C:\assemblage\Builds\2932309867006176165vtxvxpxhvu\EvilLockLib-main\EvilLock\assemblage_outdir_bin\EvilLock.pdb
Static task
static1
Behavioral task
behavioral1
Sample
5bf70fd27c76d4354adc26f5860b4d0a1014cb764a867680fe7217179a3bdac6.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5bf70fd27c76d4354adc26f5860b4d0a1014cb764a867680fe7217179a3bdac6.dll
Resource
win10v2004-20240802-en
General
-
Target
5bf70fd27c76d4354adc26f5860b4d0a1014cb764a867680fe7217179a3bdac6
-
Size
104KB
-
MD5
059d8f3e498d31d5e628553426ea9d1b
-
SHA1
5cfe029b4cb82cdfc8153fd8d57df925b98879b5
-
SHA256
5bf70fd27c76d4354adc26f5860b4d0a1014cb764a867680fe7217179a3bdac6
-
SHA512
beb61f5403f0c1d907b69fdf7a9bb3375ef95c0eb2cda8cb68e7a0f39b21d15987752c0f781bebea924a9efadedd1cc799574e03530357ea872b0bd831654735
-
SSDEEP
3072:BqkJz16oXArRjW6NYSlQIhAoVc4IajIp:dJMJoiC4Iak
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5bf70fd27c76d4354adc26f5860b4d0a1014cb764a867680fe7217179a3bdac6
Files
-
5bf70fd27c76d4354adc26f5860b4d0a1014cb764a867680fe7217179a3bdac6.dll windows:6 windows x86 arch:x86
3832eca003944444768458a115bd8df5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetCurrentProcessId
QueryPerformanceCounter
GetSystemTimeAsFileTime
TerminateProcess
SetUnhandledExceptionFilter
DisableThreadLibraryCalls
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
Sleep
GetModuleHandleW
WideCharToMultiByte
LocalFree
RaiseException
HeapAlloc
HeapFree
GetProcessHeap
MultiByteToWideChar
EnumResourceNamesA
GetTickCount
GetCurrentThreadId
Process32Next
Process32First
CreateToolhelp32Snapshot
LoadLibraryA
GetProcAddress
FreeLibrary
OpenProcess
GetCurrentProcess
SetVolumeMountPointW
GetSystemDirectoryA
DeviceIoControl
GetLastError
CloseHandle
IsProcessorFeaturePresent
CreateFileA
UnhandledExceptionFilter
VirtualQuery
user32
GetDesktopWindow
GetCursorPos
SetWindowsHookExA
LockWindowUpdate
LoadIconA
ReleaseDC
GetWindowDC
GetDCEx
GetDC
ExitWindowsEx
GetSystemMetrics
DrawIcon
UnhookWindowsHookEx
CallNextHookEx
MessageBoxA
gdi32
CreateSolidBrush
TextOutA
CreateDIBSection
SetTextColor
SetStretchBltMode
StretchBlt
SetBkMode
SelectObject
PatBlt
PlgBlt
DeleteObject
DeleteDC
CreateFontA
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
advapi32
GetUserNameA
OpenSCManagerA
CreateServiceA
CloseServiceHandle
RegSetValueExA
RegOpenKeyExA
RegCloseKey
CreateProcessWithTokenW
LookupPrivilegeValueA
GetTokenInformation
DuplicateTokenEx
AdjustTokenPrivileges
OpenProcessToken
ole32
CoInitializeEx
CoCreateInstance
CoUninitialize
oleaut32
VariantClear
VariantInit
SetErrorInfo
SysAllocStringByteLen
SysStringLen
SysFreeString
SysAllocString
CreateErrorInfo
VariantChangeType
GetErrorInfo
msvcp140d
?_Random_device@std@@YAIXZ
?_Xlength_error@std@@YAXPBD@Z
??1_Lockit@std@@QAE@XZ
??0_Lockit@std@@QAE@H@Z
_Cnd_do_broadcast_at_thread_exit
?_Throw_Cpp_error@std@@YAXH@Z
?_Throw_C_error@std@@YAXH@Z
_Thrd_detach
netapi32
NetLocalGroupAddMembers
NetUserSetInfo
NetUserAdd
vcruntime140d
__vcrt_GetModuleFileNameW
__vcrt_GetModuleHandleW
__vcrt_LoadLibraryExW
__std_exception_copy
_except_handler4_common
__current_exception_context
__current_exception
memset
memmove
memcpy
__std_exception_destroy
__CxxFrameHandler3
_CxxThrowException
__std_type_info_destroy_list
ucrtbased
_initialize_onexit_table
_register_onexit_function
_execute_onexit_table
_crt_atexit
_crt_at_quick_exit
_cexit
wcslen
strlen
_initialize_narrow_environment
_configure_narrow_argv
_seh_filter_dll
_free_dbg
_initterm_e
_initterm
_callnewh
_libm_sse2_sin_precise
_beginthreadex
terminate
_time64
rand
srand
_stricmp
_errno
_invalid_parameter_noinfo
__stdio_common_vsnprintf_s
__stdio_common_vsprintf
__stdio_common_vswprintf_s
__stdio_common_vswprintf
_CrtDbgReport
malloc
_CrtDbgReportW
strcpy_s
strcat_s
__stdio_common_vsprintf_s
_wmakepath_s
_wsplitpath_s
wcscpy_s
free
strerror
_invalid_parameter
_libm_sse2_cos_precise
Exports
Exports
BlueScreen
CreateInSystem
CreateRandomWindows
CurrentUser
DisableUserAccount
DiskSectorIO
DrawIconOnMouse
GetCurrentUsername
GetPartitiontype
GetPhysicalDriveHandle
GetPhysicalDriveNumber
GetPrivileges
GetProcessPermission
GetSystemDiskPhysicalNumber
HuaPing1
HuaPing2
HuaPing3
HuaPing4
ITaskToStartup
MessageBoxPos
MoveScreen
NetUserAddAdmin
RandIconOnScreen
RandomBlocks
RandomTextOut
RenameUserAccount
RootKeyAddStartup
SCSISectorIO
ScreenChannel
ScreenFlicker
ScreenFreeze
ScreenRotation
ScreenShake
ScreenZoom
ServiceAddStartup
SetDriveLetterToEFI
shutdown_
Sections
.textbss Size: - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.msvcjmc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.00cfg Size: 512B - Virtual size: 270B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ