C:\jenkins\workspace\client.utility.iq_utils\build\iqtray\Release\iqtray.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-24_c456d09c8bbf0d16bc9c0bfb1252b0ae_avoslocker.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-08-24_c456d09c8bbf0d16bc9c0bfb1252b0ae_avoslocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-24_c456d09c8bbf0d16bc9c0bfb1252b0ae_avoslocker
-
Size
1.6MB
-
MD5
c456d09c8bbf0d16bc9c0bfb1252b0ae
-
SHA1
b4af9f1adee2fbbf95c015f99c7bbcc5c7872267
-
SHA256
adb667c5d5905e6e45092306aedbdc2f7e96f2ecb00bbdf443bacd1816d2e949
-
SHA512
b537184fe8f3dc647883d93933d096d680169c8bb9495add290f48e98f002a9d5209531e27f11af43d9559cb85fbca684e6b607bab703f8c4f1dae56ccd8e2b4
-
SSDEEP
49152:bpTEuMEnhaTKfsADqO3TAo21OUAQgAT76sQuE:bxEQgTKEAWO8o3qGsQr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-08-24_c456d09c8bbf0d16bc9c0bfb1252b0ae_avoslocker
Files
-
2024-08-24_c456d09c8bbf0d16bc9c0bfb1252b0ae_avoslocker.exe windows:5 windows x86 arch:x86
0aff55442a5a25e5fe49e882f035ee03
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ws2_32
freeaddrinfo
setsockopt
send
select
listen
htonl
getsockname
connect
closesocket
bind
socket
WSAGetLastError
getpeername
getsockopt
htons
ntohs
WSASetLastError
WSAIoctl
WSAStartup
WSACleanup
__WSAFDIsSet
ioctlsocket
getaddrinfo
recv
accept
wintrust
WinVerifyTrust
shlwapi
PathFileExistsW
crypt32
CertAddCertificateContextToStore
CertFreeCertificateChain
CertOpenStore
CertCloseStore
CertEnumCertificatesInStore
CertFindCertificateInStore
CertFreeCertificateContext
CryptStringToBinaryA
CertFreeCertificateChainEngine
CertGetNameStringA
CryptQueryObject
CertCreateCertificateChainEngine
CertGetCertificateChain
kernel32
GetCommandLineW
GetCommandLineA
GetCurrentThreadId
LocalAlloc
LocalFree
FormatMessageW
GetFileAttributesW
OutputDebugStringA
GetLastError
Sleep
GetCurrentProcessId
GetDynamicTimeZoneInformation
WideCharToMultiByte
FindClose
FindFirstFileW
FindNextFileW
CloseHandle
SetLastError
CreateEventW
CreateProcessW
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetProcAddress
LoadLibraryW
MultiByteToWideChar
GetLocaleInfoW
GetLocaleInfoA
GetUserDefaultLCID
DeleteFileW
EncodePointer
DecodePointer
RaiseException
ReleaseSRWLockExclusive
ReleaseSRWLockShared
AcquireSRWLockExclusive
AcquireSRWLockShared
InitOnceExecuteOnce
FormatMessageA
GetCurrentProcess
GetSystemPowerStatus
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
GetEnvironmentStringsW
SleepEx
VerSetConditionMask
QueryPerformanceFrequency
GetSystemDirectoryA
FreeLibrary
LoadLibraryA
VerifyVersionInfoA
QueryPerformanceCounter
GetTickCount
WaitForSingleObjectEx
ExpandEnvironmentStringsA
CreateFileA
GetFileSizeEx
ReadFile
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetFullPathNameW
GetCurrentDirectoryW
SetStdHandle
SetFilePointerEx
FlushFileBuffers
HeapReAlloc
GetTimeZoneInformation
EnumSystemLocalesW
IsValidLocale
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
HeapFree
HeapAlloc
GetConsoleOutputCP
ReadConsoleW
GetConsoleMode
WriteFile
GetStdHandle
ExitProcess
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
CreateThread
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
GetFileType
GetFileInformationByHandle
GetDriveTypeW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetProcessHeap
GetFileAttributesExW
SetEndOfFile
HeapSize
WriteConsoleW
DeleteCriticalSection
CreateFileW
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
RtlUnwind
GetStringTypeW
LCMapStringEx
GetCPInfo
GetSystemInfo
VirtualProtect
VirtualQuery
LoadLibraryExA
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetSystemTimeAsFileTime
InitializeSListHead
InitializeSRWLock
TryAcquireSRWLockExclusive
GetExitCodeThread
InitializeConditionVariable
WakeConditionVariable
WakeAllConditionVariable
SleepConditionVariableSRW
user32
RegisterClassExW
PostQuitMessage
DefWindowProcW
PostMessageW
SendMessageW
CreatePopupMenu
AppendMenuW
TrackPopupMenu
CreateWindowExW
MessageBoxA
GetCursorPos
FindWindowW
EnumWindows
GetClassNameW
DispatchMessageW
TranslateMessage
LoadIconW
IsIconic
SetForegroundWindow
GetMessageW
ShowWindow
shell32
Shell_NotifyIconW
SHGetKnownFolderPath
ShellExecuteW
SHGetFolderPathW
ole32
StringFromCLSID
CoCreateGuid
CoTaskMemFree
CoUninitialize
CoRegisterClassObject
CoRevokeClassObject
CoResumeClassObjects
CoAddRefServerProcess
CoReleaseServerProcess
CoCreateInstance
CoInitializeEx
oleaut32
SysFreeString
SysAllocString
VariantClear
advapi32
CryptGetHashParam
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGenRandom
CryptReleaseContext
CryptAcquireContextA
RegGetValueW
RegDeleteTreeW
RegSetKeyValueW
Sections
.text Size: 738KB - Virtual size: 737KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 286KB - Virtual size: 285KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 29KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 600KB - Virtual size: 604KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE