EasyAntiCheat_EOS_Setup.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-20_8ef60b2bf1a2405bb8aa6353befdf976_avoslocker.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-06-20_8ef60b2bf1a2405bb8aa6353befdf976_avoslocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-20_8ef60b2bf1a2405bb8aa6353befdf976_avoslocker
-
Size
1.4MB
-
MD5
8ef60b2bf1a2405bb8aa6353befdf976
-
SHA1
f0dba60d131e7091df12f7152ebedf929374e841
-
SHA256
5ea7d754223ce5f63e5e8f48b2c0b581af7841f2f08b1723bf9af3bae68b1762
-
SHA512
6c103806d06a4f963ed2dfd17dacf42e0aecb407aaf2807cf3ace578861eacbd16bf86a318bb90f54b3f6915464f98df5ad445abe777ef7c6c35f25d33b3c054
-
SSDEEP
24576:V3diFjFZyTE4vttcY+/fpfLnYCKLgXM+TK2zM7YsdZjHhQ6giafmvJW5:NdUjmFtcY+/fpfLnYCKUXM+TK2I7Ys3W
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-20_8ef60b2bf1a2405bb8aa6353befdf976_avoslocker
Files
-
2024-06-20_8ef60b2bf1a2405bb8aa6353befdf976_avoslocker.exe windows:6 windows x86 arch:x86
2616199a56b3f04840948e08cc9b05d4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
kernel32
GetCurrentProcess
FileTimeToSystemTime
GetLocalTime
ExitProcess
LocalAlloc
GetSystemDirectoryW
IsWow64Process
RemoveDirectoryW
GetTempPathW
SetFileAttributesW
GetCurrentProcessId
CopyFileW
MoveFileW
GetExitCodeProcess
WriteFile
TerminateProcess
WaitForMultipleObjects
K32GetProcessImageFileNameW
OpenProcess
K32EnumProcesses
MoveFileExW
HeapFree
HeapAlloc
GetProcessHeap
FormatMessageA
WideCharToMultiByte
LocalFree
MultiByteToWideChar
GetFullPathNameW
CreateThread
GetLastError
Sleep
ResumeThread
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
ResetEvent
SetEvent
CreateEventW
WaitForSingleObject
GetLocaleInfoW
GetFileTime
GetModuleHandleW
DeleteFileW
GetFileInformationByHandle
GetFileAttributesW
FindClose
GetModuleFileNameW
ExpandEnvironmentStringsW
LoadLibraryA
GlobalFree
GetProcAddress
FreeLibrary
CreateFileW
FindNextFileW
CompareStringW
SetLastError
InitializeCriticalSectionEx
SleepEx
VerSetConditionMask
QueryPerformanceFrequency
VerifyVersionInfoW
GetModuleHandleA
GetEnvironmentVariableA
QueryPerformanceCounter
GetTickCount
MoveFileExA
WaitForSingleObjectEx
GetStringTypeW
UnmapViewOfFile
EncodePointer
DecodePointer
LCMapStringEx
GetLocaleInfoEx
CompareStringEx
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetCurrentThreadId
InitializeSListHead
RtlUnwind
RaiseException
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
GetDriveTypeW
GetFileType
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
GetStdHandle
GetCommandLineA
GetCommandLineW
GetConsoleMode
ReadConsoleW
GetConsoleOutputCP
FlushFileBuffers
SetFilePointerEx
GetDateFormatW
GetTimeFormatW
LCMapStringW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
HeapReAlloc
GetCurrentDirectoryW
SetStdHandle
GetTimeZoneInformation
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetFileAttributesExW
HeapSize
WriteConsoleW
SetEndOfFile
GetFileSizeEx
FindFirstFileW
ReadFile
CreateDirectoryW
GetSystemTimeAsFileTime
LoadLibraryW
MapViewOfFile
CreateFileMappingW
CloseHandle
advapi32
ConvertStringSidToSidW
OpenProcessToken
ChangeServiceConfig2W
OpenSCManagerW
CloseServiceHandle
CreateServiceW
ConvertStringSecurityDescriptorToSecurityDescriptorW
StartServiceW
DeleteService
StartServiceCtrlDispatcherW
SetServiceStatus
RegisterServiceCtrlHandlerExW
RegQueryValueExW
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGenRandom
CryptGetHashParam
CryptReleaseContext
CryptAcquireContextW
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
SetSecurityDescriptorDacl
GetSecurityDescriptorDacl
BuildExplicitAccessWithNameW
SetEntriesInAclW
GetTokenInformation
SetServiceObjectSecurity
ControlService
InitializeSecurityDescriptor
OpenServiceW
LookupAccountSidW
QueryServiceObjectSecurity
RegCloseKey
RegDeleteKeyW
shell32
SHGetKnownFolderPath
ShellExecuteExW
SHFileOperationW
SHGetFolderPathW
ole32
CoTaskMemFree
crypt32
CertFreeCertificateChain
CertFreeCertificateChainEngine
CertOpenStore
CertCloseStore
CertEnumCertificatesInStore
CertFindCertificateInStore
CertFreeCertificateContext
CryptStringToBinaryW
CryptDecodeObjectEx
CertAddCertificateContextToStore
CertFindExtension
CertGetNameStringW
CryptQueryObject
CertCreateCertificateChainEngine
CertGetCertificateChain
ws2_32
freeaddrinfo
setsockopt
closesocket
recv
send
WSAGetLastError
bind
connect
getpeername
getsockname
getsockopt
htons
ntohs
select
socket
WSASetLastError
WSAIoctl
WSAStartup
WSACleanup
accept
htonl
listen
ioctlsocket
__WSAFDIsSet
getaddrinfo
Sections
.text Size: 603KB - Virtual size: 602KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 136KB - Virtual size: 136KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 592KB - Virtual size: 596KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE