c:\buildslave\steam_rel_client_win32\build\src\SteamServiceHost\Release\SteamService_exe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-24_d2dfe36a39a3f22dd58e0e6c8ab94546_avoslocker_qakbot_revil.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-08-24_d2dfe36a39a3f22dd58e0e6c8ab94546_avoslocker_qakbot_revil.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-24_d2dfe36a39a3f22dd58e0e6c8ab94546_avoslocker_qakbot_revil
-
Size
3.1MB
-
MD5
d2dfe36a39a3f22dd58e0e6c8ab94546
-
SHA1
0361b64e166a0f565d4622691e377f6bbba67dbd
-
SHA256
a1c1f1694e943e004ba9c83b6a682db9bce083566148719c7de721919bf08504
-
SHA512
e67104c74c593615eaf6b5182db18ad6f32f14e721fdae7337bd0eef18d12d9eddf2b938bba3b6fed026aa6227d8a906043c8bcc369d6d55c7f4879a3a723a3b
-
SSDEEP
49152:EivP6omnmCpsGN1YtGXXwP/4EdC6g9jtPPI6x4VaWmoZkQ7LIhXTa3+p8DYRnuP:EivxGNSGnqwEdC6ypIxlm/GDOnuP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-08-24_d2dfe36a39a3f22dd58e0e6c8ab94546_avoslocker_qakbot_revil
Files
-
2024-08-24_d2dfe36a39a3f22dd58e0e6c8ab94546_avoslocker_qakbot_revil.exe windows:6 windows x86 arch:x86
8c2001fba1e0687be50eb1508d3823a6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetFileSize
GetFullPathNameW
RemoveDirectoryW
OutputDebugStringA
SetLastError
GetCurrentProcess
GetCurrentProcessId
ProcessIdToSessionId
GetVersionExA
GetModuleFileNameW
GlobalAlloc
GlobalUnlock
GlobalLock
CreateDirectoryW
WTSGetActiveConsoleSessionId
MultiByteToWideChar
CreateToolhelp32Snapshot
Process32First
Process32Next
InitializeCriticalSection
DeleteCriticalSection
SetEvent
ResetEvent
CreateEventA
WideCharToMultiByte
GetStdHandle
SetProcessAffinityMask
GetProcessHeaps
DebugBreak
ExpandEnvironmentStringsA
VerSetConditionMask
LocalFree
WriteConsoleW
GetStringTypeW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
DecodePointer
SetStdHandle
GetConsoleOutputCP
SetFilePointerEx
GetTimeZoneInformation
HeapReAlloc
GetTickCount
OpenProcess
TerminateProcess
GetConsoleWindow
SetConsoleTitleW
SetConsoleCtrlHandler
MoveFileExW
CopyFileW
Sleep
CreateMutexA
ReleaseMutex
OutputDebugStringW
WriteFile
SetFilePointer
SetFileAttributesW
ReadFile
GetFileInformationByHandle
GetFileAttributesExW
GetFileAttributesW
FindNextFileW
FindFirstFileW
FindClose
DeleteFileW
CreateFileW
GetCommandLineW
CreateProcessW
GetExitCodeProcess
WaitForSingleObject
CloseHandle
GetProcAddress
SetCurrentDirectoryW
ExpandEnvironmentStringsW
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetLastError
GetModuleHandleA
LeaveCriticalSection
EnterCriticalSection
GetCurrentThreadId
FindResourceA
LockResource
LoadResource
LoadLibraryExA
FreeLibrary
LoadLibraryA
VerifyVersionInfoW
LCMapStringW
CompareStringW
HeapFree
HeapAlloc
ExitProcess
HeapValidate
HeapSize
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
GetModuleHandleExW
GetLocalTime
VirtualQuery
EncodePointer
RtlUnwind
InitializeSListHead
GetStartupInfoW
IsProcessorFeaturePresent
UnhandledExceptionFilter
CreateEventW
SetUnhandledExceptionFilter
QueryPerformanceFrequency
QueryPerformanceCounter
GetCurrentDirectoryW
WaitForSingleObjectEx
SystemTimeToFileTime
GetSystemTime
ReadConsoleW
ReadConsoleA
SetConsoleMode
GetConsoleMode
ConvertFiberToThread
DeleteFiber
GetFileType
FindFirstFileExW
FlushFileBuffers
GetDiskFreeSpaceA
GetDriveTypeW
GetFileSizeEx
SetEndOfFile
SetFileTime
SleepEx
GetSystemTimeAsFileTime
GetModuleHandleW
LoadLibraryExW
LoadLibraryW
GlobalMemoryStatusEx
VirtualAlloc
VirtualProtect
GetModuleFileNameA
LocalAlloc
IsDebuggerPresent
GetCommandLineA
GetProcessHeap
HeapSetInformation
HeapLock
HeapUnlock
HeapWalk
HeapQueryInformation
GetSystemInfo
GetProcessAffinityMask
DuplicateHandle
RaiseException
InitializeCriticalSectionAndSpinCount
TryEnterCriticalSection
SwitchToThread
CreateThread
GetCurrentThread
OpenThread
TerminateThread
GetExitCodeThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetThreadAffinityMask
GetEnvironmentVariableW
user32
CloseClipboard
OpenClipboard
SetDlgItemTextA
GetDlgItemInt
SetClipboardData
GetProcessWindowStation
GetUserObjectInformationW
IsWindowVisible
EmptyClipboard
GetDesktopWindow
MessageBoxA
MessageBoxW
GetWindowTextLengthA
ShowWindow
GetWindowThreadProcessId
EnumWindows
GetWindowRect
SetDlgItemInt
wsprintfA
SetWindowPos
DialogBoxParamA
EndDialog
GetDlgItem
advapi32
ConvertStringSidToSidW
SetNamedSecurityInfoW
RegSetValueExW
RegQueryValueExW
RegEnumValueW
RegDeleteValueW
LookupPrivilegeValueA
SetTokenInformation
DuplicateTokenEx
AdjustTokenPrivileges
OpenProcessToken
CreateProcessAsUserW
SetEntriesInAclW
StartServiceW
StartServiceCtrlDispatcherW
SetServiceStatus
SetServiceObjectSecurity
RegisterServiceCtrlHandlerW
QueryServiceStatusEx
QueryServiceStatus
QueryServiceObjectSecurity
OpenServiceW
OpenSCManagerW
DeleteService
CreateServiceW
ControlService
CloseServiceHandle
ChangeServiceConfig2W
ChangeServiceConfigW
GetSecurityDescriptorDacl
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegSetValueExA
RegQueryValueExA
RegQueryInfoKeyA
RegOpenKeyExA
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegCreateKeyExA
RegCloseKey
DeregisterEventSource
RegisterEventSourceW
ReportEventW
shell32
SHGetFolderPathW
ShellExecuteW
CommandLineToArgvW
ole32
CoUninitialize
CoInitializeEx
CoCreateInstance
oleaut32
VariantClear
VariantInit
SysFreeString
SysAllocString
ws2_32
recv
send
WSASetLastError
WSAGetLastError
closesocket
gethostname
WSAStartup
WSACleanup
shlwapi
SHDeleteKeyA
wintrust
WinVerifyTrust
psapi
GetProcessMemoryInfo
GetModuleFileNameExW
bcrypt
BCryptGenRandom
Exports
Exports
CreateInterface
g_dwDllEntryThreadId
Sections
.text Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 595KB - Virtual size: 594KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 530KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 295KB - Virtual size: 295KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 636KB - Virtual size: 640KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE