Static task
static1
Behavioral task
behavioral1
Sample
2024-06-25_cf9b189fffd533404cb476fa648d6b89_avoslocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-25_cf9b189fffd533404cb476fa648d6b89_avoslocker.exe
Resource
win10v2004-20240611-en
General
-
Target
2024-06-25_cf9b189fffd533404cb476fa648d6b89_avoslocker
-
Size
1.2MB
-
MD5
cf9b189fffd533404cb476fa648d6b89
-
SHA1
f32ad6ac072ab41d70f9c89b9b04f03c302864cb
-
SHA256
301cc9d2e9b0fdea6b60860a8c06627091a42e5219483b5704418395fc314c14
-
SHA512
6954c199a78b9991934b43ce98622a24f398e20de1af4b01ec3b228a3cc2ed43382813da585aedec7f8e175ea390bcf42e5b1931e7317385be56c0be90078ddd
-
SSDEEP
24576:2ByFuNHO/4idMe2oDWqg3vLdPG/kTSCjcpsqjnhMgeiCl7G0nehbGZpbD:tQs4eMe2oDWqaDdPGMTItDmg27RnWGj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-25_cf9b189fffd533404cb476fa648d6b89_avoslocker
Files
-
2024-06-25_cf9b189fffd533404cb476fa648d6b89_avoslocker.exe windows:6 windows x86 arch:x86
58ffb2a09f117412d91e79901d59318a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
libcurl
curl_easy_cleanup
curl_easy_perform
curl_easy_setopt
curl_easy_init
comctl32
InitCommonControlsEx
shlwapi
PathFindFileNameW
PathIsDirectoryW
PathRemoveFileSpecW
PathFindExtensionW
PathFileExistsA
PathFileExistsW
kernel32
CreateFileW
HeapReAlloc
HeapSize
SetEndOfFile
SleepConditionVariableSRW
SetStdHandle
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
CreateDirectoryW
DeleteFileW
OutputDebugStringW
Sleep
CreateThread
GetCurrentThreadId
lstrcmpW
lstrcpyW
lstrlenW
MoveFileW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
CloseHandle
GetLastError
InitializeCriticalSection
SetEvent
ResetEvent
ReleaseSemaphore
WaitForSingleObject
CreateEventW
CreateSemaphoreW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
GetTimeZoneInformation
GetFileSizeEx
GetConsoleOutputCP
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
HeapAlloc
ReadConsoleW
GetConsoleMode
SetFilePointerEx
GetFileType
InitializeCriticalSectionAndSpinCount
WaitForSingleObjectEx
GetModuleHandleW
GetProcAddress
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
WideCharToMultiByte
MultiByteToWideChar
GetExitCodeThread
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
InitializeCriticalSectionEx
TryEnterCriticalSection
InitializeConditionVariable
WakeConditionVariable
WakeAllConditionVariable
SleepConditionVariableCS
WriteConsoleW
GetLocaleInfoEx
EncodePointer
DecodePointer
LCMapStringEx
GetStringTypeW
CompareStringEx
GetCPInfo
RaiseException
RtlUnwind
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ReadFile
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
ExitProcess
GetModuleFileNameW
GetStdHandle
WriteFile
HeapFree
user32
MessageBoxA
GetWindowRect
SetWindowTextW
FindWindowExW
SetDlgItemTextW
GetDlgItemInt
SetDlgItemInt
EndDialog
DialogBoxParamW
SetWindowPos
CreateWindowExW
SendMessageW
SetWindowsHookExW
MessageBoxW
UnhookWindowsHookEx
CallNextHookEx
LoadImageW
SystemParametersInfoW
GetDlgItemTextW
shell32
SHFileOperationW
ShellExecuteW
SHGetFolderPathW
Sections
.text Size: 471KB - Virtual size: 471KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 109KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 584KB - Virtual size: 588KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE