Z:\Ventoy\Ventoy2Disk\Release\Ventoy2Disk.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-03_ba389f5c4cfa433b4a62de51794e4b9e_avoslocker_cobalt-strike_floxif.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-09-03_ba389f5c4cfa433b4a62de51794e4b9e_avoslocker_cobalt-strike_floxif.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-03_ba389f5c4cfa433b4a62de51794e4b9e_avoslocker_cobalt-strike_floxif
-
Size
660KB
-
MD5
ba389f5c4cfa433b4a62de51794e4b9e
-
SHA1
e8c31c6003003409f8545cf68c3ca890cd085e8e
-
SHA256
3d6ff8ba4149bf7f277131f048a93a059cdf6a28a68b369372aa2753eb64aa4a
-
SHA512
52b46a139b5622a52f0d557138c77fe8da876b28e0fc5e38e505b35e4d38f2eb1725dc57bf0ecb680314220048ff1255d0aa6007b97b5b08db489a001f323b03
-
SSDEEP
12288:QElbu0JN6R2TZsz1jxrMnVWqqPIBONhxsUzMi4BjvrEH7x/F:QElbdjLeX/xsUzvKrEH75F
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-03_ba389f5c4cfa433b4a62de51794e4b9e_avoslocker_cobalt-strike_floxif
Files
-
2024-09-03_ba389f5c4cfa433b4a62de51794e4b9e_avoslocker_cobalt-strike_floxif.exe windows:6 windows x86 arch:x86
a0dc1c3c9febe5ea5ca04441cbb8da06
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetLastError
GetCurrentProcess
GetUserDefaultUILanguage
GetSystemDirectoryW
LCIDToLocaleName
MultiByteToWideChar
GetLastError
LockResource
LoadLibraryW
LoadResource
FindResourceW
GetProcAddress
GetModuleHandleW
FreeLibrary
WideCharToMultiByte
GetSystemWindowsDirectoryW
LoadLibraryExW
GetEnvironmentVariableA
LoadLibraryA
GetDriveTypeW
GetVolumeInformationA
WaitForSingleObject
GetCurrentDirectoryA
DeleteFileA
CloseHandle
GetStartupInfoA
GetCurrentProcessId
CreateProcessA
GetVolumeNameForVolumeMountPointA
Sleep
FormatMessageW
DeviceIoControl
ReadFile
WriteFile
SetFilePointerEx
GetLogicalDrives
DeleteVolumeMountPointA
SetFilePointer
QueryDosDeviceA
FindFirstVolumeA
GetTickCount64
SetVolumeMountPointA
CreateFileA
GetLogicalDriveStringsA
FindNextVolumeA
FindVolumeClose
K32GetModuleFileNameExW
K32GetProcessImageFileNameW
GetModuleHandleA
GetNativeSystemInfo
ReadProcessMemory
QueryFullProcessImageNameW
GetFileType
IsWow64Process
VerifyVersionInfoA
GetProductInfo
GetFileAttributesA
GetVersionExA
GetLocalTime
GetSystemWow64DirectoryA
VerSetConditionMask
GetDiskFreeSpaceA
GetPrivateProfileIntA
lstrlenW
GetSystemDefaultUILanguage
GetPrivateProfileIntW
LoadLibraryExA
CreateFileW
GetPrivateProfileSectionNamesW
OpenProcess
CreateToolhelp32Snapshot
GetPrivateProfileStringW
Process32NextW
SetDllDirectoryA
Process32FirstW
CreateThread
GetWindowsDirectoryA
GetCurrentDirectoryW
SetCurrentDirectoryW
GetFileSize
lstrcpyW
lstrcmpW
SetEndOfFile
WriteConsoleW
HeapReAlloc
HeapSize
FlushFileBuffers
GetProcessHeap
GetStringTypeW
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
DecodePointer
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
ReadConsoleW
LCMapStringW
GetFileSizeEx
GetConsoleMode
GetConsoleOutputCP
HeapFree
HeapAlloc
GetModuleHandleExW
ExitProcess
RaiseException
GetSystemInfo
VirtualProtect
VirtualQuery
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwind
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCommandLineA
GetCommandLineW
GetStdHandle
GetModuleFileNameW
user32
GetMenuState
ModifyMenuW
LoadMenuW
GetMenu
CreateWindowExW
DeleteMenu
GetSubMenu
ShowWindow
SetWindowTextA
SendDlgItemMessageW
IsWindowEnabled
SetMenu
SetFocus
LoadIconW
wsprintfW
CheckMenuItem
AppendMenuW
DialogBoxParamW
EndDialog
LoadImageW
InvalidateRect
GetSystemMetrics
MessageBoxW
CheckRadioButton
SetWindowTextW
GetWindowTextA
SendMessageA
GetDlgItem
EnableWindow
GetWindowLongW
EnumChildWindows
SendMessageW
LoadStringW
SetWinEventHook
GetWindowTextW
UpdateWindow
Sections
.text Size: 202KB - Virtual size: 201KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 294KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ