c:\jenkins\workspace\Client\Client\Windows\release\Bin\Release\Zoom_launcher.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-24_3051362fd298779a35ce1f99ca4d0d45_avoslocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-24_3051362fd298779a35ce1f99ca4d0d45_avoslocker.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-24_3051362fd298779a35ce1f99ca4d0d45_avoslocker
-
Size
1.5MB
-
MD5
3051362fd298779a35ce1f99ca4d0d45
-
SHA1
4235028ce680e55485c216e23180a95a6b9a9b0c
-
SHA256
e12c845bcb871922225f054d23b9178facb5be6a3d0bb8e4991cc9816b0b9cb7
-
SHA512
87015675f1917de64853161e6e1ebf2703007304c58dacc24d0153463000053124771149e4c429ccdc92f3d86b48951f6198167968cb896944df3d67df1b4c57
-
SSDEEP
12288:uZWAWAxixNr60caRRiNTVXc3ajG+hjQKymY8efKCpD7Gj9G6G1qT8nQkCu83L3WN:uZGb4BVsqjnhMgeiCl7G0nehbGZpbD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-24_3051362fd298779a35ce1f99ca4d0d45_avoslocker
Files
-
2024-05-24_3051362fd298779a35ce1f99ca4d0d45_avoslocker.exe windows:5 windows x86 arch:x86
fab0f401c927f1de986424ebd22698d3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
Sleep
GetLastError
CreateFileA
FileTimeToSystemTime
DeleteFileA
lstrcpyA
CloseHandle
RaiseException
GetLocalTime
DecodePointer
GetProcAddress
GetFileSize
DeleteCriticalSection
CreateDirectoryA
FindFirstFileA
GetCurrentProcess
FindClose
GetVersionExA
GetNativeSystemInfo
GetWindowsDirectoryA
WideCharToMultiByte
GetCurrentThreadId
GetTickCount
CreateMutexA
WaitForSingleObject
OpenMutexA
GetModuleFileNameA
HeapFree
ExpandEnvironmentStringsA
CreateFileW
GetFileAttributesW
GetTempPathA
GetFileAttributesA
OutputDebugStringW
LoadLibraryW
HeapAlloc
GetCurrentDirectoryW
GetProcessHeap
FreeLibrary
LoadLibraryExW
OpenProcess
VerSetConditionMask
VerifyVersionInfoW
GetTimeZoneInformation
FlushFileBuffers
GetStringTypeW
SetStdHandle
MultiByteToWideChar
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
ReadConsoleW
ReadFile
LCMapStringW
CompareStringW
SetFilePointerEx
GetFileSizeEx
GetConsoleMode
GetConsoleCP
GetFileType
HeapReAlloc
HeapSize
GetStdHandle
GetModuleFileNameW
GetModuleHandleA
lstrcatA
lstrlenA
SetEndOfFile
SetFilePointer
InitializeCriticalSectionAndSpinCount
OutputDebugStringA
WriteFile
ExitProcess
SetCurrentDirectoryW
SetEnvironmentVariableW
SystemTimeToTzSpecificLocalTime
FindNextFileW
FindFirstFileExW
GetModuleHandleExW
FreeLibraryAndExitThread
ResumeThread
ExitThread
CreateThread
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
EncodePointer
RtlUnwind
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetModuleHandleW
GetStartupInfoW
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
SetLastError
IsDebuggerPresent
EnterCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
WriteConsoleW
user32
KillTimer
IsIconic
SetWindowTextA
DialogBoxParamW
SetForegroundWindow
FindWindowA
GetDesktopWindow
SendMessageA
GetDlgItem
FindWindowW
PostMessageA
MessageBoxA
GetWindowThreadProcessId
GetWindowRect
IsWindowVisible
SetWindowPos
MonitorFromWindow
SetActiveWindow
EndDialog
SetWindowTextW
ShowWindow
SetTimer
GetWindowLongA
AttachThreadInput
GetMonitorInfoA
GetForegroundWindow
SetFocus
BringWindowToTop
wsprintfW
LoadIconA
advapi32
CheckTokenMembership
RegQueryValueExA
RegCloseKey
AllocateAndInitializeSid
OpenProcessToken
FreeSid
DuplicateTokenEx
RegOpenKeyExA
shell32
SHGetSpecialFolderPathW
ShellExecuteW
SHGetSpecialFolderPathA
ole32
CoCreateInstance
CoInitialize
CoUninitialize
oleaut32
SysFreeString
VariantClear
SysAllocString
VariantInit
shlwapi
StrCmpNIW
PathIsRelativeW
wintrust
WTHelperGetProvSignerFromChain
WTHelperProvDataFromStateData
WTHelperGetProvCertFromChain
WinVerifyTrust
crypt32
CertGetNameStringW
Sections
.text Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 171KB - Virtual size: 171KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.2MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE