Behavioral task
behavioral1
Sample
2024-06-08_30bc02f5366cbf35f130be23a1e5ce30_avoslocker_qakbot.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-06-08_30bc02f5366cbf35f130be23a1e5ce30_avoslocker_qakbot.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-08_30bc02f5366cbf35f130be23a1e5ce30_avoslocker_qakbot
-
Size
1.3MB
-
MD5
30bc02f5366cbf35f130be23a1e5ce30
-
SHA1
387c9a1398074d383c804eabab8c49c7dd26b543
-
SHA256
ab4e4f450aaada8daf95e2a6a7ba04b7033623decb8f61f86f527fc24d3d7f1e
-
SHA512
4ae94476cd7c88676cf2df3a54ac66a34ca68efb5048b1ae29e4fceffcf8a5bc3f8a5c8571156f4ee567e71b3c3112ddbf7f3e446db8ef96f8ecd44ac84dda07
-
SSDEEP
24576:RPIDPZc0w1mspS5Xa4vfyjO3OApKHzMcf7fQCLRkgEx/:RPIrOXpSxNvfyS3OpHzMWQCLG/
Malware Config
Signatures
-
Privateloader family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-08_30bc02f5366cbf35f130be23a1e5ce30_avoslocker_qakbot
Files
-
2024-06-08_30bc02f5366cbf35f130be23a1e5ce30_avoslocker_qakbot.exe windows:6 windows x86 arch:x86
5ae512fb660b1dc96d6f8693b72a43d5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateDirectoryW
GetModuleFileNameA
FindFirstFileW
FindNextFileW
RemoveDirectoryW
FindClose
GetFileAttributesW
DeleteFileW
MoveFileExW
GlobalMemoryStatusEx
CreateDirectoryExW
ReadFile
WriteFile
PeekNamedPipe
GetCurrentProcessId
WaitNamedPipeW
lstrlenW
GetModuleFileNameW
GetCommandLineW
Sleep
SetUnhandledExceptionFilter
GetFullPathNameW
GetFileInformationByHandle
GetCurrentDirectoryW
GetModuleHandleW
CopyFileW
Process32First
CreateToolhelp32Snapshot
Process32Next
GetNativeSystemInfo
CreateProcessA
SleepConditionVariableCS
EnterCriticalSection
WakeConditionVariable
LeaveCriticalSection
InitializeCriticalSection
InitializeConditionVariable
CreateThread
DeleteCriticalSection
lstrcmpiA
FormatMessageA
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
HeapFree
HeapAlloc
ReadConsoleW
LocalFree
SetFilePointerEx
GetStdHandle
SystemTimeToFileTime
TzSpecificLocalTimeToSystemTime
SetFileTime
GetFileType
SetEndOfFile
FreeLibraryAndExitThread
ExitThread
WideCharToMultiByte
ExitProcess
LoadLibraryExW
FreeLibrary
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SetLastError
RtlUnwind
GetCPInfo
GetStringTypeW
LCMapStringEx
CloseHandle
GetFileAttributesExW
GetLastError
FormatMessageW
GlobalLock
GlobalFree
GlobalAlloc
MultiByteToWideChar
QueryPerformanceCounter
VerifyVersionInfoW
WriteConsoleW
HeapSize
GetProcessHeap
SetEnvironmentVariableW
CreateFileW
DeviceIoControl
GetConsoleMode
GlobalUnlock
GetLocaleInfoW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
SetStdHandle
GetTimeZoneInformation
HeapReAlloc
GetFileSizeEx
GetConsoleOutputCP
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
VerSetConditionMask
GetProcAddress
QueryPerformanceFrequency
GetModuleHandleExW
InitOnceExecuteOnce
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
InitializeCriticalSectionEx
TryEnterCriticalSection
WakeAllConditionVariable
SleepConditionVariableSRW
RaiseException
GetExitCodeThread
EncodePointer
DecodePointer
user32
GetClientRect
SetCursor
SetCapture
SetCursorPos
IsChild
ClientToScreen
GetCapture
ScreenToClient
ReleaseCapture
GetCursorPos
GetForegroundWindow
GetWindowThreadProcessId
GetClassNameA
FindWindowExA
GetWindowTextA
SetForegroundWindow
DispatchMessageA
DestroyWindow
GetSystemMetrics
ShowWindow
DefWindowProcA
CreateWindowExA
SetLayeredWindowAttributes
TranslateMessage
PeekMessageA
UnregisterClassA
PostQuitMessage
RegisterClassExA
GetWindowRect
SetWindowPos
OpenClipboard
CloseClipboard
EmptyClipboard
GetClipboardData
SetClipboardData
GetKeyState
LoadCursorA
advapi32
RegCloseKey
RegSetValueExW
RegCreateKeyExW
shell32
CommandLineToArgvW
ShellExecuteA
SHGetSpecialFolderPathA
dwmapi
DwmExtendFrameIntoClientArea
imm32
ImmSetCompositionWindow
ImmReleaseContext
ImmGetContext
winhttp
WinHttpQueryDataAvailable
WinHttpConnect
WinHttpSetTimeouts
WinHttpSendRequest
WinHttpWriteData
WinHttpGetProxyForUrl
WinHttpGetIEProxyConfigForCurrentUser
WinHttpCloseHandle
WinHttpSetOption
WinHttpOpenRequest
WinHttpReadData
WinHttpQueryHeaders
WinHttpAddRequestHeaders
WinHttpOpen
WinHttpReceiveResponse
WinHttpCrackUrl
d3d11
D3D11CreateDeviceAndSwapChain
ws2_32
accept
bind
closesocket
listen
WSAStartup
send
socket
ntohs
recv
htonl
htons
getnameinfo
WSAGetLastError
setsockopt
crypt32
CertFreeCertificateContext
CertCloseStore
CertFindCertificateInStore
CertOpenSystemStoreA
ole32
PropVariantClear
CoCreateInstance
Sections
.text Size: 781KB - Virtual size: 781KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 146KB - Virtual size: 145KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 344KB - Virtual size: 565KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ