleObject
InitializeCriticalSectionEx
GetLastError
FindFirstFileExW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
SetEnvironmentVariableW
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetTimeZoneInformation
GetSystemInfo
VirtualProtect
VirtualQuery
K32GetProcessImageFileNameW
user32
EndPaint
LoadBitmapW
ShowWindow
LoadCursorW
SetCursor
CopyRect
IntersectRect
GetSysColor
SetRect
ReleaseDC
GetWindowLongW
GetWindowThreadProcessId
EnumWindows
InflateRect
OffsetRect
wvsprintfW
SendMessageW
UnregisterClassW
InvalidateRect
BeginPaint
ReleaseCapture
GetClientRect
SetCapture
GetUpdateRect
GetDC
DrawEdge
DrawTextW
IsRectEmpty
CharNextW
LoadStringW
FillRect
TranslateMessage
DispatchMessageW
GetMessageW
FindWindowW
EnableMenuItem
PostQuitMessage
MessageBoxW
PostMessageW
GetMenuState
GetSystemMenu
GetParent
SystemParametersInfoW
LoadIconW
SetTimer
IsWindow
RegisterClassExW
CreateWindowExW
SetWindowPos
DestroyWindow
GetWindowRect
DefWindowProcW
SendMessageTimeoutW
PtInRect
gdi32
TextOutW
GetStockObject
BitBlt
GetTextExtentPoint32W
LineTo
CreatePen
Rectangle
GetObjectW
MoveToEx
CreateSolidBrush
CreateFontIndirectW
RoundRect
SelectObject
DeleteDC
GetClipBox
CreateRectRgnIndirect
SetTextColor
SetBkMode
ExtSelectClipRgn
CreateCompatibleBitmap
SaveDC
CreateCompatibleDC
RestoreDC
SetBkColor
ExtTextOutW
GetObjectType
GetTextMetricsW
SelectClipRgn
DeleteObject
advapi32
DuplicateTokenEx
RegUnLoadKeyW
RegLoadKeyW
ConvertSidToStringSidW
OpenProcessToken
GetTokenInformation
RegEnumValueW
CryptAcquireContextW
CryptCreateHash
CryptHashData
CryptDestroyHash
CryptGetHashParam
CryptReleaseContext
RegDeleteKeyW
AllocateAndInitializeSid
FreeSid
CheckTokenMembership
RegEnumKeyExW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegDeleteValueW
RegQueryValueExW
RegCreateKeyA
RegCloseKey
RegQueryValueExA
RegSetValueExA
RegOpenKeyExA
RegDeleteValueA
GetUserNameW
shell32
ShellExecuteExW
SHGetSpecialFolderPathA
SHGetSpecialFolderPathW
SHChangeNotify
SHFileOperationW
ShellExecuteW
SHGetFolderPathA
SHFileOperationA
ole32
CoInitializeEx
CoInitializeSecurity
CoSetProxyBlanket
CoCreateInstance
CoUninitialize
CoTaskMemAlloc
PropVariantClear
CoInitialize
oleaut32
SysAllocString
SysFreeString
VariantChangeType
VariantInit
VariantClear
Sections
.text Size: 461KB - Virtual size: 460KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 145KB - Virtual size: 145KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.didat Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 195KB - Virtual size: 194KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 592KB - Virtual size: 596KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE