C:\dvs\p4\build\sw\gcomp\rel\src\NvContainer\_out\x86\release\container\NvContainerInternal.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-27_91a2f9569facb90961495ea7743d570f_avoslocker.exe
Resource
win7-20240704-en
General
-
Target
2024-08-27_91a2f9569facb90961495ea7743d570f_avoslocker
-
Size
1.0MB
-
MD5
91a2f9569facb90961495ea7743d570f
-
SHA1
a252d153d3a90f66781345c90a5ee0cdb2b95162
-
SHA256
bb927a250f19167d7d8ebb47d4366c60aabcc7cd1fbf1dad2c6cff10291bf7c2
-
SHA512
f1292db9cea63437b21fb791a7898a805348e4f20e7d9385109f4135e7c3f697b51626fbded6e1a42669c878a50886de7cd0fb9631138979bbedee90e66de0a4
-
SSDEEP
24576:wIVcd9TcpFwYNFZkdFjT4kGBFm6h+BJzlNa9f3GkbkXw:BcjXuZkT16h+BJRNa9f3aXw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 2024-08-27_91a2f9569facb90961495ea7743d570f_avoslocker
Files
-
2024-08-27_91a2f9569facb90961495ea7743d570f_avoslocker.exe windows:6 windows x86 arch:x86
146ee1d872db11b8fb936b73c7b935a2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shlwapi
PathIsRelativeW
kernel32
LocalAlloc
LocalFree
GetCurrentDirectoryW
SetLastError
GetErrorMode
SetErrorMode
FreeLibrary
LoadLibraryExW
LoadLibraryW
VerSetConditionMask
ExpandEnvironmentStringsW
CreateFileW
GetFileAttributesW
GetFullPathNameW
CreateProcessA
CreateProcessW
GetSystemDirectoryW
GetModuleFileNameA
GetModuleFileNameW
lstrcmpW
VerifyVersionInfoW
DeleteFileW
FindClose
FindFirstFileW
FindNextFileW
OutputDebugStringA
Sleep
GetCurrentThreadId
ProcessIdToSessionId
GetSystemTime
GetSystemTimeAsFileTime
CreateTimerQueueTimer
DeleteTimerQueueTimer
GetModuleHandleExW
GetCurrentProcessId
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
CreateDirectoryW
FindCloseChangeNotification
FindFirstChangeNotificationW
FindNextChangeNotification
MultiByteToWideChar
WideCharToMultiByte
RemoveDirectoryW
DeviceIoControl
VirtualProtect
GetSystemInfo
WriteConsoleW
HeapSize
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
OutputDebugStringW
GetStringTypeW
DecodePointer
HeapReAlloc
ReadConsoleW
ReadFile
SetStdHandle
GetFileSizeEx
GetConsoleMode
GetConsoleOutputCP
GetLastError
GetProcAddress
GetModuleHandleA
RemoveVectoredContinueHandler
AddVectoredContinueHandler
RemoveVectoredExceptionHandler
AddVectoredExceptionHandler
SetUnhandledExceptionFilter
LoadLibraryExA
RtlCaptureStackBackTrace
GetModuleHandleW
OpenProcess
CreateThread
WaitForMultipleObjects
OpenEventW
CreateEventW
WaitForSingleObject
SetEvent
CloseHandle
GetCurrentProcess
GetProcessTimes
SetDefaultDllDirectories
VirtualQuery
MoveFileW
FormatMessageA
SetCurrentDirectoryW
FindFirstFileExW
GetDiskFreeSpaceExW
GetFileAttributesExW
GetFileInformationByHandle
GetFinalPathNameByHandleW
SetEndOfFile
SetFileAttributesW
SetFileInformationByHandle
SetFilePointerEx
SetFileTime
GetTempPathW
AreFileApisANSI
CreateDirectoryExW
CopyFileW
MoveFileExW
CreateHardLinkW
GetFileInformationByHandleEx
CreateSymbolicLinkW
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
InterlockedPushEntrySList
InterlockedFlushSList
RtlUnwind
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
ExitProcess
GetFileType
GetCPInfo
GetStdHandle
WriteFile
GetCurrentThread
HeapAlloc
HeapFree
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
SetConsoleCtrlHandler
FlushFileBuffers
user32
PostThreadMessageW
PeekMessageW
GetMessageW
LoadStringW
ShutdownBlockReasonDestroy
ShutdownBlockReasonCreate
SetWindowLongW
GetWindowLongW
DestroyWindow
CreateWindowExW
UnregisterClassW
RegisterClassW
DefWindowProcW
PostMessageW
DispatchMessageW
TranslateMessage
shell32
SHGetKnownFolderPath
CommandLineToArgvW
ole32
CoTaskMemFree
advapi32
OpenSCManagerW
RegSetKeyValueW
RegOpenKeyExW
RegGetValueW
RegDeleteValueW
GetUserNameW
BuildExplicitAccessWithNameW
SetSecurityInfo
GetSecurityInfo
SetEntriesInAclW
StartServiceCtrlDispatcherW
SetServiceStatus
RegisterServiceCtrlHandlerExW
QueryServiceConfigW
OpenServiceW
CloseServiceHandle
ChangeServiceConfigW
RegSetValueExW
RegCreateKeyExW
RegCloseKey
LookupAccountSidW
CreateWellKnownSid
OpenProcessToken
Exports
Exports
NvOptimusEnablement
Sections
.text Size: 736KB - Virtual size: 735KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 108KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.didat Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 134KB - Virtual size: 134KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.zero Size: 4KB - Virtual size: 3KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ