D:\a\sumatrapdf\sumatrapdf\out\rel32\SumatraPDF-dll.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-06_5d1592c3e4921d24ab52173cd3a70f9b_avoslocker_floxif.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-08-06_5d1592c3e4921d24ab52173cd3a70f9b_avoslocker_floxif.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-06_5d1592c3e4921d24ab52173cd3a70f9b_avoslocker_floxif
-
Size
8.8MB
-
MD5
5d1592c3e4921d24ab52173cd3a70f9b
-
SHA1
f2e3888dda411cb84b2ceae37e6b43e0ca45e39a
-
SHA256
67ff2e5ad628b413a144e8c9dae6636ce5074337fbd4d2cccd61df1d8a4fef0d
-
SHA512
62e96d4de1c1ea3fd2fdd38af1c7e28551bb6ec86cdc5070827c161802bbf56c0c11e97bf7549f85fb390cc1a9990f42f0968d622bed36785964ba82a75076ca
-
SSDEEP
98304:ScEStDHUbQNZxeO+VSsruFuJmfgNJuPzJP3FkF4whUcgy9R3r0jmhABEipiq:Jjl0bQNxaVH2zR3Fk3p19R3rSBEipiq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-08-06_5d1592c3e4921d24ab52173cd3a70f9b_avoslocker_floxif
Files
-
2024-08-06_5d1592c3e4921d24ab52173cd3a70f9b_avoslocker_floxif.exe windows:6 windows x86 arch:x86
b6c45781afd2b3292c6e7677d76e0142
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
ImageList_EndDrag
InitCommonControlsEx
ImageList_BeginDrag
ImageList_DragMove
ImageList_DragEnter
ImageList_DragShowNolock
ImageList_Create
ImageList_AddMasked
ord412
ord410
ord413
ImageList_Destroy
CreatePropertySheetPageW
ImageList_GetIconSize
ImageList_Draw
kernel32
GetCurrentDirectoryW
GetEnvironmentVariableW
OutputDebugStringA
GetStdHandle
SetConsoleScreenBufferSize
GetConsoleScreenBufferInfo
ReadDirectoryChangesW
QueueUserAPC
ResetEvent
WaitForMultipleObjectsEx
CreateThread
GetSystemInfo
HeapReAlloc
SetEvent
CreateEventW
CreateToolhelp32Snapshot
GetLocaleInfoA
GetVersionExW
GetCurrentThreadId
WaitForSingleObject
GetEnvironmentVariableA
TerminateProcess
GetCurrentProcess
HeapFree
HeapCreate
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
AreFileApisANSI
IsDBCSLeadByte
TzSpecificLocalTimeToSystemTime
FoldStringW
SetThreadPriority
DeviceIoControl
RemoveDirectoryW
CreateHardLinkW
MoveFileW
LoadLibraryExA
VirtualProtect
DecodePointer
WriteConsoleW
SetEndOfFile
GetModuleHandleW
HeapSize
GetProcessHeap
ReleaseSemaphore
SetEnvironmentVariableW
FreeEnvironmentStringsW
FindNextFileW
GetCommandLineA
GetCPInfo
GetOEMCP
IsValidCodePage
FindFirstFileExW
ReadConsoleW
SetFilePointerEx
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
SetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
LCMapStringW
CompareStringW
GetModuleHandleExW
SetConsoleCtrlHandler
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
GetFileType
EncodePointer
LoadLibraryExW
RtlUnwind
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SetLastError
GetStartupInfoW
IsDebuggerPresent
InitializeSListHead
WaitForSingleObjectEx
InitializeCriticalSectionAndSpinCount
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetFilePointer
GetExitCodeProcess
GetACP
LocalFileTimeToFileTime
FileTimeToDosDateTime
FileTimeToLocalFileTime
RaiseException
OutputDebugStringW
WideCharToMultiByte
OpenThread
VirtualQuery
GetThreadContext
GetCurrentThread
GetModuleHandleA
GetProcessAffinityMask
CreateSemaphoreW
HeapAlloc
Module32FirstW
HeapDestroy
GetCurrentProcessId
GlobalMemoryStatusEx
SetCurrentDirectoryW
DeleteFileW
GetTempPathW
GetUserDefaultUILanguage
MapViewOfFile
CreateFileMappingW
LoadLibraryW
UnmapViewOfFile
SetErrorMode
GetFullPathNameW
GetDateFormatW
GetTimeFormatW
MoveFileExW
LocalFree
FormatMessageW
SetFileAttributesW
GetFileAttributesW
FindResourceW
LoadResource
LockResource
SizeofResource
SetThreadExecutionState
GlobalAddAtomW
GlobalDeleteAtom
GetTickCount
GlobalUnlock
GlobalLock
GlobalFree
GlobalAlloc
GetSystemTime
CopyFileW
ExitProcess
GetCommandLineW
Process32FirstW
Process32NextW
OpenProcess
GetLastError
GetStringTypeW
FindClose
ResumeThread
CompareFileTime
SuspendThread
Thread32First
Thread32Next
GetModuleFileNameA
FindFirstFileW
GetWindowsDirectoryW
GetSystemDirectoryW
SetUnhandledExceptionFilter
GetEnvironmentStringsW
MulDiv
QueryPerformanceCounter
QueryPerformanceFrequency
GetLogicalDrives
CancelIo
GetFileTime
GetDriveTypeW
GetTempFileNameW
GetFileAttributesExW
GetFileInformationByHandle
CreateFileW
GetVolumePathNameW
GetModuleFileNameW
SetFileTime
AllocConsole
FormatMessageA
VerifyVersionInfoW
FreeLibrary
CreateProcessW
VerSetConditionMask
GetPrivateProfileIntW
GetShortPathNameW
WriteFile
GetLongPathNameW
GetSystemTimeAsFileTime
SystemTimeToFileTime
CloseHandle
Sleep
Module32NextW
GetTimeZoneInformation
GetLocaleInfoW
MultiByteToWideChar
CreateDirectoryW
ReadFile
GetFileSizeEx
WritePrivateProfileStringW
GetProcAddress
user32
GetSysColor
SystemParametersInfoW
GetSystemMetrics
CreateAcceleratorTableW
GetWindowInfo
SendMessageW
OemToCharA
PostMessageW
EndPaint
BeginPaint
ReleaseDC
IsIconic
LoadAcceleratorsW
GetCursorPos
CharLowerW
CopyImage
HideCaret
SetClassLongW
ShowCaret
IsCharAlphaNumericW
ValidateRect
GetUpdateRect
GetWindowThreadProcessId
GetMessageW
AllowSetForegroundWindow
FindWindowExW
LoadBitmapW
TranslateAcceleratorW
SetParent
MapVirtualKeyW
ScreenToClient
IsWindow
CharLowerBuffW
GetAncestor
IsCharUpperW
GetWindow
CheckRadioButton
EndDialog
SetDlgItemTextW
SendDlgItemMessageW
DialogBoxIndirectParamW
IsDlgButtonChecked
CheckDlgButton
DialogBoxParamW
SetActiveWindow
MoveWindow
GetFocus
OpenClipboard
CloseClipboard
EmptyClipboard
GetWindowTextLengthW
ReuseDDElParam
ShowWindowAsync
IsWindowUnicode
UnpackDDElParam
LoadCursorW
DrawTextW
ModifyMenuW
CheckMenuRadioItem
GetMenuItemID
GetMenu
SetMenuItemInfoW
SetMenu
DrawTextExW
InsertMenuW
AppendMenuA
MsgWaitForMultipleObjects
DispatchMessageW
IsDialogMessageW
PeekMessageW
MessageBoxA
TranslateMessage
GetDlgItem
PostQuitMessage
EnableWindow
MessageBeep
GetDesktopWindow
UpdateWindow
MessageBoxW
CreateMenu
BringWindowToTop
LoadIconW
SetForegroundWindow
DdeFreeStringHandle
DdeDisconnect
CheckMenuItem
SetClipboardData
EndDeferWindowPos
DdeFreeDataHandle
DdeClientTransaction
DdeUninitialize
DdeInitializeW
TrackMouseEvent
ClientToScreen
GetMonitorInfoW
ReleaseCapture
DdeConnect
DdeCreateStringHandleW
BeginDeferWindowPos
EnumDisplayMonitors
MonitorFromWindow
MonitorFromRect
GetKeyState
AdjustWindowRectEx
DeferWindowPos
SetLayeredWindowAttributes
IsWindowEnabled
WindowFromDC
GetMessagePos
SetPropW
RemovePropW
GetPropW
PtInRect
DrawTextA
wsprintfA
DestroyWindow
GetWindowLongW
GetMenuItemInfoW
GetSystemMenu
CallWindowProcW
GetWindowRect
IsWindowVisible
SetWindowPos
GetMenuItemCount
CreateWindowExW
CreatePopupMenu
KillTimer
RegisterClassExW
TrackPopupMenu
ShowWindow
InvalidateRgn
OffsetRect
RedrawWindow
MapWindowPoints
SetMenuDefaultItem
GetForegroundWindow
DestroyMenu
FindWindowW
GetWindowDC
SetWindowLongW
TrackPopupMenuEx
RemoveMenu
GetClientRect
IsZoomed
AppendMenuW
GetClassLongW
DrawIconEx
EnableMenuItem
DrawEdge
GetParent
DrawFrameControl
CharToOemBuffW
CharUpperW
OemToCharBuffA
InvalidateRect
SetScrollInfo
DefWindowProcW
ShowScrollBar
GetDC
FillRect
GetCursor
GetScrollInfo
GetScrollPos
GetCapture
SetTimer
SetFocus
SetCapture
SetCursor
CharToOemA
gdi32
SetDIBitsToDevice
ExtTextOutW
CreatePatternBrush
CreateBitmap
GetObjectW
GetObjectA
IntersectClipRect
SetWorldTransform
CreateDIBSection
SetLayout
CreateRoundRectRgn
TextOutW
GetTextExtentPoint32W
SelectClipRgn
RoundRect
BitBlt
StartPage
AbortDoc
EndDoc
CreateDCW
SetMapMode
StartDocW
EndPage
GetDeviceCaps
LineTo
MoveToEx
SetBkColor
SetBkMode
CreateFontIndirectW
GetClipBox
CreateRectRgn
SetViewportOrgEx
ExcludeClipRect
ExtSelectClipRgn
SetBrushOrgEx
SelectObject
CreateCompatibleDC
PatBlt
StretchBlt
GetStockObject
DeleteDC
SetTextColor
CreatePen
Rectangle
DeleteObject
CreateSolidBrush
GetTextMetricsA
SetStretchBltMode
SetDIBits
GetDIBits
SetGraphicsMode
SetDIBColorTable
GetDIBColorTable
CreateCompatibleBitmap
SetROP2
GetTextMetricsW
CreateFontIndirectA
GetClipRgn
winspool.drv
DeviceCapabilitiesW
EnumPrintersW
ClosePrinter
DocumentPropertiesW
GetPrinterW
OpenPrinterW
ord203
comdlg32
GetSaveFileNameW
PrintDlgExW
CommDlgExtendedError
GetOpenFileNameW
advapi32
InitializeSecurityDescriptor
SetFileSecurityW
LookupPrivilegeValueW
AdjustTokenPrivileges
OpenProcessToken
RegOpenKeyA
RegEnumKeyW
CryptAcquireContextW
CryptCreateHash
CryptHashData
CryptDestroyHash
CryptGetHashParam
CryptReleaseContext
SetSecurityDescriptorDacl
RegCloseKey
RegQueryInfoKeyW
RegOpenKeyExW
AllocateAndInitializeSid
RegQueryValueExW
CheckTokenMembership
FreeSid
RegSetKeySecurity
RegCreateKeyExW
shell32
SHGetMalloc
DragFinish
SHGetPathFromIDListW
SHFileOperationW
SHGetFileInfoW
SHBindToParent
ShellExecuteExW
SHGetDesktopFolder
SHChangeNotify
DragAcceptFiles
SHAddToRecentDocs
SHGetFolderPathW
SHBrowseForFolderW
DragQueryPoint
DragQueryFileW
ole32
ReleaseStgMedium
CreateStreamOnHGlobal
CoTaskMemFree
CoUninitialize
CoInitialize
CoGetMalloc
CoCreateInstance
OleUninitialize
OleInitialize
CoTaskMemAlloc
oleaut32
SafeArrayCreateVector
SafeArrayPutElement
SysFreeString
VariantClear
VariantInit
SysAllocString
Sections
.text Size: 1.9MB - Virtual size: 1.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 701KB - Virtual size: 700KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.6MB - Virtual size: 2.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
_RDATA Size: 512B - Virtual size: 48B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4.4MB - Virtual size: 4.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 131KB - Virtual size: 130KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ