Static task
static1
Behavioral task
behavioral1
Sample
2024-06-15_43a079dd84c3f963c3ce61414ffabfa2_avoslocker.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2024-06-15_43a079dd84c3f963c3ce61414ffabfa2_avoslocker.exe
Resource
win10v2004-20240611-en
General
-
Target
2024-06-15_43a079dd84c3f963c3ce61414ffabfa2_avoslocker
-
Size
2.2MB
-
MD5
43a079dd84c3f963c3ce61414ffabfa2
-
SHA1
376146d0170072e11952d720441ce52701e36d29
-
SHA256
cc324748678019bfaa651af4963058ad29bc22ab639d9d939870a2ce6993a616
-
SHA512
aed5163ee247f70340290e1d8e3dcecfc66cfdb04f26396557448b2af06bc65ce0aabf417254c2c2f585e22424bdcc9ca9ab5fa3c5117459afcb98bc8bcc589b
-
SSDEEP
49152:I9t2adcDKDdpeaqgzMEdqTCGg5O3jUfkptVxG0pb9wzEz+o8:I9t2ywCTejgzMEmjUu5GL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-15_43a079dd84c3f963c3ce61414ffabfa2_avoslocker
Files
-
2024-06-15_43a079dd84c3f963c3ce61414ffabfa2_avoslocker.exe windows:6 windows x86 arch:x86
0771761bd673b1447edf78c32f39db74
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
ConvertStringSidToSidA
EqualSid
RegCloseKey
GetTokenInformation
OpenProcessToken
CopySid
ConvertStringSecurityDescriptorToSecurityDescriptorA
kernel32
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetProcessHeap
HeapSize
WriteConsoleW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
ReadFile
GetCurrentProcessId
WaitForSingleObject
GetModuleHandleA
GetModuleHandleExA
GetLastError
SetDllDirectoryA
GetProcAddress
CreateProcessA
CreateDirectoryA
GetExitCodeProcess
CloseHandle
SizeofResource
FindResourceA
LockResource
LoadResource
MultiByteToWideChar
WideCharToMultiByte
FindFirstFileA
SetLastError
GetDriveTypeA
FindNextFileA
InitializeCriticalSectionAndSpinCount
FindClose
CopyFileA
GetFileAttributesA
MoveFileExA
CreateFileA
DeleteFileA
RaiseException
SetFileAttributesA
DecodePointer
RemoveDirectoryA
DeleteCriticalSection
GetTickCount
GetModuleHandleExW
LoadLibraryW
FreeLibrary
GetModuleFileNameA
GetCommandLineW
GetCurrentProcess
GetTempPathA
GetSystemDirectoryA
GetNativeSystemInfo
LocalFree
GetCurrentThreadId
Sleep
FormatMessageW
GetLocalTime
GetStringTypeW
EnterCriticalSection
LeaveCriticalSection
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
EncodePointer
LCMapStringW
GetLocaleInfoW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
OutputDebugStringW
FlushFileBuffers
SetFilePointerEx
GetFileSizeEx
HeapAlloc
IsValidCodePage
FindNextFileW
FindFirstFileExW
HeapReAlloc
SetEndOfFile
SetStdHandle
RtlUnwind
LoadLibraryExW
GetCommandLineA
CreateFileW
GetFileType
WriteFile
GetConsoleCP
GetConsoleMode
GetStdHandle
GetModuleFileNameW
ExitProcess
HeapFree
ReadConsoleW
Sections
.text Size: 178KB - Virtual size: 178KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 73KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.9MB - Virtual size: 1.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 87KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE