EasyAntiCheat_Setup.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-15_18eeec7b72cf0c7c2b840b4b7cc7f716_avoslocker.exe
Resource
win7-20240508-en
General
-
Target
2024-06-15_18eeec7b72cf0c7c2b840b4b7cc7f716_avoslocker
-
Size
1.3MB
-
MD5
18eeec7b72cf0c7c2b840b4b7cc7f716
-
SHA1
59d1720346e61ca9dbe256986465b67a99476127
-
SHA256
a6927e8872fe97de04ac306e166d1d0e9a321039662e92f1e71871fdacd4db76
-
SHA512
921901e43e0391ff0ba919005244d33c717bd5d26d3da09ce6fbf3195cffd8f77960011f257f05ff37feabc2ea1fd756c83048b3b6e4b75729070b99077bef80
-
SSDEEP
24576:X1W0zXfzchPAwmucXS2FDKNO8IIG+EiAkbwRobfHRFcbK3eUKUzy:FzzchPAwmu0S2VKNO6G+YktHRFcbtUK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-15_18eeec7b72cf0c7c2b840b4b7cc7f716_avoslocker
Files
-
2024-06-15_18eeec7b72cf0c7c2b840b4b7cc7f716_avoslocker.exe windows:6 windows x86 arch:x86
07c7adba2e7b1f4483cc9e9837abb013
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
UnmapViewOfFile
OpenProcess
SetFileAttributesW
OutputDebugStringW
K32EnumProcesses
CreateFileMappingW
MapViewOfFile
SizeofResource
LockResource
GlobalAlloc
GlobalFree
LoadResource
FindResourceW
GlobalLock
GlobalUnlock
RemoveDirectoryW
GetModuleFileNameW
GetTempPathW
CopyFileW
MoveFileW
GetExitCodeProcess
CreateDirectoryW
HeapFree
SetLastError
HeapAlloc
GetProcessHeap
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
HeapSize
SetFilePointerEx
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
K32GetProcessImageFileNameW
GetACP
IsValidCodePage
FindFirstFileExW
GetTimeZoneInformation
HeapReAlloc
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetFileType
GetStdHandle
GetModuleHandleExW
ExitProcess
LoadLibraryExW
FreeLibrary
RaiseException
RtlUnwind
InitializeSListHead
GetCurrentThreadId
GetCurrentProcessId
GetStartupInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WaitForMultipleObjects
TerminateProcess
OutputDebugStringA
WriteFile
GetCurrentProcess
GetLogicalDriveStringsW
ReadFile
QueryDosDeviceW
LoadLibraryW
GetSystemDirectoryW
LocalAlloc
WideCharToMultiByte
LocalFree
MultiByteToWideChar
SwitchToThread
CreateThread
GetLastError
Sleep
ResumeThread
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
ResetEvent
GetCPInfo
LCMapStringW
CompareStringW
GetStringTypeW
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
SetEvent
CreateEventW
WaitForSingleObject
GetLocaleInfoW
GetModuleHandleW
GetProcAddress
CloseHandle
DeleteFileW
GetFileInformationByHandle
CreateFileW
FindClose
FindNextFileW
GetFileSizeEx
FindFirstFileW
GetOEMCP
TlsAlloc
InitializeCriticalSectionAndSpinCount
DecodePointer
EncodePointer
QueryPerformanceFrequency
QueryPerformanceCounter
WriteConsoleW
user32
ReleaseCapture
UpdateWindow
SystemParametersInfoW
PostQuitMessage
GetClientRect
InvalidateRect
LoadCursorW
LoadIconW
TranslateMessage
MoveWindow
GetMonitorInfoW
DispatchMessageW
ShowWindow
SetForegroundWindow
ReleaseDC
BeginPaint
EndPaint
SetCapture
RegisterClassExW
PostMessageW
SetWindowPos
FillRect
SetWindowTextW
MapWindowPoints
IsWindowEnabled
SendMessageA
MapDialogRect
DrawTextW
GetClassInfoExW
EnableWindow
GetWindowTextW
GetMessageW
DefWindowProcW
GetWindowRect
DestroyWindow
GetDC
MessageBoxW
MonitorFromRect
CreateWindowExW
SendMessageW
advapi32
ChangeServiceConfig2W
StartServiceW
DeleteService
OpenSCManagerW
CloseServiceHandle
CreateServiceW
GetTokenInformation
OpenProcessToken
StartServiceCtrlDispatcherW
RegisterServiceCtrlHandlerW
SetServiceStatus
RegQueryValueExW
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
RegDeleteKeyW
RegCloseKey
QueryServiceObjectSecurity
LookupAccountSidW
OpenServiceW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
GetSecurityDescriptorDacl
BuildExplicitAccessWithNameW
AllocateAndInitializeSid
SetEntriesInAclW
ConvertStringSidToSidW
SetServiceObjectSecurity
ControlService
FreeSid
CheckTokenMembership
ConvertStringSecurityDescriptorToSecurityDescriptorW
shell32
ShellExecuteExW
CommandLineToArgvW
ShellExecuteW
SHFileOperationW
ole32
CoInitializeEx
CreateStreamOnHGlobal
CoTaskMemFree
gdi32
AddFontMemResourceEx
DeleteObject
RestoreDC
DeleteDC
GetDeviceCaps
CreateFontW
CreateCompatibleDC
SelectObject
RemoveFontMemResourceEx
CreateCompatibleBitmap
BitBlt
SetDCPenColor
RoundRect
SetDCBrushColor
SetBkMode
SetTextColor
GetTextExtentPoint32W
GetStockObject
SaveDC
gdiplus
GdipDeleteGraphics
GdipCreateFromHDC
GdipFillRectangleI
GdipLoadImageFromStream
GdipFree
GdipDisposeImage
GdipAlloc
GdipCloneImage
GdiplusShutdown
GdipDrawImageRectI
GdipCreateLineBrushI
GdipDeleteBrush
GdiplusStartup
Sections
.text Size: 348KB - Virtual size: 347KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 89KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 324KB - Virtual size: 324KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 584KB - Virtual size: 588KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE