c:\jenkins\workspace\Client\Client\Windows\release\Bin\Release\Zoom_launcher.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-24_0964216db3c37dfd56a6ee04dffe4e7f_avoslocker.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-24_0964216db3c37dfd56a6ee04dffe4e7f_avoslocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-24_0964216db3c37dfd56a6ee04dffe4e7f_avoslocker
-
Size
1.5MB
-
MD5
0964216db3c37dfd56a6ee04dffe4e7f
-
SHA1
2786390ec7b0dea5c366446802ad17da3cf5928b
-
SHA256
64d4683aaf45dbeba7886b17fe12df2585c95d2f348eeae2efbb438e165040e8
-
SHA512
8ec42ca5441a6a8d3877e057a1c2bf91befa07913f92dbc6e0f2ac805b24c1a8946eb7391414bb03d62a9475b1905f7c23a0d2e48444558ad9edecacfa6ae028
-
SSDEEP
12288:50zEQI1j/zBiVOcoesHJC+JXc3ajG+hjQKymY8efKCpD7Gj9G6G1qT8nQkCu83LW:evI1jjPsqjnhMgeiCl7G0nehbGZpbD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-24_0964216db3c37dfd56a6ee04dffe4e7f_avoslocker
Files
-
2024-05-24_0964216db3c37dfd56a6ee04dffe4e7f_avoslocker.exe windows:5 windows x86 arch:x86
5092e2334ddd76ceedce0e682c47932e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
HeapAlloc
GetProcAddress
VerSetConditionMask
GetProcessHeap
InitializeCriticalSectionEx
GetModuleHandleA
GetModuleFileNameA
OutputDebugStringA
ExpandEnvironmentStringsA
GetTempPathA
OutputDebugStringW
CreateDirectoryA
SetLastError
WriteFile
InitializeCriticalSectionAndSpinCount
SetFilePointer
SetEndOfFile
lstrlenA
lstrcatA
Sleep
DeleteFileA
lstrcpyA
RaiseException
GetLocalTime
DecodePointer
GetFileSize
DeleteCriticalSection
FindFirstFileA
FindClose
GetVersionExA
GetNativeSystemInfo
GetWindowsDirectoryA
WideCharToMultiByte
GetCurrentThreadId
GetTickCount
CreateMutexA
WaitForSingleObject
OpenMutexA
FlushFileBuffers
CreateFileW
GetStringTypeW
SetStdHandle
FreeEnvironmentStringsW
CloseHandle
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
ReadConsoleW
ReadFile
SetFilePointerEx
GetFileSizeEx
GetConsoleMode
GetConsoleCP
GetFileType
HeapReAlloc
HeapSize
LCMapStringW
LoadLibraryA
CreateFileA
GetFileAttributesA
GetLastError
MultiByteToWideChar
OpenProcess
LoadLibraryExA
HeapFree
WriteConsoleW
GetStdHandle
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
FreeLibraryAndExitThread
ResumeThread
ExitThread
CreateThread
VirtualQuery
VirtualProtect
VirtualAlloc
GetSystemInfo
LoadLibraryExW
FreeLibrary
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
EncodePointer
RtlUnwind
LeaveCriticalSection
EnterCriticalSection
InitializeSListHead
GetEnvironmentStringsW
VerifyVersionInfoA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
user32
SendMessageA
SetWindowTextA
SetForegroundWindow
DialogBoxParamW
GetDesktopWindow
GetWindowThreadProcessId
FindWindowA
IsIconic
KillTimer
PostMessageA
MessageBoxA
GetWindowRect
IsWindowVisible
SetWindowPos
MonitorFromWindow
SetActiveWindow
EndDialog
SetWindowTextW
ShowWindow
SetTimer
GetWindowLongA
AttachThreadInput
GetMonitorInfoA
GetForegroundWindow
SetFocus
BringWindowToTop
wsprintfW
LoadIconA
GetDlgItem
advapi32
AllocateAndInitializeSid
CheckTokenMembership
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
DuplicateTokenEx
OpenProcessToken
FreeSid
shell32
SHGetSpecialFolderPathA
ShellExecuteA
ole32
CoInitialize
CoUninitialize
CoCreateInstance
oleaut32
VariantInit
SysFreeString
SysAllocString
SysAllocStringLen
VariantClear
shlwapi
StrCmpNIA
PathIsRelativeA
wintrust
WTHelperGetProvSignerFromChain
WTHelperProvDataFromStateData
WTHelperGetProvCertFromChain
WinVerifyTrust
crypt32
CertGetNameStringA
Sections
.text Size: 116KB - Virtual size: 115KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 131KB - Virtual size: 131KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.2MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE