H:\source\source.SAM\142889\Release_wdexe_9\WX\Desktop_x86_32_VS2019\Release\WDExe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-30_bd3f45763e0831b18adb04cc8555601e_avoslocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-30_bd3f45763e0831b18adb04cc8555601e_avoslocker.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-30_bd3f45763e0831b18adb04cc8555601e_avoslocker
-
Size
1.7MB
-
MD5
bd3f45763e0831b18adb04cc8555601e
-
SHA1
ec82b60884605b2e889b5e6838a21c5a0bc279d2
-
SHA256
d5f40de5b6aae30bc1c61a056e12b251c52cde8a967ca11c9bd5813fcd2dbebd
-
SHA512
320d02876f0286e2d1c376d0316f266d1c441ad2b15e73e6293c4a675d23b18776257758b802236c92c782594eab0d29bf7fe88a512bc85835b960ad78ce6836
-
SSDEEP
49152:xoIU/X1sniR8qQ7bYPnya3nhwJVIB4jv:xoIU/FtQ7kPnHnM6B
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-30_bd3f45763e0831b18adb04cc8555601e_avoslocker
Files
-
2024-05-30_bd3f45763e0831b18adb04cc8555601e_avoslocker.exe windows:5 windows x86 arch:x86
d0f09e6c76eee3e10435ab6ac6f52856
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
FormatMessageW
LocalFree
WideCharToMultiByte
GetLastError
LoadLibraryW
GetTickCount
Sleep
GetModuleFileNameW
MultiByteToWideChar
FindResourceW
LoadResource
LockResource
FreeResource
GetProfileStringW
GetExitCodeProcess
CloseHandle
GetProcAddress
FreeLibrary
GetSystemDefaultLangID
CreateEventW
GetPrivateProfileIntW
GetPrivateProfileStringW
GetCurrentProcessId
GetCommandLineW
GetMailslotInfo
ReadFile
GetComputerNameW
GetLocalTime
ExpandEnvironmentStringsW
CreateMailslotW
WritePrivateProfileStringW
GetModuleHandleW
FileTimeToSystemTime
SizeofResource
GetFileInformationByHandle
GetLogicalDriveStringsW
GetVolumeInformationW
WriteFile
SetFilePointer
LockFile
LockFileEx
UnlockFile
UnlockFileEx
FlushFileBuffers
SetEndOfFile
SetFileValidData
SetErrorMode
SetLastError
SystemTimeToFileTime
CreateFileW
DeleteFileW
MoveFileW
CopyFileW
GetFileAttributesW
CreateDirectoryW
FindFirstFileW
FindClose
SetFileAttributesW
FindFirstFileExW
FindNextFileW
GetTempPathW
GetCurrentDirectoryW
GetTempFileNameW
GetFullPathNameW
GetDriveTypeW
HeapAlloc
GetProcessHeap
HeapFree
CompareStringW
GetTimeZoneInformation
IsBadReadPtr
CreateSemaphoreW
WaitForSingleObject
ReleaseSemaphore
CreateFileMappingW
OpenFileMappingW
MapViewOfFile
UnmapViewOfFile
VirtualQuery
CreateMutexW
GetVersionExW
GetCurrentProcess
CreateProcessW
TlsSetValue
TlsGetValue
VirtualProtect
TlsAlloc
TlsFree
GetCurrentThreadId
MulDiv
ResumeThread
TerminateThread
CreateThread
GetVersionExA
GetStartupInfoW
SetEvent
ReleaseMutex
ExitProcess
RaiseException
GetSystemInfo
LoadLibraryExA
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
TerminateProcess
RtlUnwind
EncodePointer
InitializeCriticalSectionAndSpinCount
LoadLibraryExW
GetFileType
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
GetModuleHandleExW
GetStdHandle
LCMapStringW
HeapReAlloc
SetStdHandle
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetStringTypeW
GetFileSizeEx
SetFilePointerEx
GetConsoleOutputCP
GetConsoleMode
DecodePointer
HeapSize
WriteConsoleW
Exports
Exports
CommandeComposante
DeclareProxy
Execution
LibereMutex
SetRestartPourAppliDeclencheMAJ
Sections
.text Size: 194KB - Virtual size: 194KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 82KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ