C:\Users\hprakash\source\repos\Win Lite\ITS Edge Browser\Release\ITSEdgeBrowser.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-02_ae787afa4a877eeca44bcb345998f8a9_avoslocker_hijackloader_metamorfo.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-09-02_ae787afa4a877eeca44bcb345998f8a9_avoslocker_hijackloader_metamorfo.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-02_ae787afa4a877eeca44bcb345998f8a9_avoslocker_hijackloader_metamorfo
-
Size
4.9MB
-
MD5
ae787afa4a877eeca44bcb345998f8a9
-
SHA1
b6aaa11b1ec939514cf4639df752c2deced58374
-
SHA256
7468f6053725f813e75c8154d1e15a06fd3ceb45c4de533ca4c10e6c147dddf8
-
SHA512
3d2a015b17d86fa50e2ef26d6dbf59061910a4d589afc37fe8116963535943a8411a194ecda81f2e059de8a8d282a23e70941abc3474e9c00b73178573da1d45
-
SSDEEP
98304:RtiuhjuhmF1OgPptZDElaxQ3PCTDsRnLPYSz7VUuf:b4ktIa6n3Suf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-02_ae787afa4a877eeca44bcb345998f8a9_avoslocker_hijackloader_metamorfo
Files
-
2024-09-02_ae787afa4a877eeca44bcb345998f8a9_avoslocker_hijackloader_metamorfo.exe windows:6 windows x86 arch:x86
f63aff0b8888f9f3a3710d5418de9c9a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
version
GetFileVersionInfoA
GetFileVersionInfoW
VerQueryValueA
GetFileVersionInfoSizeW
GetFileVersionInfoSizeA
kernel32
GetModuleHandleW
GetModuleHandleExW
GetProcAddress
FormatMessageW
FindClose
FindFirstFileA
FindNextFileA
MultiByteToWideChar
WideCharToMultiByte
DeleteFileA
GetFileAttributesExA
FileTimeToSystemTime
FreeLibrary
LoadLibraryA
CreateDirectoryW
CreateFileW
DeleteFileW
FindFirstFileW
FindNextFileW
RemoveDirectoryW
WriteFile
GetTempPathW
GetTempPathA
SetEvent
CreateMutexA
GetCurrentProcess
CreateThread
OpenProcess
GetTickCount64
IsWow64Process
GetModuleFileNameW
GetModuleHandleA
LoadResource
LockResource
SizeofResource
LoadLibraryW
OpenMutexA
FindResourceA
K32GetProcessImageFileNameA
GlobalReAlloc
CreateFileA
GetDriveTypeA
GetCurrentThreadId
DecodePointer
RaiseException
QueryPerformanceCounter
QueryPerformanceFrequency
HeapDestroy
HeapReAlloc
HeapSize
InitializeCriticalSectionEx
DeleteCriticalSection
TerminateProcess
CreateProcessW
GlobalMemoryStatusEx
GetVersionExA
GlobalMemoryStatus
LocalAlloc
LocalFree
lstrcmpA
lstrcpyW
HeapFree
GetComputerNameW
CreateToolhelp32Snapshot
Process32First
Process32Next
ReleaseMutex
GetTempFileNameW
RegisterApplicationRestart
GetSystemTime
SystemTimeToFileTime
OutputDebugStringA
LoadLibraryExW
GetEnvironmentVariableW
GetStringTypeW
InitializeSListHead
GetSystemTimeAsFileTime
GetStartupInfoW
CreateEventW
ResetEvent
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
LCMapStringEx
CompareStringEx
GetModuleFileNameA
GetCurrentProcessId
CreateSemaphoreExW
CreateMutexExW
OpenSemaphoreW
WaitForSingleObjectEx
GetFileAttributesW
WaitForSingleObject
GetCPInfo
RtlUnwind
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCommandLineA
ReadFile
EncodePointer
ExitProcess
GetStdHandle
GetFileType
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetConsoleMode
ReadConsoleW
SetFilePointerEx
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
ReleaseSemaphore
HeapAlloc
SetLastError
GetLastError
CloseHandle
OutputDebugStringW
DebugBreak
IsDebuggerPresent
GlobalFree
GlobalAlloc
GetFileSizeEx
SetStdHandle
GetCommandLineW
GetProcessHeap
FlushFileBuffers
GetConsoleOutputCP
SetEndOfFile
GetLogicalDriveStringsA
WriteConsoleW
user32
EndPaint
SetWindowTextA
BeginPaint
GetSystemMetrics
EnableWindow
GetKeyState
EndDialog
DialogBoxParamA
GetRawInputData
GetRawInputDeviceInfoA
GetRawInputDeviceList
SetWindowDisplayAffinity
GetClientRect
CreateWindowExW
RegisterClassExW
PostQuitMessage
LoadStringW
RegisterRawInputDevices
SystemParametersInfoA
GetAncestor
SetWinEventHook
EnumDisplayMonitors
IsDialogMessageA
GetWindow
GetWindowThreadProcessId
GetClassNameA
FindWindowA
GetDesktopWindow
SetWindowLongA
GetWindowLongA
MessageBoxA
GetWindowTextA
SetForegroundWindow
GetForegroundWindow
UpdateWindow
TranslateAcceleratorA
LoadAcceleratorsA
SendInput
GetAsyncKeyState
BringWindowToTop
IsIconic
SetWindowPos
ShowWindow
DestroyWindow
IsWindow
CreateWindowExA
RegisterClassExA
DefWindowProcA
AttachThreadInput
PostMessageA
RegisterSuspendResumeNotification
SendMessageA
DispatchMessageA
TranslateMessage
GetMessageA
wsprintfW
EmptyClipboard
CloseClipboard
OpenClipboard
wsprintfA
MessageBoxW
SetWindowTextW
FindWindowExA
advapi32
GetUserNameA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegCreateKeyExA
RegDeleteValueW
RegOpenKeyExW
RegQueryValueExW
GetUserNameW
EventRegister
EventSetInformation
EventWriteTransfer
EventUnregister
RegGetValueW
RegSetValueExA
shell32
SetCurrentProcessExplicitAppUserModelID
ord680
ShellExecuteA
SHGetSpecialFolderPathW
ShellExecuteW
ShellExecuteExA
ShellExecuteExW
SHChangeNotify
SHGetSpecialFolderPathA
SHCreateItemFromParsingName
shlwapi
PathRemoveFileSpecA
PathRemoveFileSpecW
PathRemoveExtensionW
PathFileExistsW
PathFindFileNameA
PathFindFileNameW
ole32
CoTaskMemAlloc
CoTaskMemFree
OleInitialize
OleUninitialize
CoInitializeEx
CoCreateInstance
oleaut32
VariantInit
SysAllocString
SysStringLen
SysFreeString
SysAllocStringLen
LoadTypeLi
urlmon
URLDownloadToFileA
CoInternetCreateZoneManager
CreateUri
wininet
InternetQueryOptionA
InternetGetConnectedState
HttpQueryInfoA
HttpSendRequestA
HttpOpenRequestA
InternetReadFile
InternetOpenUrlA
InternetConnectA
InternetCloseHandle
InternetOpenA
InternetCanonicalizeUrlA
InternetSetOptionA
crypt32
CryptDecodeObject
CertFindCertificateInStore
CertGetNameStringA
CryptQueryObject
CertGetNameStringW
CertFreeCertificateChain
CryptMsgGetParam
wintrust
WinVerifyTrust
Sections
.text Size: 474KB - Virtual size: 473KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 184KB - Virtual size: 183KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 242KB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4.1MB - Virtual size: 4.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ