E:\oosetupstub\src\stub\vc10\Win32\Release\stub.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-05_6e065aa8f819a1d3027c083894eda070_avoslocker_floxif.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-05_6e065aa8f819a1d3027c083894eda070_avoslocker_floxif.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-05_6e065aa8f819a1d3027c083894eda070_avoslocker_floxif
-
Size
23.9MB
-
MD5
6e065aa8f819a1d3027c083894eda070
-
SHA1
5fa35b3928177c0706b4f64082c949979981b7f4
-
SHA256
a508e926a9fc85677d00b525c186ff04666f59d65c06d894982d1d9c98b6ccfc
-
SHA512
0b24c5c390a438153cfb17726a88751999d1f1e48cbaf51d37d94a6762d47d64276cfe48d31ac77b2276bbdfd08d404a79c36cefc7d04a9ba6c2180e4cde86f0
-
SSDEEP
393216:iTjF7q4BoTBcOrZF0btTUIluPwTqVfk9qrpaRxwObCHY:O+B9ZyTUeugqVfk9qVaQq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-05_6e065aa8f819a1d3027c083894eda070_avoslocker_floxif
Files
-
2024-09-05_6e065aa8f819a1d3027c083894eda070_avoslocker_floxif.exe windows:6 windows x86 arch:x86
1622c2f556680adc5863f228c9d63ac9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCommandLineW
GetEnvironmentVariableW
FindFirstFileW
FindNextFileW
WaitForSingleObject
GetCurrentProcessId
CreateThread
GetExitCodeThread
GetModuleFileNameW
GetModuleHandleW
GetProcAddress
CopyFileW
MoveFileW
CreateFileW
GetFileSizeEx
ReadFile
SetEndOfFile
SetFilePointer
SetFilePointerEx
WriteFile
GetTempPathW
CloseHandle
GetLastError
GetCurrentProcess
GetExitCodeProcess
GetCurrentThreadId
CreateProcessW
FreeLibrary
LoadLibraryExW
GetVersionExW
VirtualProtect
GetSystemInfo
WriteConsoleW
HeapSize
ReadConsoleW
SetStdHandle
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
FindClose
HeapReAlloc
GetConsoleMode
GetConsoleCP
FlushFileBuffers
EnumSystemLocalesW
IsValidLocale
GetTimeZoneInformation
GetFileType
HeapAlloc
GetSystemDirectoryW
VirtualQuery
GetUserDefaultLCID
HeapFree
GetStdHandle
DeleteFileW
GetModuleHandleExW
ExitProcess
RtlUnwind
RaiseException
LoadLibraryExA
InitializeSListHead
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetLastError
InitializeCriticalSectionAndSpinCount
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
EncodePointer
DecodePointer
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
user32
UpdateWindow
SendMessageW
GetDlgItem
MessageBoxW
GetUserObjectInformationW
GetThreadDesktop
CloseDesktop
LoadStringW
SetWindowLongW
TranslateMessage
MessageBoxA
GetWindowRect
SetWindowTextW
GetWindowLongW
GetSystemMetrics
EnableWindow
EndDialog
DialogBoxParamW
CreateDialogParamW
SetWindowPos
ShowWindow
DestroyWindow
PeekMessageW
DispatchMessageW
advapi32
RegOpenKeyExW
RegQueryValueExW
shell32
SHGetFolderPathW
ShellExecuteW
CommandLineToArgvW
ord165
wintrust
WinVerifyTrust
CryptCATAdminCalcHashFromFileHandle
shlwapi
PathFileExistsW
Sections
.text Size: 265KB - Virtual size: 264KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 75KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 363KB - Virtual size: 363KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ