C:\Users\sunra\Desktop\maketool\task_590_312_oRrIUqZeASYVYMNA\output\3_3\filepacker.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-02_4c99bfc948484a3fec4778631525338e_avoslocker.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-06-02_4c99bfc948484a3fec4778631525338e_avoslocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-02_4c99bfc948484a3fec4778631525338e_avoslocker
-
Size
25.4MB
-
MD5
4c99bfc948484a3fec4778631525338e
-
SHA1
a6e0b89baa40ee3df9a2b0b84621eb088250ed51
-
SHA256
c1a12496bd0af2d96e560b900ca5e692d95be7a473e4ad71660a0b2a043499ad
-
SHA512
706c809e6a2372f01606ff4ecdeee1b2acaf326ad40fa05567b4d59713fe8114dfcd8720bef0b97f824ffea8cd5ceafdb6c7ac6734794891b400d814220092aa
-
SSDEEP
786432:s0kBi5Z+0kBi5Z/iUJSU8royeokkmjDGt67dFbYa6:sP4L+P4L/aYoZmj1v6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-02_4c99bfc948484a3fec4778631525338e_avoslocker
Files
-
2024-06-02_4c99bfc948484a3fec4778631525338e_avoslocker.exe windows:6 windows x86 arch:x86
c93fe33aac7ab4fa58b6eb907c8c8d9a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shlwapi
PathIsDirectoryW
PathFileExistsW
PathUnquoteSpacesW
kernel32
GetModuleHandleW
DecodePointer
CloseHandle
CreateFileW
DeleteFileW
WaitForSingleObject
GetModuleFileNameW
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
FreeResource
TerminateProcess
GetTempPathW
GetTickCount
WriteFile
GetPrivateProfileStringW
lstrcpynW
OpenFileMappingW
MapViewOfFile
OpenMutexW
ReleaseMutex
UnmapViewOfFile
OutputDebugStringW
MultiByteToWideChar
WideCharToMultiByte
GetSystemDirectoryW
FindFirstFileW
ReadFile
SetFilePointer
CreateDirectoryW
FindClose
FindNextFileW
RemoveDirectoryW
GetFileSizeEx
FindResourceW
GetDriveTypeW
GetDiskFreeSpaceExW
CreateMutexW
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetConsoleCP
FlushFileBuffers
SetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
ReadConsoleW
GetConsoleMode
SetFilePointerEx
SizeofResource
LockResource
LoadResource
DeleteCriticalSection
InitializeCriticalSectionEx
GetLastError
WriteConsoleW
RaiseException
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStdHandle
GetModuleHandleExW
ExitProcess
GetFileType
GetCommandLineW
GetCommandLineA
LoadLibraryExW
FreeLibrary
RtlUnwind
SetEndOfFile
GetLogicalDriveStringsW
GetStringTypeW
EncodePointer
EnterCriticalSection
LeaveCriticalSection
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetProcAddress
LCMapStringW
GetLocaleInfoW
GetCPInfo
IsDebuggerPresent
SetEvent
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
user32
GetMessageW
LoadStringW
DispatchMessageW
TranslateMessage
EndDialog
PostQuitMessage
EndPaint
BeginPaint
DefWindowProcW
DestroyWindow
DialogBoxParamW
RegisterClassExW
LoadCursorW
LoadIconW
TranslateAcceleratorW
LoadAcceleratorsW
advapi32
RegCreateKeyExW
RegCreateKeyW
RegSetValueExW
RegQueryValueExW
RegCloseKey
RegOpenKeyExW
shell32
ShellExecuteExW
Sections
.text Size: 268KB - Virtual size: 268KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 90KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 1024B - Virtual size: 836B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 92.2MB - Virtual size: 92.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ