D:\a\1\s\Win32\Release\disk2vhd.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-07_d9b8485ea6c0d9f20f70dcb7eefe7e1b_avoslocker.exe
Resource
win7-20240704-en
General
-
Target
2024-09-07_d9b8485ea6c0d9f20f70dcb7eefe7e1b_avoslocker
-
Size
1.9MB
-
MD5
d9b8485ea6c0d9f20f70dcb7eefe7e1b
-
SHA1
b1fcd011a6270f985fdc73198b138270456887a7
-
SHA256
132c8378e45d379592afa1cfa2a37c2d32d31ac8529fd06a79343a6c8ab41ede
-
SHA512
b90acfe2aeff3c188ef97883b81cb51925486271fcf4cd565a3671a5f3080f00464176bb5c97ce88d58a0fd04e290bc5a7202c50e2f9f3be3e7837a60b7a9183
-
SSDEEP
12288:aMZLkSuHHF2iUsQdmeOihri/UsiN71YoiqIpRNVJnLnFhRqppMjeBhvxGfOLxcBe:sSunFCmedPNOoiqcRJ/RBoqfOL2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-07_d9b8485ea6c0d9f20f70dcb7eefe7e1b_avoslocker
Files
-
2024-09-07_d9b8485ea6c0d9f20f70dcb7eefe7e1b_avoslocker.exe windows:6 windows x86 arch:x86
4c117f731c41a3fc8c380ac1299a9b92
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
vssapi
CreateVssBackupComponentsInternal
comctl32
ord17
cabinet
ord22
ord20
ord23
rpcrt4
UuidCreate
kernel32
FindNextFileW
GetDiskFreeSpaceW
DeviceIoControl
FindClose
WaitForSingleObject
CreateFileW
CreateEventW
GetDiskFreeSpaceExW
GetOverlappedResult
SizeofResource
GetVolumeInformationW
GetFullPathNameW
GetCurrentProcess
ExpandEnvironmentStringsW
GetModuleFileNameW
GetFileAttributesW
GetVolumeNameForVolumeMountPointW
SetFileAttributesW
FormatMessageW
LockResource
DeleteFileW
GetSystemInfo
LoadLibraryW
LoadResource
FindResourceW
GetCurrentDirectoryW
MoveFileExW
VerSetConditionMask
GetComputerNameW
FreeLibrary
CopyFileW
VerifyVersionInfoW
CopyFileExW
MoveFileW
GetDriveTypeW
GetExitCodeProcess
EnterCriticalSection
ReleaseSemaphore
LeaveCriticalSection
InitializeCriticalSection
WriteFileEx
WaitForSingleObjectEx
ReadFileEx
GetLocalTime
CreateSemaphoreW
SleepEx
GetTickCount
GetVolumePathNameW
ExpandEnvironmentStringsA
SetLastError
GetOEMCP
FindFirstFileW
GetModuleHandleW
FindFirstFileExW
SetFilePointerEx
GetFileSizeEx
GetConsoleOutputCP
HeapReAlloc
ReadConsoleW
ReadConsoleInputW
SetConsoleMode
GetConsoleMode
LCMapStringW
HeapAlloc
HeapFree
FreeLibraryAndExitThread
ExitThread
CreateThread
GetConsoleCP
GetModuleHandleExW
ExitProcess
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
EncodePointer
SetStdHandle
RtlUnwind
MultiByteToWideChar
OutputDebugStringW
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
GetStartupInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
ResetEvent
SetEvent
HeapSize
DeleteCriticalSection
DecodePointer
RaiseException
GetLastError
InitializeCriticalSectionEx
GetFileTime
WideCharToMultiByte
CloseHandle
CreateFileA
SetFilePointer
WriteFile
ReadFile
GetACP
LocalFree
GetProcAddress
LocalAlloc
GetCPInfo
GetCommandLineA
GetFileType
GetStdHandle
LoadLibraryExW
GetCommandLineW
IsValidCodePage
GetVersionExW
FlushFileBuffers
WriteConsoleW
SetEndOfFile
GetProcessHeap
LoadLibraryExA
GetEnvironmentStringsW
InitializeCriticalSectionAndSpinCount
GetStringTypeW
FreeEnvironmentStringsW
user32
CreateDialogParamW
DeferWindowPos
DefWindowProcW
CallWindowProcW
PostMessageW
GetWindowRect
GetDC
MessageBoxW
GetPropW
EnumChildWindows
UnionRect
GetMessageW
GetSystemMetrics
LoadAcceleratorsW
GetActiveWindow
BeginDeferWindowPos
OffsetRect
DispatchMessageW
IsDialogMessageW
SetDlgItemTextW
RegisterClassW
GetDlgItemTextW
GetSysColor
ScreenToClient
IsDlgButtonChecked
TranslateAcceleratorW
SetPropW
TranslateMessage
LoadIconW
GetClassNameW
EndDeferWindowPos
SetWindowLongW
GetClientRect
IsZoomed
CheckDlgButton
PostQuitMessage
GetParent
PtInRect
DrawFrameControl
InvalidateRect
ChildWindowFromPoint
ReleaseDC
EnableWindow
InflateRect
SendMessageW
EndDialog
SetWindowTextW
DialogBoxIndirectParamW
LoadCursorW
SetCursor
GetDlgItem
GetSysColorBrush
GetWindowLongW
IsWindowEnabled
ShowWindow
gdi32
SelectObject
GetStockObject
SetTextColor
SetBkMode
GetObjectW
CreateFontIndirectW
StartPage
EndDoc
GetDeviceCaps
SetMapMode
StartDocW
EndPage
comdlg32
GetSaveFileNameW
PrintDlgW
advapi32
RegOpenKeyExA
RegQueryValueExA
LookupPrivilegeValueW
AdjustTokenPrivileges
RegFlushKey
RegCreateKeyExW
OpenProcessToken
RegDeleteValueW
RegCloseKey
RegSetValueExW
RegOpenKeyExW
RegCreateKeyW
RegOpenKeyW
RegQueryValueExW
shell32
CommandLineToArgvW
ShellExecuteExW
ole32
CoInitialize
CoCreateInstance
CLSIDFromString
CoCreateGuid
CoUninitialize
oleaut32
SystemTimeToVariantTime
VariantInit
SysAllocString
SysFreeString
SysStringLen
SysAllocStringByteLen
VariantClear
VariantChangeType
shlwapi
PathFindExtensionW
Sections
.text Size: 196KB - Virtual size: 196KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 576KB - Virtual size: 580KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE