H:\rc_v12_i18n_202407_branch\Build\Release\WPSOffice\office6\addons\konlinesetup_xa\konlinesetup_xa.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-03_fbf32b3e70afa018b757f7a02a3d9a01_avoslocker_magniber_revil.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-09-03_fbf32b3e70afa018b757f7a02a3d9a01_avoslocker_magniber_revil.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-03_fbf32b3e70afa018b757f7a02a3d9a01_avoslocker_magniber_revil
-
Size
6.0MB
-
MD5
fbf32b3e70afa018b757f7a02a3d9a01
-
SHA1
48acd911b1af51c0d121ba34d95902a291378aa1
-
SHA256
6fe8e04fe79b1343c39c1b6d2c35d37d6d537382c45e390a32e2a563206255d7
-
SHA512
2996085bf11f5c72a4c1ff185c1f0a7fee5adbcea9935d008a28a527a60a97465b4294065720e7e2259224520a1a2fdb1510318a5e6ffe2b04253aae01135a24
-
SSDEEP
98304:TkXNCyy5kGl8y52JjBv27WDYDBkFAjU8ovs4Wqcz3Gqw892hB/iot2sEE5:08tkSKVsMFv8oOqczXV23iot
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-03_fbf32b3e70afa018b757f7a02a3d9a01_avoslocker_magniber_revil
Files
-
2024-09-03_fbf32b3e70afa018b757f7a02a3d9a01_avoslocker_magniber_revil.exe windows:5 windows x86 arch:x86
c0ba84b0a05138dfa160134f53f3fb02
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCommandLineW
SetEnvironmentVariableW
SetUnhandledExceptionFilter
GetLastError
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
FindResourceExW
LoadResource
LockResource
SizeofResource
FindResourceW
CloseHandle
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
WaitForSingleObject
Sleep
GetTickCount
FreeLibrary
GetModuleHandleW
GetProcAddress
LoadLibraryA
VerSetConditionMask
CreateDirectoryW
GetDiskFreeSpaceExW
GetTempFileNameW
GetTempPathW
OutputDebugStringA
CreateMutexW
OpenMutexW
GetExitCodeProcess
OpenProcess
GetVersionExW
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleExW
VerifyVersionInfoW
MultiByteToWideChar
WideCharToMultiByte
GetGeoInfoW
GetUserGeoID
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetCurrentProcessId
GetSystemTime
GetSystemDirectoryW
GetSystemWow64DirectoryW
LoadLibraryW
GetSystemPowerStatus
GetUserDefaultUILanguage
GetSystemDefaultLCID
GetUserDefaultLCID
CreateFileW
GetFileAttributesW
GetFileSizeEx
ReadFile
GetCurrentProcess
TerminateProcess
GetCurrentThreadId
GetProcessId
GetDateFormatW
GetFileInformationByHandle
GetFileSize
SetFilePointer
WriteFile
GetLocalTime
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
FileTimeToSystemTime
SystemTimeToFileTime
VirtualAlloc
VirtualFree
DeleteFileW
ExitProcess
FreeResource
lstrcpyW
GetLocaleInfoW
DecodePointer
RaiseException
InitializeCriticalSectionAndSpinCount
GetStdHandle
GetEnvironmentVariableW
GetFileType
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SwitchToFiber
DeleteFiber
CreateFiber
FormatMessageW
QueryPerformanceCounter
GetSystemTimeAsFileTime
ConvertFiberToThread
ConvertThreadToFiber
FindClose
FindFirstFileW
FindNextFileW
GetConsoleMode
SetConsoleMode
ReadConsoleA
ReadConsoleW
SetEvent
CreateEventA
QueryPerformanceFrequency
GetSystemDirectoryA
MoveFileExA
CompareFileTime
GetEnvironmentVariableA
PeekNamedPipe
WaitForMultipleObjects
SleepEx
GetVersionExA
ExpandEnvironmentStringsA
GetWindowsDirectoryA
GetACP
GetCurrentDirectoryW
MulDiv
GlobalAlloc
GlobalUnlock
GlobalLock
LocalFree
SetFileTime
DuplicateHandle
DosDateTimeToFileTime
HeapCreate
GetSystemInfo
VirtualProtect
VirtualQuery
LoadLibraryExA
CreateFileA
DeviceIoControl
CreateThread
lstrlenW
GetPrivateProfileStringW
ExpandEnvironmentStringsW
GetCurrentThread
ProcessIdToSessionId
CreateProcessW
GetPrivateProfileIntW
GetLongPathNameW
GetFileAttributesExW
ResetEvent
ReleaseSemaphore
CreateEventW
CreateSemaphoreW
SystemTimeToTzSpecificLocalTime
ReleaseMutex
OpenFileMappingW
IsDebuggerPresent
OutputDebugStringW
FormatMessageA
GetStringTypeW
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
InitializeCriticalSectionEx
TryEnterCriticalSection
GetLocaleInfoEx
EncodePointer
LCMapStringEx
CompareStringEx
GetCPInfo
WaitForSingleObjectEx
UnhandledExceptionFilter
IsProcessorFeaturePresent
InitializeSListHead
GetStartupInfoW
RtlUnwind
InterlockedPushEntrySList
LoadLibraryExW
GetCommandLineA
ExitThread
FreeLibraryAndExitThread
GetDriveTypeW
SetConsoleCtrlHandler
SetFilePointerEx
GetConsoleCP
GetTimeFormatW
CompareStringW
LCMapStringW
IsValidLocale
EnumSystemLocalesW
FlushFileBuffers
GetFullPathNameW
SetStdHandle
SetEndOfFile
GetTimeZoneInformation
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
WriteConsoleW
LockFileEx
UnlockFile
HeapCompact
DeleteFileA
FlushViewOfFile
GetFileAttributesA
GetDiskFreeSpaceA
GetTempPathA
HeapValidate
UnlockFileEx
GetFullPathNameA
LockFile
GetDiskFreeSpaceW
AreFileApisANSI
Sections
.text Size: 3.8MB - Virtual size: 3.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 807KB - Virtual size: 807KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 54KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 631KB - Virtual size: 631KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 728KB - Virtual size: 732KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE