C:\zoomcode\EP_2017\Bin\Release\NewInstaller.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-26_30bec0b5df94096de7c903f06cd25848_avoslocker.exe
Resource
win7-20240729-en
General
-
Target
2024-08-26_30bec0b5df94096de7c903f06cd25848_avoslocker
-
Size
1.2MB
-
MD5
30bec0b5df94096de7c903f06cd25848
-
SHA1
40bc959b6064685eb1ef7aeefaf5c4d04e950f24
-
SHA256
703e367b19c62ec0cc1b23bdb2186a40e491b009481c252e3beb45153984cf9c
-
SHA512
4634e2dc064b1042ba1a414f3d264c4b2d6ba8959ff60f5009417b5a3713c9afe7198626d651935f52edc2f50c5efe382caf526b904608710426df010d28641e
-
SSDEEP
24576:7QXKjIH9r6TEv13sI21nu34yFw2iyzGaaFpB2DVGZHxUEqWsK0l+4:UX2+92TEvBf2upFw2nGx3aVGWB+4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-08-26_30bec0b5df94096de7c903f06cd25848_avoslocker
Files
-
2024-08-26_30bec0b5df94096de7c903f06cd25848_avoslocker.exe windows:5 windows x86 arch:x86
b3449d392a0afad2f342aa1728445463
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
psapi
GetModuleBaseNameW
GetModuleFileNameExW
GetProcessImageFileNameW
EnumProcessModules
EnumProcesses
shlwapi
StrCmpNIW
PathFileExistsW
PathFileExistsA
PathRemoveFileSpecW
PathIsNetworkPathW
PathUnquoteSpacesW
PathAddBackslashW
PathIsPrefixW
PathAppendW
PathIsRelativeW
wintrust
WTHelperGetProvSignerFromChain
WTHelperProvDataFromStateData
WTHelperGetProvCertFromChain
WinVerifyTrust
crypt32
CertGetNameStringW
kernel32
OutputDebugStringW
CreateDirectoryA
WaitForSingleObject
RaiseException
DecodePointer
DeleteCriticalSection
GetCurrentThreadId
GetLocalTime
lstrlenW
FindFirstFileA
FindClose
GetVersionExW
MultiByteToWideChar
DeleteFileW
GetWindowsDirectoryA
WideCharToMultiByte
CreateDirectoryW
SetFileAttributesW
ReadFile
WriteFile
SetFilePointer
TlsSetValue
SetLastError
SetFileTime
LocalFileTimeToFileTime
FreeLibrary
TlsGetValue
DosDateTimeToFileTime
GetTickCount
TlsAlloc
TlsFree
GetModuleFileNameW
IsBadStringPtrW
IsBadReadPtr
CopyFileW
GetTempPathW
Sleep
MoveFileExW
CreateProcessW
GetTempFileNameW
SetDllDirectoryW
MoveFileW
ExpandEnvironmentStringsW
LocalFree
GetTempPathA
OpenMutexW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
FindFirstFileW
FindNextFileW
RemoveDirectoryW
TerminateProcess
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetConsoleMode
ReadConsoleW
GetConsoleCP
SetFilePointerEx
GetFileType
GetFullPathNameW
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
GetStdHandle
GetStartupInfoW
GetFileSizeEx
InitializeCriticalSectionAndSpinCount
GetSystemTimeAsFileTime
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
SetStdHandle
SetEndOfFile
HeapReAlloc
GetDriveTypeW
ExitProcess
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetStringTypeW
WriteConsoleW
GetCurrentDirectoryW
EncodePointer
HeapSize
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
QueryPerformanceCounter
InitializeSListHead
RtlUnwind
ExpandEnvironmentStringsA
OutputDebugStringA
GetModuleFileNameA
HeapAlloc
GetModuleHandleA
GetFileAttributesA
InitializeCriticalSectionEx
LoadLibraryExW
VerifyVersionInfoW
GetProcessHeap
VerSetConditionMask
LoadLibraryW
GetLastError
GetFileAttributesW
CreateFileW
HeapFree
GetProcessTimes
GetModuleHandleW
GetCurrentProcessId
GetProcAddress
GetWindowsDirectoryW
CloseHandle
Process32FirstW
Process32NextW
CreateToolhelp32Snapshot
OpenProcess
K32GetProcessImageFileNameW
GetCurrentProcess
QueryDosDeviceW
FindFirstFileExW
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
CreateMutexW
user32
ShowWindow
LoadCursorW
SetCursor
CopyRect
IntersectRect
GetSysColor
SetRect
PtInRect
SendMessageTimeoutW
EnumWindows
InflateRect
BeginPaint
wvsprintfW
SendMessageW
UnregisterClassW
GetWindowThreadProcessId
FindWindowW
DefWindowProcW
GetWindowRect
DestroyWindow
SetWindowPos
ReleaseDC
CreateWindowExW
RegisterClassExW
EndPaint
InvalidateRect
ReleaseCapture
GetClientRect
SetCapture
GetUpdateRect
GetDC
DrawEdge
IsRectEmpty
DrawTextW
CharNextW
LoadStringW
FillRect
TranslateMessage
DispatchMessageW
GetMessageW
OffsetRect
PostQuitMessage
IsWindow
SetTimer
LoadIconW
SystemParametersInfoW
GetParent
PostMessageW
GetWindowLongW
MessageBoxW
gdi32
SaveDC
CreateCompatibleBitmap
ExtSelectClipRgn
CreateCompatibleDC
SetTextColor
CreateRectRgnIndirect
GetClipBox
SelectObject
CreateFontIndirectW
CreateSolidBrush
MoveToEx
GetObjectW
Rectangle
CreatePen
LineTo
GetTextExtentPoint32W
TextOutW
GetTextMetricsW
GetStockObject
RestoreDC
SetBkColor
ExtTextOutW
SelectClipRgn
SetBkMode
GetObjectType
DeleteObject
advapi32
RegDeleteValueA
FreeSid
CheckTokenMembership
OpenProcessToken
DuplicateTokenEx
AllocateAndInitializeSid
RegOpenKeyExA
RegSetValueExA
GetUserNameW
RegUnLoadKeyW
RegLoadKeyW
ConvertSidToStringSidW
RegDeleteKeyW
RegEnumKeyExW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegDeleteValueW
RegQueryValueExW
RegCreateKeyA
RegCloseKey
RegQueryValueExA
shell32
ShellExecuteExW
SHFileOperationA
SHGetFolderPathA
SHFileOperationW
SHGetSpecialFolderPathA
SHGetSpecialFolderPathW
ShellExecuteW
SHChangeNotify
ole32
CoUninitialize
CoInitialize
CoCreateInstance
PropVariantClear
CoTaskMemAlloc
CoSetProxyBlanket
CoInitializeSecurity
CoInitializeEx
oleaut32
SysAllocString
SysFreeString
VariantInit
VariantChangeType
VariantClear
Sections
.text Size: 406KB - Virtual size: 405KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 135KB - Virtual size: 135KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 133KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 592KB - Virtual size: 596KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE