D:\a\1\s\Win32\Release\LoadOrd.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-07_27a7f494813fb1b980d64da53db49990_avoslocker_cobalt-strike.exe
Resource
win7-20240903-en
General
-
Target
2024-09-07_27a7f494813fb1b980d64da53db49990_avoslocker_cobalt-strike
-
Size
924KB
-
MD5
27a7f494813fb1b980d64da53db49990
-
SHA1
8564beb0a531dee689d69a25fea36f6b96ff8f3f
-
SHA256
d832d5579f7579a7c63cee79b6b06ebf972c1eec9764608d2ffc8669e7a47895
-
SHA512
5ee7d8374801905ddba0b34d57fe026f091175c11f9455cc4f049ddb1f90c20b32725137a743dadeb3159917960b7c880d41c671d931649750c12fb32ee68689
-
SSDEEP
12288:3Kzd0iI390CJEiH1CALkpYWqHuN4MXiN71YoiqIpRNVJnLnFhRqppMjeBhvxGfOt:JEiH1/LkXqMXiNOoiqcRJ/RBoqfOL2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-07_27a7f494813fb1b980d64da53db49990_avoslocker_cobalt-strike
Files
-
2024-09-07_27a7f494813fb1b980d64da53db49990_avoslocker_cobalt-strike.exe windows:6 windows x86 arch:x86
752cedb65795ddd3c41a733ed7445860
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
ord6
ord17
version
GetFileVersionInfoA
VerQueryValueW
VerQueryValueA
GetFileVersionInfoW
GetFileVersionInfoSizeA
GetFileVersionInfoSizeW
kernel32
SetLastError
GetVersionExA
LoadLibraryExA
WriteConsoleW
HeapReAlloc
HeapSize
SetFilePointerEx
GetFileSizeEx
SetConsoleCtrlHandler
GetProcessHeap
GetStringTypeW
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
MultiByteToWideChar
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
LocalFree
FindClose
OutputDebugStringW
ReadConsoleW
PeekConsoleInputA
ReadConsoleInputW
GetNumberOfConsoleInputEvents
SetConsoleMode
CloseHandle
CreateFileW
WideCharToMultiByte
ReadFile
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
LocalAlloc
GetProcAddress
GetModuleHandleA
GetCommandLineW
GetStdHandle
GetModuleFileNameW
GetModuleFileNameA
GetFileType
GlobalUnlock
GlobalLock
GlobalAlloc
FindFirstFileExW
GetLastError
HeapAlloc
HeapFree
GetCurrentThread
WriteFile
GetConsoleCP
GetModuleHandleExW
ExitProcess
Sleep
SetStdHandle
DecodePointer
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
InterlockedPushEntrySList
InterlockedFlushSList
RtlUnwind
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
EncodePointer
RaiseException
user32
LoadAcceleratorsA
GetMessageA
TranslateMessage
DispatchMessageA
SendMessageA
WaitForInputIdle
InflateRect
GetSysColorBrush
SetCursor
SetWindowTextA
EndDialog
DialogBoxIndirectParamA
LoadIconA
LoadCursorA
FindWindowExA
FindWindowA
GetParent
MessageBoxA
GetWindowRect
GetClientRect
SetForegroundWindow
UpdateWindow
DefWindowProcA
TranslateAcceleratorA
EnableWindow
SetFocus
EmptyClipboard
SetClipboardData
CloseClipboard
OpenClipboard
GetDlgItem
EndDeferWindowPos
DeferWindowPos
BeginDeferWindowPos
MoveWindow
ShowWindow
CreateWindowExA
RegisterClassExA
PostQuitMessage
gdi32
EndPage
StartPage
EndDoc
StartDocA
SetMapMode
GetStockObject
GetDeviceCaps
DeleteDC
CreateDCA
comdlg32
PrintDlgA
advapi32
RegCreateKeyA
RegEnumKeyA
RegOpenKeyExA
RegSetValueExA
RegQueryValueExW
RegOpenKeyA
RegQueryValueExA
RegCloseKey
shell32
ShellExecuteExA
Sections
.text Size: 273KB - Virtual size: 273KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 576KB - Virtual size: 580KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE