mdmerge.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-05_0c769b52f37320e0a07972879b768841_avoslocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-06-05_0c769b52f37320e0a07972879b768841_avoslocker
-
Size
1.7MB
-
MD5
0c769b52f37320e0a07972879b768841
-
SHA1
a83433d1089c0cf805258fbf704fe7f140e3e770
-
SHA256
327a873263536c90c853e41bfce945ce1086d1c923d18bb296f469000e2994eb
-
SHA512
acb9ffa3864d4dfcc4f9d99aa6faaaf6030ac7d2e9cde745345efeb7436683398e2abbce902bdecf296380bb81bf8fca978833618f09c8dbbb9469b5b0117196
-
SSDEEP
24576:OoLyj95+VocPprGFig7Hofe3y1sInB2COzRq8DvFqt:OozVZdGFJjP4suIRbDv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-05_0c769b52f37320e0a07972879b768841_avoslocker
Files
-
2024-06-05_0c769b52f37320e0a07972879b768841_avoslocker.exe windows:10 windows x86 arch:x86
d35f09ffa2c37327caf4d3c5a751464c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCommandLineW
WaitForSingleObjectEx
ResetEvent
SetEvent
SetEndOfFile
GetCurrentProcess
ExitProcess
TerminateProcess
FreeLibrary
GetModuleHandleW
GetModuleHandleExW
GetProcAddress
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetLastError
SetLastError
GetCurrentThreadId
HeapFree
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
LoadLibraryExW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
HeapAlloc
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetProcessHeap
HeapSize
HeapReAlloc
GetStringTypeW
MultiByteToWideChar
WideCharToMultiByte
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
InitializeSListHead
RtlUnwind
RaiseException
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
EncodePointer
InitializeCriticalSectionEx
FormatMessageW
LocalFree
DebugBreak
SizeofResource
GetFileAttributesW
LockResource
FindResourceExW
LoadResource
CreateDirectoryW
FindFirstFileExW
GetFullPathNameW
FindNextFileW
FindClose
DeleteFileW
GetCurrentDirectoryW
GetLocaleInfoEx
RaiseFailFastException
GetTempPathW
MoveFileExW
CopyFileW
GetTempFileNameW
WriteConsoleW
CreateFileW
ReadConsoleW
ReadFile
SetFilePointerEx
GetFileSizeEx
CloseHandle
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
GetFileType
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
InitOnceExecuteOnce
DecodePointer
LCMapStringEx
GetStdHandle
WriteFile
GetModuleFileNameW
GetCommandLineA
GetEnvironmentStringsW
CreateEventW
ole32
CoUninitialize
CoInitializeEx
CoCreateInstance
oleaut32
VariantClear
SysFreeString
SysAllocString
shlwapi
PathFileExistsW
SHCreateStreamOnFileEx
SHCreateStreamOnFileW
api-ms-win-core-path-l1-1-0
PathCchRemoveFileSpec
PathCchCanonicalizeEx
midlrtmd
CreatePEFile
MetaDataGetDispenser
Sections
.text Size: 387KB - Virtual size: 386KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE