E:\B\T\dce8fd04-c842-4a5a-b54e-0501164ec775\UBF_1\build\Win32\Release\McUICnt.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-27_d0039b614e71137a68979589c2409c6a_avoslocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-27_d0039b614e71137a68979589c2409c6a_avoslocker.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-27_d0039b614e71137a68979589c2409c6a_avoslocker
-
Size
1.1MB
-
MD5
d0039b614e71137a68979589c2409c6a
-
SHA1
01fbf249cccce9574287c106c0bf0d6e07e0dae4
-
SHA256
58897f079175894a15553ecd980440ba915179e48561c9b3eb1fea6fc6f4a36c
-
SHA512
a427a04b3bf5362189fcaa48aaf4470e7fdfff014b454ef6ce7845af68eb8281dd40c202280eff897dfcece1428521d4bcdc6d4a6774fd21e27578e401eae577
-
SSDEEP
24576:210MnwnUN/ORNh60/cwOo743TvRk6NwG:InwnFNI0NOFDv66mG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-27_d0039b614e71137a68979589c2409c6a_avoslocker
Files
-
2024-06-27_d0039b614e71137a68979589c2409c6a_avoslocker.exe windows:6 windows x86 arch:x86
0c96da1cddbd4461bd9e3fb04fac1a21
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
HeapFree
GetModuleFileNameW
InitializeCriticalSection
InitializeCriticalSectionEx
HeapSize
MultiByteToWideChar
Sleep
GetLastError
HeapReAlloc
RaiseException
LoadLibraryW
HeapAlloc
DecodePointer
HeapDestroy
GetProcAddress
DeleteCriticalSection
GetProcessHeap
GetModuleHandleW
FreeLibrary
WideCharToMultiByte
VirtualQuery
CreateFileW
GetFileSize
CloseHandle
ReadFile
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
EnterCriticalSection
LeaveCriticalSection
GetCurrentProcessId
GetCommandLineW
CreateProcessW
WaitForSingleObject
SetEvent
GlobalDeleteAtom
LocalFree
CreateEventW
OpenEventW
SetLastError
CreateThread
LocalAlloc
GlobalAddAtomW
GlobalGetAtomNameW
GetCurrentThreadId
SizeofResource
LockResource
LoadResource
FindResourceExW
FindResourceW
FindClose
FindFirstFileW
GetFileAttributesW
RemoveDirectoryW
SetFilePointer
WriteFile
OutputDebugStringW
ReleaseMutex
CreateMutexW
GetLocalTime
InitializeCriticalSectionAndSpinCount
GetModuleHandleExW
VerSetConditionMask
GetCurrentProcess
VerifyVersionInfoW
LoadLibraryExW
FormatMessageW
WritePrivateProfileStringW
WritePrivateProfileStructW
GetCurrentDirectoryW
CreateDirectoryW
FindNextFileW
lstrlenW
GetEnvironmentVariableW
QueryFullProcessImageNameW
InitializeSRWLock
ReleaseSRWLockExclusive
ReleaseSRWLockShared
AcquireSRWLockExclusive
AcquireSRWLockShared
OpenProcess
GetWindowsDirectoryW
GlobalFindAtomW
SystemTimeToFileTime
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetFullPathNameW
LockFileEx
UnlockFileEx
CopyFileW
MoveFileW
MoveFileExW
ReplaceFileW
DeleteFileA
SetFileAttributesA
GetTempPathA
GetTempFileNameA
GetSystemInfo
VirtualProtect
LoadLibraryExA
IsDebuggerPresent
GetStringTypeW
InitOnceBeginInitialize
InitOnceComplete
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
LCMapStringW
GetLocaleInfoW
GetCPInfo
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
InitializeSListHead
RtlUnwind
VirtualAlloc
GetFileType
SetFilePointerEx
GetConsoleMode
ReadConsoleW
GetConsoleCP
ExitProcess
GetStdHandle
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
SetStdHandle
GetFileSizeEx
FlushFileBuffers
SetEndOfFile
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
WriteConsoleW
Sections
.text Size: 397KB - Virtual size: 397KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 122KB - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 588KB - Virtual size: 592KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE