Static task
static1
Behavioral task
behavioral1
Sample
2024-07-05_066ccf7c18b0e8ef0baafb5364c5331c_avoslocker.exe
Resource
win7-20240705-en
General
-
Target
2024-07-05_066ccf7c18b0e8ef0baafb5364c5331c_avoslocker
-
Size
1.5MB
-
MD5
066ccf7c18b0e8ef0baafb5364c5331c
-
SHA1
78758d948ad6648e401e13853321f993573dc900
-
SHA256
84f87dc77b19eb7ccaee79d67a55223ea90b9d68a2ec0920b284e9be5593569d
-
SHA512
553e451e8be580927fb7aa5c5843f3f3684b300db30af0833629d73905da9d7528cc14a1b7e3032fddf1e8dabe9baed46ed2486079f2efcca2b61151edd65815
-
SSDEEP
24576:q+l0nPsHYHOQrE0/1edr2UT1g1at0xXatr0zAiX90z/F0jsFB3SQkl:q+ls+YuQrP1ecUT1YasXaB0zj0yjoB2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-07-05_066ccf7c18b0e8ef0baafb5364c5331c_avoslocker
Files
-
2024-07-05_066ccf7c18b0e8ef0baafb5364c5331c_avoslocker.exe windows:6 windows x86 arch:x86
c65c63d8c523e5191dbbeed74a83acff
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CoTaskMemAlloc
IIDFromString
StringFromGUID2
OleInitialize
OleUninitialize
OleRun
OleSetContainedObject
CoInitializeEx
CoTaskMemRealloc
CoTaskMemFree
CoCreateInstance
CoUninitialize
CoInitialize
shell32
FindExecutableA
Shell_NotifyIconA
ShellExecuteExA
SHGetFolderPathW
SHGetFolderPathA
wininet
InternetGetConnectedState
InternetTimeToSystemTime
InternetCrackUrlA
InternetTimeFromSystemTime
HttpQueryInfoA
HttpOpenRequestA
InternetErrorDlg
InternetOpenA
InternetCloseHandle
HttpSendRequestA
InternetConnectA
InternetReadFile
user32
GetWindowThreadProcessId
GetFocus
IsChild
SetFocus
SetRect
GetWindowLongW
DefWindowProcW
GetSystemMenu
AdjustWindowRectEx
GetWindowRect
LoadCursorA
GetDC
SetWindowPos
CreateWindowExW
SetWindowTextW
RegisterClassExW
SendMessageA
MessageBoxA
RegisterClassExA
SetWindowLongW
GetClientRect
GetDesktopWindow
EnableMenuItem
GetClassInfoExW
TrackPopupMenu
ShowWindow
GetParent
ReleaseDC
wsprintfA
GetMessageW
GetMessageA
LoadImageA
DispatchMessageA
DestroyWindow
LoadStringA
PostMessageA
GetSystemMetrics
DispatchMessageW
CreatePopupMenu
SetWindowLongA
GetAncestor
CharNextA
GetCursorPos
SetForegroundWindow
IsWindowUnicode
PostQuitMessage
PeekMessageA
AppendMenuA
TranslateMessage
CreateWindowExA
DefWindowProcA
RegisterClassA
GetWindowLongA
MsgWaitForMultipleObjectsEx
comctl32
InitCommonControlsEx
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueW
kernel32
GetStartupInfoW
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
InitializeSListHead
RtlUnwind
GetSystemInfo
VirtualAlloc
VirtualProtect
VirtualQuery
GetFileType
GetConsoleCP
GetConsoleMode
GetStdHandle
GetModuleFileNameW
WriteConsoleW
ExitThread
GetDriveTypeW
GetFileInformationByHandle
SystemTimeToTzSpecificLocalTime
GetFullPathNameW
SetStdHandle
HeapAlloc
HeapFree
FreeLibraryAndExitThread
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
HeapSize
HeapReAlloc
GetFileSizeEx
FlushFileBuffers
GetTimeZoneInformation
ReadConsoleW
GetCurrentDirectoryW
FindFirstFileExW
FindNextFileW
IsValidCodePage
CreateDirectoryW
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
InitializeCriticalSectionAndSpinCount
lstrcmpA
GetModuleHandleA
GetLastError
RaiseException
DecodePointer
DeleteCriticalSection
SetEnvironmentVariableW
SizeofResource
LoadLibraryExA
FindResourceA
CreateMutexA
GetCommandLineA
MultiByteToWideChar
SetDllDirectoryA
CloseHandle
IsDBCSLeadByte
LoadResource
GetProcAddress
FreeLibrary
WideCharToMultiByte
lstrcmpiA
lstrlenA
WaitForSingleObject
DeleteFileA
LocalFree
FormatMessageA
GetExitCodeProcess
WaitForMultipleObjects
lstrcatA
SetEvent
lstrcpyA
CreateThread
ResetEvent
CreateEventA
lstrcpynA
OpenEventA
WriteFile
Sleep
CreateFileA
GetSystemTime
GetCurrentProcess
GetTempPathA
ReadFile
FileTimeToSystemTime
SystemTimeToFileTime
MulDiv
LocalAlloc
GetCurrentThreadId
SetEndOfFile
SetFilePointerEx
FindFirstFileA
TerminateProcess
FindClose
GetSystemDirectoryA
LockResource
GetWindowsDirectoryA
ExitProcess
FormatMessageW
GetLocalTime
GetCurrentProcessId
SetLastError
FindNextFileA
GetFileAttributesA
MoveFileExA
SetFileAttributesA
RemoveDirectoryA
CreateDirectoryA
GetTickCount
GetCommandLineW
GetModuleHandleExW
GetProcessHeap
GetNativeSystemInfo
SetHandleInformation
CreatePipe
PeekNamedPipe
CreateProcessA
GetSystemDefaultUILanguage
GetThreadLocale
GetUserDefaultUILanguage
GetModuleHandleExA
LoadLibraryW
GetExitCodeThread
OpenThread
OpenMutexA
LoadLibraryExW
ReleaseMutex
QueryPerformanceFrequency
QueryPerformanceCounter
CreateFileW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
GetStringTypeW
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
EncodePointer
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
IsDebuggerPresent
OutputDebugStringW
GetModuleFileNameA
advapi32
CryptDestroyHash
CryptGetHashParam
RegDeleteValueA
RegEnumKeyExA
CryptHashData
CryptCreateHash
RegQueryValueExA
CryptAcquireContextA
RegEnumKeyA
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegDeleteKeyA
RegQueryInfoKeyW
RegCloseKey
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
CryptReleaseContext
oleaut32
SysFreeString
VarUI4FromStr
VariantClear
VariantChangeType
VariantCopy
VariantInit
SysStringByteLen
GetErrorInfo
SysAllocString
shlwapi
ord12
gdi32
GetDeviceCaps
GetStockObject
wintrust
WinVerifyTrust
crypt32
CryptProtectData
CryptUnprotectData
CryptBinaryToStringA
CryptStringToBinaryA
CertGetNameStringW
CryptMsgClose
CryptQueryObject
CertCloseStore
CryptMsgGetParam
CertFindCertificateInStore
msi
ord91
ord160
ord31
ord168
ord117
ord137
ord189
ord159
ord115
ord141
ord44
ord67
ord8
ord158
ord204
Sections
.text Size: 489KB - Virtual size: 488KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 176KB - Virtual size: 175KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 273KB - Virtual size: 273KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 600KB - Virtual size: 604KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE