D:\bamboo\home\xml-data\build-dir\CODRU-BA-SOURCES\bin\Win32\Release\ProductAgentUI.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-27_428786ec281eec0f0de15facb4e52221_avoslocker.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-06-27_428786ec281eec0f0de15facb4e52221_avoslocker.exe
Resource
win10v2004-20240611-en
General
-
Target
2024-06-27_428786ec281eec0f0de15facb4e52221_avoslocker
-
Size
2.3MB
-
MD5
428786ec281eec0f0de15facb4e52221
-
SHA1
4e0968e33951f57b2a19d83e105a5ca1000ec4fe
-
SHA256
9e2f00bbff61ed462a8cfd654ad2f8568e645aa3bd43db86fb23e452842ad63e
-
SHA512
c41b8b6465988e115832fd00b452f32a60fd1d16207f589109bad5915969fcd6a3db97936018cf08f5904abe653e1126352ae6f3dcabbc63b278119e96086c7b
-
SSDEEP
49152:ryxX2NPoTjzjeJhZApHRwHAjRYnVfmlQR5coDmg27RnWGj:BJhmpHRSCpyD527BWG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-27_428786ec281eec0f0de15facb4e52221_avoslocker
Files
-
2024-06-27_428786ec281eec0f0de15facb4e52221_avoslocker.exe windows:6 windows x86 arch:x86
46d677535abed8b62d0dabe45abb45a5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
crypt32
CryptBinaryToStringA
CryptUnprotectData
CryptBinaryToStringW
CryptStringToBinaryW
kernel32
WaitForSingleObject
MultiByteToWideChar
CloseThreadpoolWork
CreateThreadpoolWork
SubmitThreadpoolWork
WaitForThreadpoolWorkCallbacks
GetThreadId
GetStdHandle
WriteFile
GlobalFree
GlobalAlloc
CloseThreadpoolTimer
CreateThreadpoolTimer
SetThreadpoolTimer
WaitForThreadpoolTimerCallbacks
IsWow64Process
CreateProcessW
ReadFile
CreateFileW
GetSystemDirectoryW
SetEnvironmentVariableW
CreateThread
VerSetConditionMask
VerifyVersionInfoW
SetCurrentDirectoryW
SetLastError
GetFileAttributesW
OpenProcess
GlobalLock
GlobalUnlock
GlobalMemoryStatusEx
GetSystemWindowsDirectoryW
GetDiskFreeSpaceExW
LocalAlloc
InitOnceComplete
ResetEvent
GetProcessHeap
FindResourceExW
InitializeCriticalSectionEx
RaiseException
DeleteCriticalSection
SizeofResource
LockResource
LoadResource
FindResourceW
ExitProcess
GetModuleHandleExW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
GetTimeZoneInformation
HeapSize
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
GetFileType
SetStdHandle
SetConsoleCtrlHandler
FreeLibraryAndExitThread
ExitThread
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
RtlUnwind
QueryDosDeviceW
GetLongPathNameW
VirtualQuery
VirtualFree
VirtualProtect
VirtualAlloc
FlushInstructionCache
SetThreadContext
GetThreadContext
ResumeThread
SuspendThread
WriteConsoleW
K32GetMappedFileNameW
FileTimeToSystemTime
SetSearchPathMode
FormatMessageW
LoadLibraryA
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
Sleep
CreateMutexW
GetCurrentProcess
MapViewOfFile
UnmapViewOfFile
GetModuleHandleW
GetModuleFileNameW
LoadLibraryExW
GetLastError
FreeLibrary
GetProcAddress
LoadLibraryW
WideCharToMultiByte
LocalFree
GetCommandLineW
SetEvent
CreateEventW
WaitForMultipleObjects
OpenEventW
CloseHandle
FormatMessageA
ReadConsoleW
DecodePointer
LoadLibraryExA
GetModuleFileNameA
GetWindowsDirectoryW
GetLocalTime
GetCurrentThread
GetProcessTimes
OutputDebugStringA
DebugBreak
SetFilePointer
GetFileSizeEx
DeleteFileW
ExpandEnvironmentStringsW
GetEnvironmentVariableW
OutputDebugStringW
InitializeSListHead
GetCurrentProcessId
GetStartupInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
GetLocaleInfoEx
GetCPInfo
CompareStringEx
FreeLibraryWhenCallbackReturns
GetTickCount64
GetSystemTimeAsFileTime
InitOnceBeginInitialize
LCMapStringEx
EncodePointer
SleepConditionVariableSRW
SleepConditionVariableCS
WakeAllConditionVariable
WakeConditionVariable
InitializeConditionVariable
QueryPerformanceFrequency
QueryPerformanceCounter
TryEnterCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeSRWLock
GetFileInformationByHandleEx
DeviceIoControl
AreFileApisANSI
SetFilePointerEx
SetFileAttributesW
SetEndOfFile
GetFinalPathNameByHandleW
GetFileInformationByHandle
GetFileAttributesExW
FindNextFileW
FindFirstFileExW
FindClose
CreateDirectoryW
WaitForSingleObjectEx
GetCurrentThreadId
GetExitCodeThread
GetNativeSystemInfo
GetStringTypeW
ReleaseSRWLockExclusive
ReleaseSRWLockShared
AcquireSRWLockExclusive
AcquireSRWLockShared
GetCurrentDirectoryW
user32
KillTimer
PostMessageW
PostThreadMessageW
GetSystemMetrics
LoadIconW
SetWindowTextW
MonitorFromPoint
GetMonitorInfoW
MonitorFromRect
SetWindowPos
MoveWindow
GetCursorPos
GetAncestor
GetWindowLongW
OffsetRect
CopyRect
SystemParametersInfoW
ExitWindowsEx
IsWindow
IsIconic
ShowWindow
SetForegroundWindow
CreateWindowExW
DestroyWindow
GetClientRect
GetKeyState
BroadcastSystemMessageW
FindWindowW
SendMessageW
ChangeWindowMessageFilterEx
BringWindowToTop
EnableWindow
SetTimer
RegisterWindowMessageW
GetWindowRect
SetClassLongW
CreateDialogIndirectParamW
GetWindowThreadProcessId
GetMessageW
GetDC
GetPropW
SetActiveWindow
EnumChildWindows
GetShellWindow
RegisterClassExW
GetActiveWindow
OpenClipboard
DispatchMessageW
IsDialogMessageW
DefDlgProcW
CloseClipboard
EmptyClipboard
TranslateMessage
SetParent
SetClipboardData
SetWindowLongW
GetDesktopWindow
ReleaseDC
gdi32
GetDeviceCaps
advapi32
GetTokenInformation
LookupAccountSidW
GetAclInformation
GetSidSubAuthorityCount
GetSidSubAuthority
RegCreateKeyExW
CryptHashData
CryptGetHashParam
CryptCreateHash
CryptDestroyHash
CryptAcquireContextW
CryptReleaseContext
IsWellKnownSid
ConvertSidToStringSidW
GetNamedSecurityInfoW
RegQueryValueExW
RegSetValueExW
RegCloseKey
RegOpenKeyExW
RegGetValueW
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueW
GetAce
GetFileSecurityW
GetSecurityDescriptorDacl
GetSidIdentifierAuthority
shell32
SHGetKnownFolderPath
CommandLineToArgvW
ShellExecuteW
ole32
CoSetProxyBlanket
CoUninitialize
CoTaskMemFree
CoInitializeSecurity
CoInitializeEx
OleSetContainedObject
CoGetClassObject
OleUninitialize
OleInitialize
CoCreateInstance
CoInitialize
oleaut32
SysAllocString
VariantCopy
SysFreeString
VariantInit
VariantClear
VariantChangeType
shlwapi
PathRemoveFileSpecW
PathAppendW
SHGetValueW
PathIsRelativeW
dwmapi
DwmIsCompositionEnabled
winmm
timeGetTime
wininet
InternetSetOptionW
InternetCrackUrlW
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
wintrust
CryptCATAdminReleaseContext
WinVerifyTrust
CryptCATCatalogInfoFromContext
CryptCATAdminEnumCatalogFromHash
CryptCATAdminCalcHashFromFileHandle
CryptCATAdminAcquireContext
rpcrt4
UuidCreate
Sections
.text Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 217KB - Virtual size: 217KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 27KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.detourc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.detourd Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 491KB - Virtual size: 490KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 620KB - Virtual size: 624KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE