Static task
static1
Behavioral task
behavioral1
Sample
2024-09-08_e4b90843539ddda87359f2bece0e30f4_avoslocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-08_e4b90843539ddda87359f2bece0e30f4_avoslocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-08_e4b90843539ddda87359f2bece0e30f4_avoslocker
-
Size
4.6MB
-
MD5
e4b90843539ddda87359f2bece0e30f4
-
SHA1
e419148692c988448b67e62dfe2892f5c1e4a78f
-
SHA256
95d0c238bace6cd373731b61cefc9b865f7f11a3b1b9ce25a52a9ccbe8a5e91c
-
SHA512
199e84a87b27323c38385fb9aaf6796a9902bcdec9e911241ea14b63ab21d606bf381ca8ae17dbcddaafdc0a0b61439e72424a122af2e22dc1a16c686ef1d32a
-
SSDEEP
49152:q+MGeut4oaZ8SSJjB90kVu/bcgJWcnbt3o07F24TOsKf89SKYMJT8tlpR:SGesukE/YgJWcbPM4TOsKf89SKJT8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-08_e4b90843539ddda87359f2bece0e30f4_avoslocker
Files
-
2024-09-08_e4b90843539ddda87359f2bece0e30f4_avoslocker.exe windows:6 windows x86 arch:x86
fc91f2e268af185e5284255b0c01f832
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
d3dx9_43
D3DXMatrixRotationQuaternion
D3DXMatrixDecompose
D3DXLoadSurfaceFromSurface
D3DXMatrixTranspose
D3DXMatrixRotationAxis
D3DXComputeNormals
D3DXVec3TransformCoord
D3DXMatrixTranslation
D3DXMatrixRotationY
D3DXMatrixRotationZ
D3DXVec3Normalize
D3DXVec3TransformNormal
D3DXCreateMeshFVF
D3DXLoadMeshFromXW
D3DXCreateTextureFromFileInMemoryEx
D3DXGetFVFVertexSize
D3DXLoadMeshFromXInMemory
D3DXComputeBoundingSphere
D3DXCreateTextureFromFileExW
D3DXMatrixScaling
D3DXMatrixOrthoOffCenterLH
D3DXMatrixOrthoOffCenterRH
D3DXComputeNormalMap
D3DXMatrixInverse
D3DXCreateTexture
D3DXMatrixPerspectiveFovLH
D3DXMatrixLookAtLH
D3DXCreateEffect
D3DXVec4Transform
D3DXMatrixRotationX
D3DXMatrixMultiply
winmm
mmioDescend
mmioStringToFOURCCW
mmioRead
mmioSeek
mmioOpenW
kernel32
FlushFileBuffers
SetFilePointerEx
GetFileSizeEx
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetTimeZoneInformation
GetStdHandle
GetConsoleMode
ReadFile
InitializeCriticalSectionEx
GetTempPathW
LoadLibraryW
HeapFree
HeapSize
GetLastError
HeapReAlloc
RaiseException
HeapAlloc
DecodePointer
DeleteCriticalSection
GetProcessHeap
WriteFile
DeleteFileW
CopyFileW
WaitForSingleObject
Sleep
CloseHandle
CreateThread
SizeofResource
LockResource
LoadResource
FindResourceW
lstrcpyW
GetCommandLineW
TlsSetValue
TlsGetValue
LoadLibraryExW
TlsAlloc
TlsFree
EnterCriticalSection
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
GetVersionExW
ReadConsoleW
GetProcAddress
LocalFree
SetThreadExecutionState
GetModuleHandleW
FreeLibrary
GetCurrentProcess
lstrlenW
ExpandEnvironmentStringsW
GetFileAttributesW
GetVersionExA
QueryPerformanceFrequency
QueryPerformanceCounter
ResetEvent
SetEvent
GetCPInfo
GetLocaleInfoW
LCMapStringW
CompareStringW
EncodePointer
GetSystemTimeAsFileTime
SwitchToThread
CreateEventW
SetLastError
GetStringTypeW
WideCharToMultiByte
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
WaitForSingleObjectEx
IsDebuggerPresent
GetStartupInfoW
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
OutputDebugStringW
RtlUnwind
CreateFileW
GetDriveTypeW
GetCurrentDirectoryW
GetFileInformationByHandle
GetFileType
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
ExitProcess
GetFullPathNameW
SetStdHandle
FindClose
GetConsoleCP
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
WriteConsoleW
MultiByteToWideChar
GetModuleHandleExW
SetEndOfFile
user32
RegisterClassW
SetWindowPlacement
AdjustWindowRect
GetWindowPlacement
CallNextHookEx
GetIconInfo
IsWindowVisible
SetMenu
UnhookWindowsHookEx
DestroyMenu
ClipCursor
SetWindowsHookExW
GetDC
DestroyWindow
GetMenu
SetWindowLongW
IsZoomed
GetWindowLongW
EnumDisplaySettingsW
SystemParametersInfoA
GetClassLongW
SetRect
SystemParametersInfoW
IsIconic
ReleaseDC
GetWindowTextW
SetWindowPos
CreateWindowExW
GetSystemMetrics
DispatchMessageW
PeekMessageW
TranslateMessage
GetClientRect
DefWindowProcW
MessageBoxW
SendMessageW
ShowWindow
PostQuitMessage
BeginPaint
EndPaint
GetWindow
GetWindowRect
ScreenToClient
InvalidateRect
GetCursorPos
UnregisterClassW
RegisterClassExW
LoadIconW
LoadCursorW
SetCursor
GetMonitorInfoW
LoadStringW
gdi32
GetObjectW
GetStockObject
SelectObject
CreateCompatibleDC
DeleteDC
GetDIBits
DeleteObject
shell32
ShellExecuteW
CommandLineToArgvW
ExtractIconW
ole32
CoCreateGuid
CLSIDFromString
CoCreateInstance
CoInitialize
StringFromGUID2
oleaut32
SysAllocString
SysFreeString
comctl32
ord17
shlwapi
PathFindFileNameW
PathFileExistsW
Sections
.text Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 328KB - Virtual size: 327KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 48KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.5MB - Virtual size: 2.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 111KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ