Static task
static1
Behavioral task
behavioral1
Sample
2024-06-03_0e8ef982b596932128ccad6cb388b818_avoslocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-06-03_0e8ef982b596932128ccad6cb388b818_avoslocker.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-06-03_0e8ef982b596932128ccad6cb388b818_avoslocker
-
Size
8.0MB
-
MD5
0e8ef982b596932128ccad6cb388b818
-
SHA1
b71e0613abdbc95314ac21915c4016ecced16c36
-
SHA256
b1970067a647a7ad4a67bf0eb0c89d290c4b16901bb87fd7d77a08febd6785b4
-
SHA512
587e9a3d1b5b95becd831a17fbda3ae23bbb4035bfc0d51e4f7bb577e03521223a97ea0556968aa6e3846b834a74e0af77ae69ec6cfe00603af10255bc3c698a
-
SSDEEP
196608:jwCfElx61KskpUhICdSEwsVcgpv9r0VybaKmY/eHetLlDiB7:jwCfElx6Ms/6OSEBqKd82/e+L
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-03_0e8ef982b596932128ccad6cb388b818_avoslocker
Files
-
2024-06-03_0e8ef982b596932128ccad6cb388b818_avoslocker.exe windows:6 windows x86 arch:x86
53ce4ca2e29161516aa4935ac26de392
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
dbghelp
SymInitialize
SymFromAddr
SymGetLineFromAddr64
shell32
CommandLineToArgvW
ShellExecuteA
ws2_32
gethostname
WSAStartup
WSACleanup
freeaddrinfo
getaddrinfo
accept
__WSAFDIsSet
ntohs
send
recv
WSAWaitForMultipleEvents
WSAResetEvent
WSAEventSelect
WSAEnumNetworkEvents
WSACreateEvent
WSACloseEvent
WSASetLastError
select
closesocket
WSARecvFrom
connect
WSARecv
WSAIoctl
socket
shutdown
listen
getsockname
getpeername
ioctlsocket
bind
WSASocketW
htons
WSAGetLastError
setsockopt
getsockopt
gethostbyname
advapi32
RegOpenKeyExW
RegQueryValueExW
CryptAcquireContextW
CryptReleaseContext
CryptGenRandom
RegCreateKeyExW
RegEnumKeyExW
RegSetValueExW
RegDeleteValueW
RegEnumValueW
RegEnumKeyW
CryptAcquireContextA
CryptGetHashParam
CryptCreateHash
CryptHashData
CryptDestroyHash
CryptEncrypt
CryptImportKey
CryptDestroyKey
SystemFunction036
RegCloseKey
crypt32
CertCloseStore
CertEnumCertificatesInStore
CertFreeCertificateContext
CertGetCertificateContextProperty
PFXImportCertStore
PFXIsPFXBlob
CertOpenStore
CertFindCertificateInStore
CryptStringToBinaryA
CryptDecodeObjectEx
CertAddCertificateContextToStore
CertFindExtension
CertGetNameStringA
CryptQueryObject
CertCreateCertificateChainEngine
CertFreeCertificateChainEngine
CertGetCertificateChain
CertFreeCertificateChain
kernel32
WaitForSingleObjectEx
DecodePointer
GetStringTypeW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
InitializeSListHead
CreateTimerQueue
SignalObjectAndWait
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
SetThreadAffinityMask
GetThreadTimes
FreeLibraryAndExitThread
GetLocaleInfoW
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
RtlUnwind
ExitProcess
SystemTimeToTzSpecificLocalTime
FindFirstFileExW
ExitThread
GetCommandLineA
HeapFree
HeapAlloc
GetDateFormatW
GetTimeFormatW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetTimeZoneInformation
HeapReAlloc
GetProcessHeap
HeapSize
VirtualProtect
CompareStringW
IsProcessorFeaturePresent
GetModuleHandleExW
RaiseException
lstrcmpiW
GetStdHandle
GetFileSizeEx
GetFileType
ReadFile
WriteFile
GetLastError
MultiByteToWideChar
WideCharToMultiByte
GetACP
GetConsoleCP
GetConsoleMode
ReadConsoleW
WriteConsoleW
FlushConsoleInputBuffer
SetErrorMode
GetConsoleScreenBufferInfo
Sleep
SetStdHandle
CreateFileW
GetFileAttributesW
GetFileSize
SetFileAttributesW
CloseHandle
DuplicateHandle
GetCurrentProcess
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleFileNameW
LocalFree
FormatMessageA
MoveFileExW
GetOEMCP
GetCPInfoExW
IsDBCSLeadByteEx
GetVersionExW
GetProcessAffinityMask
CreatePipe
IsWow64Process
GetFileAttributesExW
LockFileEx
UnlockFileEx
GetFileTime
SetFileTime
FormatMessageW
GetVolumeInformationA
GetSystemDirectoryA
GetWindowsDirectoryA
GetCommandLineW
GetFullPathNameW
ExpandEnvironmentStringsW
CompareFileTime
DeleteFileW
FindClose
FindFirstFileW
GetFileInformationByHandle
GetShortPathNameW
RemoveDirectoryW
SetLastError
DeviceIoControl
GetModuleHandleW
GetProcAddress
SetCurrentDirectoryW
GetCurrentDirectoryW
GetHandleInformation
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
ReleaseSemaphore
WaitForSingleObject
WaitForMultipleObjects
CreateSemaphoreW
TerminateProcess
GetExitCodeProcess
CreateThread
ResumeThread
CreateProcessW
OpenProcess
SetConsoleCtrlHandler
GenerateConsoleCtrlEvent
RtlCaptureStackBackTrace
QueryPerformanceCounter
QueryPerformanceFrequency
GlobalMemoryStatusEx
GetSystemInfo
FreeLibrary
LoadLibraryW
InitializeCriticalSectionAndSpinCount
SetConsoleTextAttribute
LoadLibraryExW
CreateDirectoryW
SetEndOfFile
SetFilePointer
LoadLibraryA
GetTempPathW
FindNextFileW
GetDiskFreeSpaceW
GetDriveTypeW
GetVolumePathNameW
GetOverlappedResult
CancelIo
ResetEvent
CreateEventW
VirtualAlloc
VirtualFree
IsValidCodePage
CreateFileA
GetFileAttributesA
PeekNamedPipe
SearchPathA
SetHandleInformation
CreateProcessA
CreateIoCompletionPort
GetQueuedCompletionStatus
PostQueuedCompletionStatus
FlushFileBuffers
ConnectNamedPipe
SetNamedPipeHandleState
CreateNamedPipeW
CancelIoEx
CancelSynchronousIo
DeleteCriticalSection
CreateEventA
SwitchToThread
GetCurrentThread
QueueUserWorkItem
CreateNamedPipeA
GetNamedPipeHandleStateA
RegisterWaitForSingleObject
UnregisterWait
GetFinalPathNameByHandleW
SetFilePointerEx
MapViewOfFile
FlushViewOfFile
UnmapViewOfFile
CreateFileMappingA
ReOpenFile
CopyFileW
CreateHardLinkW
GetFileInformationByHandleEx
CreateSymbolicLinkW
SetEvent
GetNumberOfConsoleInputEvents
ReadConsoleInputW
SetConsoleCursorPosition
WriteConsoleInputW
GetEnvironmentVariableW
UnregisterWaitEx
CreateJobObjectW
AssignProcessToJobObject
SetInformationJobObject
SetProcessAffinityMask
LCMapStringW
DebugBreak
TryEnterCriticalSection
InitializeConditionVariable
WakeConditionVariable
SleepConditionVariableCS
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CreateSemaphoreA
GetLongPathNameW
ReadDirectoryChangesW
VerSetConditionMask
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
VerifyVersionInfoA
FileTimeToSystemTime
CreateToolhelp32Snapshot
Process32First
Process32Next
GetModuleHandleA
GetStartupInfoW
SleepEx
GetTickCount
MoveFileExA
GetEnvironmentVariableA
EncodePointer
GetCurrentThreadId
user32
WaitForInputIdle
TranslateMessage
DispatchMessageA
CharPrevExA
GetMessageA
GetSystemMetrics
MapVirtualKeyW
ole32
CoCreateInstance
CoInitialize
GetRunningObjectTable
CoInitializeEx
CoUninitialize
CreateBindCtx
CoTaskMemFree
oleaut32
VariantClear
VariantInit
SysAllocString
SafeArrayDestroy
SysFreeString
Sections
.text Size: 6.7MB - Virtual size: 6.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1019KB - Virtual size: 1019KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 80KB - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 260KB - Virtual size: 259KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ