H:\source\source.SAM\202788\Release_wdexe_9\WX\Desktop_x86_32_VS2019\Release\WDExe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-29_cbbdb369f0ec535e3b3c9c917468fa79_avoslocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-29_cbbdb369f0ec535e3b3c9c917468fa79_avoslocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-29_cbbdb369f0ec535e3b3c9c917468fa79_avoslocker
-
Size
24.8MB
-
MD5
cbbdb369f0ec535e3b3c9c917468fa79
-
SHA1
68e9010aecabe9f396c9ee3ea14f0788467e052e
-
SHA256
1e7fed07996ee64d524e2fbb320c84a79e899808afca1adef8b1eb62b3332d52
-
SHA512
0b7596ba20e9b046a31b49467bf1a4c6d885abb6c1affc3d95f0a8b4eaaed3474ac6476b023cc6a440e5afa59a99ee80731f6246570013e8a3544118b3042d6e
-
SSDEEP
393216:3FHLnTeQBnYjw8dzUs0gOwfl89ryG1i0VAos3V1sdVWxudPfxQeqg:1HLnNBQxUs0ofl89CoE8PQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-29_cbbdb369f0ec535e3b3c9c917468fa79_avoslocker
Files
-
2024-05-29_cbbdb369f0ec535e3b3c9c917468fa79_avoslocker.exe windows:5 windows x86 arch:x86
d0f09e6c76eee3e10435ab6ac6f52856
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
FormatMessageW
LocalFree
WideCharToMultiByte
GetLastError
LoadLibraryW
GetTickCount
Sleep
GetModuleFileNameW
MultiByteToWideChar
FindResourceW
LoadResource
LockResource
FreeResource
GetProfileStringW
GetExitCodeProcess
CloseHandle
GetProcAddress
FreeLibrary
GetSystemDefaultLangID
CreateEventW
GetPrivateProfileIntW
GetPrivateProfileStringW
GetCurrentProcessId
GetCommandLineW
GetMailslotInfo
ReadFile
GetComputerNameW
GetLocalTime
ExpandEnvironmentStringsW
CreateMailslotW
WritePrivateProfileStringW
GetModuleHandleW
FileTimeToSystemTime
SizeofResource
GetFileInformationByHandle
GetLogicalDriveStringsW
GetVolumeInformationW
WriteFile
SetFilePointer
LockFile
LockFileEx
UnlockFile
UnlockFileEx
FlushFileBuffers
SetEndOfFile
SetFileValidData
SetErrorMode
SetLastError
SystemTimeToFileTime
CreateFileW
DeleteFileW
MoveFileW
CopyFileW
GetFileAttributesW
CreateDirectoryW
FindFirstFileW
FindClose
SetFileAttributesW
FindFirstFileExW
FindNextFileW
GetTempPathW
GetCurrentDirectoryW
GetTempFileNameW
GetFullPathNameW
GetDriveTypeW
HeapAlloc
GetProcessHeap
HeapFree
CompareStringW
GetTimeZoneInformation
IsBadReadPtr
CreateSemaphoreW
WaitForSingleObject
ReleaseSemaphore
CreateFileMappingW
OpenFileMappingW
MapViewOfFile
UnmapViewOfFile
VirtualQuery
CreateMutexW
GetVersionExW
GetCurrentProcess
CreateProcessW
TlsSetValue
TlsGetValue
VirtualProtect
TlsAlloc
TlsFree
GetCurrentThreadId
MulDiv
ResumeThread
TerminateThread
CreateThread
GetVersionExA
GetStartupInfoW
SetEvent
ReleaseMutex
ExitProcess
RaiseException
GetSystemInfo
LoadLibraryExA
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
TerminateProcess
RtlUnwind
EncodePointer
InitializeCriticalSectionAndSpinCount
LoadLibraryExW
GetFileType
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
GetModuleHandleExW
GetStdHandle
LCMapStringW
HeapReAlloc
SetStdHandle
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetStringTypeW
GetFileSizeEx
SetFilePointerEx
GetConsoleOutputCP
GetConsoleMode
DecodePointer
HeapSize
WriteConsoleW
Exports
Exports
CommandeComposante
DeclareProxy
Execution
LibereMutex
SetRestartPourAppliDeclencheMAJ
Sections
.text Size: 196KB - Virtual size: 195KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24.5MB - Virtual size: 24.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ