Static task
static1
Behavioral task
behavioral1
Sample
2024-09-07_d9c90acf9dc63c71c2326ee36cfd217b_avoslocker_hijackloader.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-07_d9c90acf9dc63c71c2326ee36cfd217b_avoslocker_hijackloader.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-07_d9c90acf9dc63c71c2326ee36cfd217b_avoslocker_hijackloader
-
Size
35.4MB
-
MD5
d9c90acf9dc63c71c2326ee36cfd217b
-
SHA1
50fea001c54ae90d5d2c1a2e3473978b786b1615
-
SHA256
d346e0be1e2552a1f96aa2362267014e285381f86009ab9f34ca632667d1276e
-
SHA512
8b7bbeb10633c9e8935736fd862f2c946d9a05d9aa8b21244304a78472a40daeae826598b4c3c5629396f4952013fabefb790d975191ced9432cfeb7d5c07855
-
SSDEEP
49152:Jh0sgXKQLnS2HEVffBAiO8nwV7/vUM2DadG:1OfV7/vUD
Malware Config
Signatures
Files
-
2024-09-07_d9c90acf9dc63c71c2326ee36cfd217b_avoslocker_hijackloader.exe windows:6 windows x86 arch:x86
0b6779c7b69e435ef4647dce19158e01
Code Sign
67:87:99:d1:13:7f:5b:4c:b3:8e:02:d3:04:91:5c:c6Certificate
IssuerCN=EmeraldMonarctronicsBase,1.2.840.113549.1.9.1=#0c207465616d40656d6572616c646d6f6e61726374726f6e696373626173652e7573Not Before26/04/2022, 00:00Not After26/04/2023, 23:59SubjectCN=EmeraldMonarctronicsBase,1.2.840.113549.1.9.1=#0c207465616d40656d6572616c646d6f6e61726374726f6e696373626173652e75730e:9b:18:8e:f9:d0:2d:e7:ef:db:50:e2:08:40:18:5aCertificate
IssuerCN=DigiCert Assured ID Root CA,OU=www.digicert.com,O=DigiCert Inc,C=USNot Before01/08/2022, 00:00Not After09/11/2031, 23:59SubjectCN=DigiCert Trusted Root G4,OU=www.digicert.com,O=DigiCert Inc,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
07:36:37:b7:24:54:7c:d8:47:ac:fd:28:66:2a:5e:5bCertificate
IssuerCN=DigiCert Trusted Root G4,OU=www.digicert.com,O=DigiCert Inc,C=USNot Before23/03/2022, 00:00Not After22/03/2037, 23:59SubjectCN=DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA,O=DigiCert\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
0c:4d:69:72:4b:94:fa:3c:2a:4a:3d:29:07:80:3d:5aCertificate
IssuerCN=DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA,O=DigiCert\, Inc.,C=USNot Before21/09/2022, 00:00Not After21/11/2033, 23:59SubjectCN=DigiCert Timestamp 2022 - 2,O=DigiCert,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
Signer
Actual PE DigestDigest AlgorithmPE Digest MatchesfalseHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
htonl
WSACloseEvent
WSACreateEvent
WSAEnumNetworkEvents
WSAEventSelect
ioctlsocket
freeaddrinfo
getaddrinfo
listen
send
accept
select
__WSAFDIsSet
WSACleanup
WSAStartup
WSAIoctl
WSASetLastError
socket
setsockopt
ntohs
htons
getsockopt
getsockname
getpeername
connect
bind
recv
WSAGetLastError
closesocket
WSAWaitForMultipleEvents
WSASetEvent
WSAResetEvent
crypt32
CertFreeCertificateChain
CertGetCertificateChain
CertFreeCertificateChainEngine
CertCreateCertificateChainEngine
CryptQueryObject
CertGetNameStringA
CertFindExtension
CertAddCertificateContextToStore
CryptDecodeObjectEx
PFXImportCertStore
CryptStringToBinaryA
CertFreeCertificateContext
CertFindCertificateInStore
CertEnumCertificatesInStore
CertCloseStore
CertOpenStore
normaliz
IdnToAscii
IdnToUnicode
kernel32
LCMapStringW
CompareStringW
GetTimeFormatW
HeapFree
HeapAlloc
GetConsoleOutputCP
ReadConsoleW
GetConsoleMode
SetStdHandle
SetEndOfFile
SetFilePointerEx
GetStringTypeW
FlushFileBuffers
GetFileAttributesExW
GetCurrentDirectoryW
GetFullPathNameW
FindClose
FindFirstFileExW
FindNextFileW
GetACP
GetOEMCP
GetCPInfo
GetDateFormatW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
WriteFile
HeapDestroy
HeapSize
HeapReAlloc
WideCharToMultiByte
DeleteCriticalSection
FreeEnvironmentStringsW
GetStdHandle
IsValidCodePage
LoadLibraryExW
VerifyVersionInfoW
GetProcAddress
GetModuleHandleA
InitializeCriticalSectionEx
RaiseException
DecodePointer
MultiByteToWideChar
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
EnterCriticalSection
LeaveCriticalSection
GetLastError
SleepEx
QueryPerformanceFrequency
GetSystemDirectoryA
FreeLibrary
LoadLibraryA
QueryPerformanceCounter
GetTickCount
Sleep
CloseHandle
WriteConsoleW
GetEnvironmentVariableA
SetLastError
FormatMessageW
VerSetConditionMask
MoveFileExA
CreateFileA
GetFileSizeEx
ReadFile
GetModuleFileNameW
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
GetFileInformationByHandle
GetDriveTypeW
SetEnvironmentVariableW
GetProcessHeap
DeleteFileW
GetTimeZoneInformation
WaitForSingleObjectEx
FreeLibraryAndExitThread
ExitThread
CreateThread
GetModuleHandleExW
ExitProcess
GetFileType
CreateFileW
TlsFree
TlsSetValue
IsDebuggerPresent
OutputDebugStringW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
CreateEventW
GetModuleHandleW
GetStartupInfoW
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwind
EncodePointer
TlsAlloc
TlsGetValue
advapi32
CryptHashData
CryptCreateHash
CryptGetHashParam
CryptReleaseContext
CryptAcquireContextA
CryptDestroyHash
bcrypt
BCryptGenRandom
Sections
.text Size: 725KB - Virtual size: 725KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 66KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 25KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 34.6MB - Virtual size: 34.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ