c:\buildslave\steam_rel_client_hotfix_win32\build\src\steamUI\gamestream\secure_desktop_capture\Release\secure_desktop_capture.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-29_db5ecf6fa872df9cbb4ac0356c76ba3f_avoslocker_hijackloader_metamorfo_revil.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2024-08-29_db5ecf6fa872df9cbb4ac0356c76ba3f_avoslocker_hijackloader_metamorfo_revil.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-29_db5ecf6fa872df9cbb4ac0356c76ba3f_avoslocker_hijackloader_metamorfo_revil
-
Size
3.0MB
-
MD5
db5ecf6fa872df9cbb4ac0356c76ba3f
-
SHA1
fdddd34bea4e395e4574ce7ebd4acd35ccd890bc
-
SHA256
f65d9d1ab35942996da83d04da6eb7be465ad11b4d111072f9019731bc161e84
-
SHA512
b31a4d82ecdfb230d8028f0f3e439de19a30587134fc23c179e6aa1ab8fa69448e202e14dbb55036d376eeff0cd0a2763f781b074a01a99afd11218867bbedb3
-
SSDEEP
49152:66v7karQ6lGrG5D53IfhiOPUUdC3tPsbXC0iOvMm2FN2XoCYHgZQmF9C:66v7kwhGy5FIfgOMrybXEm2r2hC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-08-29_db5ecf6fa872df9cbb4ac0356c76ba3f_avoslocker_hijackloader_metamorfo_revil
Files
-
2024-08-29_db5ecf6fa872df9cbb4ac0356c76ba3f_avoslocker_hijackloader_metamorfo_revil.exe windows:6 windows x86 arch:x86
086f28fc97889de8aca08aaacd185ac3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FreeLibrary
GetModuleFileNameW
GetModuleHandleA
GlobalAlloc
GlobalUnlock
GlobalLock
LocalAlloc
LocalFree
MultiByteToWideChar
WriteConsoleW
GetEnvironmentStringsW
GetOEMCP
GetACP
IsValidCodePage
GetTimeZoneInformation
HeapReAlloc
SetFilePointerEx
SetStdHandle
HeapAlloc
HeapFree
LCMapStringW
CompareStringW
HeapValidate
HeapSize
SetConsoleCtrlHandler
GetModuleHandleExW
GetFullPathNameW
GetConsoleCP
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
VirtualQuery
GetCurrentProcessId
Sleep
SetLastError
OutputDebugStringA
WriteFile
FreeEnvironmentStringsW
FindFirstFileW
FindClose
CreateFileW
LoadLibraryA
GetProcAddress
GetCurrentThreadId
Process32Next
Process32First
CreateToolhelp32Snapshot
CreateFileMappingA
UnmapViewOfFile
MapViewOfFile
OpenProcess
GetCurrentProcess
CreateEventA
WaitForSingleObject
ResetEvent
SetEvent
GetLastError
CloseHandle
LeaveCriticalSection
RtlUnwind
InitializeSListHead
GetStartupInfoW
IsProcessorFeaturePresent
UnhandledExceptionFilter
CreateEventW
WaitForSingleObjectEx
GetCPInfo
DecodePointer
EncodePointer
GetStringTypeW
InitOnceComplete
InitOnceBeginInitialize
ExitProcess
EnterCriticalSection
InitializeCriticalSectionEx
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
InitializeSRWLock
GetCurrentDirectoryW
FindNextFileW
WideCharToMultiByte
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStdHandle
GetEnvironmentVariableW
GetFileType
GetModuleHandleW
DeleteFiber
QueryPerformanceCounter
GetSystemTimeAsFileTime
ConvertFiberToThread
GetConsoleMode
SetConsoleMode
ReadConsoleA
ReadConsoleW
GetSystemTime
SystemTimeToFileTime
InitializeCriticalSection
GetCommandLineW
TerminateProcess
GlobalMemoryStatusEx
VirtualAlloc
GetModuleFileNameA
IsDebuggerPresent
GetCommandLineA
GetProcessHeap
HeapSetInformation
HeapLock
HeapUnlock
HeapWalk
HeapQueryInformation
QueryPerformanceFrequency
DuplicateHandle
RaiseException
TryEnterCriticalSection
SwitchToThread
CreateThread
GetCurrentThread
OpenThread
GetExitCodeThread
SetUnhandledExceptionFilter
LoadLibraryExA
LoadLibraryExW
DebugBreak
GetProcessHeaps
SetEnvironmentVariableW
FindFirstFileExW
FlushFileBuffers
GetDriveTypeW
GetFileInformationByHandle
GetFileSizeEx
ReadFile
SetEndOfFile
user32
EndDialog
GetDlgItem
OpenClipboard
SetDlgItemInt
SetClipboardData
EmptyClipboard
GetWindowTextLengthA
GetDesktopWindow
CloseDesktop
GetDlgItemInt
CloseClipboard
SetDlgItemTextA
OpenDesktopA
GetWindowRect
DialogBoxParamA
GetWindowThreadProcessId
EnumWindows
GetShellWindow
wsprintfA
IsWindowVisible
ReleaseDC
GetDC
SetWindowPos
ShowWindow
GetCursorInfo
LoadCursorA
GetCursorPos
MessageBoxA
GetSystemMetrics
SendInput
GetProcessWindowStation
GetUserObjectInformationW
MessageBoxW
gdi32
GdiFlush
SetBrushOrgEx
CreateDIBSection
SetStretchBltMode
StretchBlt
SelectObject
DeleteObject
DeleteDC
CreateCompatibleDC
BitBlt
advapi32
RegisterEventSourceW
ReportEventW
RegSetValueExA
RegCreateKeyExA
RegQueryValueExA
RegOpenKeyA
RegCloseKey
SetSecurityDescriptorDacl
IsValidSid
InitializeSecurityDescriptor
InitializeAcl
GetTokenInformation
GetLengthSid
CreateWellKnownSid
CopySid
AddAccessAllowedAce
OpenProcessToken
DeregisterEventSource
shell32
CommandLineToArgvW
oleaut32
VariantClear
psapi
GetProcessMemoryInfo
bcrypt
BCryptGenRandom
ws2_32
WSASetLastError
recv
WSAGetLastError
send
closesocket
WSACleanup
Exports
Exports
CreateInterface
g_dwDllEntryThreadId
Sections
.text Size: 2.0MB - Virtual size: 2.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 553KB - Virtual size: 552KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 27KB - Virtual size: 534KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 295KB - Virtual size: 295KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 153KB - Virtual size: 156KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE