Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-04_fa42517bb6e2bc39acdba7bb480a8173_avoslocker_floxif_metamorfo.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-07-04_fa42517bb6e2bc39acdba7bb480a8173_avoslocker_floxif_metamorfo.exe
Resource
win10v2004-20240508-en
Target
2024-07-04_fa42517bb6e2bc39acdba7bb480a8173_avoslocker_floxif_metamorfo
Size
2.0MB
MD5
fa42517bb6e2bc39acdba7bb480a8173
SHA1
da686ecc874c44136e6c4492f5be0a5ed71c7af6
SHA256
ecdb0726749f073228a8bea0d42cec9c2d6462b6bfa42f86c85ce0277c8fe308
SHA512
44b152b8dad02c67ad9ce6e5fb79b7911d2cfc6392c1d80108979cda95ad4895bce665e79b5df8234069f447eb5991f678d51f5c0dfd160008ad61383d459553
SSDEEP
49152:5402w4qELUE98n77+ldXJD8leZUxZGoJdNNbY:i+EvDJD8soJdNK
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\Jenkins\workspace\CisCleanupTool2_vs19\CisCleanupTool2\CleanTool2_out\CisCleanupTool_x86.pdb
HeapReAlloc
HeapSize
InitializeCriticalSectionEx
RaiseException
GetLastError
WideCharToMultiByte
MultiByteToWideChar
SetStdHandle
WriteConsoleW
SetEndOfFile
HeapAlloc
DecodePointer
HeapDestroy
DeleteCriticalSection
GetProcessHeap
SetEnvironmentVariableW
HeapFree
SetLastError
FormatMessageW
LocalFree
GetCurrentProcess
VerSetConditionMask
VerifyVersionInfoW
GetProcAddress
GetModuleHandleW
GetTempPathW
GetTempFileNameW
GetModuleFileNameW
GetLongPathNameW
WaitForSingleObject
SetEvent
CloseHandle
CreateEventW
OutputDebugStringW
FindResourceW
LoadResource
SizeofResource
LockResource
CreateFileW
WriteFile
LeaveCriticalSection
EnterCriticalSection
FreeLibrary
lstrcmpiW
LoadLibraryExW
LoadLibraryW
GetCommandLineW
DeviceIoControl
GetSystemTime
GetLocalTime
GetCurrentProcessId
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
OpenProcess
K32GetModuleFileNameExW
DeleteFileW
RemoveDirectoryW
lstrcpyW
FindFirstFileW
FindNextFileW
FindClose
Sleep
GetCurrentThreadId
FileTimeToLocalFileTime
GetSystemTimeAsFileTime
SetUnhandledExceptionFilter
FileTimeToDosDateTime
MoveFileW
MoveFileExW
CreateProcessW
SetFileAttributesW
GetFileInformationByHandle
GetStringTypeW
QueryPerformanceCounter
EncodePointer
LCMapStringEx
FreeEnvironmentStringsW
GetCPInfo
IsDebuggerPresent
UnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
InitializeSListHead
RtlUnwind
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
ExitProcess
GetStdHandle
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
GetTimeZoneInformation
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
ReadFile
SetFilePointerEx
GetFileSizeEx
ReadConsoleW
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetEnvironmentStringsW
DrawTextW
SetCapture
SetCursor
LoadCursorW
PtInRect
ReleaseCapture
DefWindowProcW
GetDC
CharUpperBuffW
ExitWindowsEx
LoadStringW
GetClientRect
GetWindowTextLengthW
EnableMenuItem
GetSystemMenu
SendDlgItemMessageW
LoadImageW
DestroyIcon
GetWindowTextW
SetWindowPos
OffsetRect
CopyRect
GetWindowRect
GetDesktopWindow
GetParent
DialogBoxParamW
SetWindowLongW
ReleaseDC
CheckDlgButton
IsDlgButtonChecked
SetDlgItemTextW
MessageBoxW
CharNextW
wsprintfW
CallWindowProcW
GetWindowLongW
PostMessageW
EndDialog
EnableWindow
GetSysColorBrush
GetDlgCtrlID
SendMessageW
SetFocus
SetWindowTextW
GetDlgItem
ShowWindow
CreateFontIndirectW
SetBkMode
SetTextColor
DeleteObject
DeleteDC
CreateCompatibleDC
SelectObject
BitBlt
CreateCompatibleBitmap
PathIsDirectoryEmptyW
SHQueryInfoKeyW
SHDeleteKeyW
PathFileExistsW
PathStripToRootW
PathFindFileNameW
PathFindExtensionW
PathAddBackslashW
ord205
SetupFindFirstLineW
SetupCloseInfFile
SetupGetStringFieldW
SetupOpenInfFileW
SetupGetInfFileListW
SetupUninstallOEMInfW
MiniDumpWriteDump
WTHelperProvDataFromStateData
WTHelperGetProvSignerFromChain
WinVerifyTrust
WTHelperGetProvCertFromChain
CertGetNameStringW
CryptUnprotectData
CertDuplicateCertificateContext
RegSetKeySecurity
RegSetValueExW
RegQueryValueExW
RegDeleteValueW
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
ConvertSidToStringSidW
RegCreateKeyExW
ClearEventLogW
OpenServiceW
CloseServiceHandle
OpenSCManagerW
DeleteService
CopySid
GetLengthSid
IsValidSid
GetSidSubAuthority
InitializeSid
GetSidLengthRequired
GetNamedSecurityInfoW
GetAce
GetAclInformation
AddAce
InitializeAcl
SetNamedSecurityInfoW
GetUserNameW
LookupAccountNameW
CloseEventLog
ReportEventW
OpenEventLogW
SetSecurityDescriptorGroup
SetEntriesInAclW
CreateWellKnownSid
RegDeleteKeyW
RegQueryInfoKeyW
RegEnumValueW
TreeResetNamedSecurityInfoW
RegEnumKeyExW
AddAccessAllowedAceEx
SetSecurityDescriptorOwner
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegCloseKey
RegOpenKeyExW
ShellExecuteW
CommandLineToArgvW
SHGetFolderPathW
CoSetProxyBlanket
CoInitializeEx
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CoCreateInstance
CoInitialize
CoInitializeSecurity
CoUninitialize
SysAllocString
SysFreeString
VariantClear
VariantInit
VarUI4FromStr
VariantTimeToSystemTime
SystemTimeToVariantTime
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ