D:\C++\New\Release\New.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-09_e05797e2cb05d530bb3c9c99387654c6_avoslocker_mafia.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-07-09_e05797e2cb05d530bb3c9c99387654c6_avoslocker_mafia.exe
Resource
win10v2004-20240704-en
General
-
Target
2024-07-09_e05797e2cb05d530bb3c9c99387654c6_avoslocker_mafia
-
Size
2.8MB
-
MD5
e05797e2cb05d530bb3c9c99387654c6
-
SHA1
64f0f3a4a84be0ab8c956fc6dc612125429f22ae
-
SHA256
4079d78d9c5dcef26b36f1f897a921a1d782dfe9b600032fcba52ef32f814385
-
SHA512
f3df1875163966ba09cc5b14c417595de42665e1af50bbc3536f77fce27df9d1552534814cb7fe503cb65b380b2683f814375c11fce91bc4825a2754bc99de95
-
SSDEEP
49152:hMkF6FtVhKtH8VjCUX1vXXvq5G8Ttfj7ukmjIkm0ktCfPB48EZORgpAC2lgmtCP:GFtVhKBgOUX5X2NTtfukm0X0ktCfQZOP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-07-09_e05797e2cb05d530bb3c9c99387654c6_avoslocker_mafia
Files
-
2024-07-09_e05797e2cb05d530bb3c9c99387654c6_avoslocker_mafia.exe windows:6 windows x86 arch:x86
a14ec2914abbb7f5caf71959e1be8326
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCPInfo
SetErrorMode
FileTimeToLocalFileTime
GetFileAttributesExA
GetFileSizeEx
GetFileTime
SystemTimeToTzSpecificLocalTime
GetTickCount
ResetEvent
WaitForSingleObjectEx
CreateEventW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
GetOEMCP
VirtualProtect
WriteConsoleW
ReadConsoleW
GetConsoleOutputCP
SetFilePointerEx
CreateFileW
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
IsValidCodePage
FindNextFileW
FindFirstFileExW
GetTimeZoneInformation
GetStringTypeW
GetFileAttributesExW
GetFileType
LCMapStringW
GetStdHandle
ExitProcess
HeapQueryInformation
GetModuleHandleExW
GetCommandLineW
GetCommandLineA
VirtualQuery
VirtualAlloc
GetSystemInfo
RtlUnwind
OutputDebugStringW
FileTimeToSystemTime
GetVolumeInformationA
GetCurrentProcess
DuplicateHandle
UnlockFile
SetFilePointer
SetEndOfFile
ReadFile
LockFile
GetFullPathNameA
GetFileSize
FlushFileBuffers
FindFirstFileA
FindClose
GetThreadLocale
DeleteFileA
GlobalFlags
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
GetLocaleInfoW
CompareStringW
LocalReAlloc
LocalAlloc
GlobalHandle
GlobalReAlloc
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSection
GlobalGetAtomNameA
GlobalFindAtomA
LoadLibraryA
lstrcmpW
GetSystemDirectoryW
EncodePointer
GetCurrentProcessId
GlobalAddAtomA
SetEvent
WritePrivateProfileStringA
GetPrivateProfileStringA
GetPrivateProfileIntA
FreeResource
CompareStringA
lstrcmpA
GlobalDeleteAtom
LoadLibraryExW
GetModuleFileNameA
FreeLibrary
GetVersionExA
GetCurrentThreadId
GetCurrentThread
FormatMessageA
MulDiv
LocalFree
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
LoadLibraryW
GetProcAddress
GetModuleHandleW
GetModuleHandleA
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
SetLastError
GetACP
GetProcessHeap
DeleteCriticalSection
DecodePointer
HeapAlloc
RaiseException
HeapReAlloc
HeapSize
InitializeCriticalSectionEx
LeaveCriticalSection
EnterCriticalSection
HeapFree
FindResourceW
LockResource
WideCharToMultiByte
GetLastError
Sleep
GetFileAttributesA
Process32Next
Process32First
CreateToolhelp32Snapshot
CloseHandle
WriteFile
SizeofResource
LoadResource
FindResourceA
CreateFileA
CreateDirectoryA
OutputDebugStringA
GetLocalTime
GetConsoleMode
MultiByteToWideChar
user32
CharUpperA
MessageBeep
GetNextDlgGroupItem
IsRectEmpty
IntersectRect
SetRect
InvalidateRgn
CopyAcceleratorTableA
CharNextA
InvalidateRect
KillTimer
SetTimer
RealChildWindowFromPoint
ReleaseCapture
SetCapture
LoadCursorA
GetSysColorBrush
IsDialogMessageA
SetWindowTextA
MoveWindow
ShowWindow
ClientToScreen
ReleaseDC
GetWindowDC
GetDC
TabbedTextOutA
GrayStringA
DrawTextExA
DrawTextA
GetMonitorInfoA
WinHelpA
LoadIconA
GetTopWindow
GetClassNameA
GetClassLongA
SetWindowLongA
PtInRect
EqualRect
MapWindowPoints
ScreenToClient
AdjustWindowRectEx
GetWindowRect
MessageBoxA
LoadIconW
GetSystemMenu
AppendMenuA
GetWindowTextA
RemovePropA
GetPropA
SetPropA
GetScrollPos
RedrawWindow
EndPaint
BeginPaint
SetForegroundWindow
GetForegroundWindow
UpdateWindow
RegisterClipboardFormatA
MonitorFromWindow
SendMessageA
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
EnableWindow
UnregisterClassA
SendDlgItemMessageA
SetRectEmpty
OffsetRect
GetParent
GetSubMenu
GetMenuItemID
GetMenuItemCount
PostMessageA
PostQuitMessage
SetWindowPos
SetWindowContextHelpId
GetWindow
MapDialogRect
IsWindow
DestroyWindow
CreateDialogIndirectParamA
EndDialog
GetDlgItem
GetNextDlgTabItem
GetActiveWindow
IsWindowEnabled
SetActiveWindow
GetWindowLongA
GetDesktopWindow
GetFocus
CheckMenuItem
EnableMenuItem
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
SetMenuItemInfoA
PostThreadMessageA
SetMenu
GetMenu
GetCapture
SetFocus
GetDlgCtrlID
EndDeferWindowPos
DeferWindowPos
BeginDeferWindowPos
IsChild
IsMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
CallWindowProcA
DefWindowProcA
GetMessageTime
GetMessagePos
RegisterWindowMessageA
CopyRect
GetSysColor
DestroyMenu
UnhookWindowsHookEx
GetLastActivePopup
GetWindowThreadProcessId
SetCursor
CallNextHookEx
SetWindowsHookExA
GetCursorPos
ValidateRect
GetKeyState
IsWindowVisible
PeekMessageA
DispatchMessageA
TranslateMessage
GetMessageA
LoadBitmapW
gdi32
SetViewportExtEx
SetViewportOrgEx
SetWindowExtEx
OffsetViewportOrgEx
ScaleViewportExtEx
ScaleWindowExtEx
GetBkColor
GetTextColor
CreateRectRgnIndirect
GetRgnBox
GetMapMode
TextOutA
SetTextColor
SetMapMode
SelectObject
ExtSelectClipRgn
SaveDC
RestoreDC
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
GetStockObject
GetClipBox
Escape
DeleteObject
DeleteDC
GetDeviceCaps
CreateBitmap
GetObjectA
ExtTextOutA
SetBkColor
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegEnumKeyA
RegEnumValueA
RegQueryValueA
RegCloseKey
RegSetValueExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegQueryValueExA
RegOpenKeyExA
shell32
ShellExecuteA
SHGetSpecialFolderPathA
comctl32
InitCommonControlsEx
shlwapi
PathFindFileNameA
PathStripToRootA
PathIsUNCA
PathFindExtensionA
ole32
OleInitialize
CoFreeUnusedLibraries
CreateILockBytesOnHGlobal
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CoGetClassObject
CLSIDFromProgID
CLSIDFromString
OleUninitialize
CoTaskMemFree
StringFromCLSID
CoUninitialize
CoCreateInstance
CoInitialize
CoRevokeClassObject
OleFlushClipboard
OleIsCurrentClipboard
CoRegisterMessageFilter
CoCreateGuid
CoTaskMemAlloc
oleaut32
SysAllocStringByteLen
VariantChangeType
SysStringLen
OleCreateFontIndirect
SystemTimeToVariantTime
VariantTimeToSystemTime
SafeArrayDestroy
SysAllocStringLen
VariantCopy
SysAllocString
SysFreeString
VariantClear
VariantInit
oledlg
ord8
setupapi
SetupDiClassNameFromGuidA
SetupDiGetDeviceInstanceIdA
SetupDiSetClassInstallParamsA
SetupDiChangeState
SetupDiGetClassDevsA
SetupDiDestroyDeviceInfoList
SetupDiEnumDeviceInfo
oleacc
CreateStdAccessibleObject
LresultFromObject
Sections
.text Size: 277KB - Virtual size: 276KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 83KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.giats Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.4MB - Virtual size: 2.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ