Static task
static1
Behavioral task
behavioral1
Sample
2024-09-13_76ecc05d3f9c1ca855726d6ab7970835_avoslocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-13_76ecc05d3f9c1ca855726d6ab7970835_avoslocker.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-13_76ecc05d3f9c1ca855726d6ab7970835_avoslocker
-
Size
25.8MB
-
MD5
76ecc05d3f9c1ca855726d6ab7970835
-
SHA1
87274004ff58f8c7eed9587bae20c9a323ebd51f
-
SHA256
e4d88f14409053b59dca9987f251ef98c8459dca2859f65e686393de7aec5810
-
SHA512
872e82a59c143be5e8576dd173c6f64650c671ec98ba5621e5639aed96b3ec99e2391a4bdc41297dc2b077bb5b6042c6e7fa4894074b9bdef84b2cc8744eb112
-
SSDEEP
786432:MLXAGTIYtdAhHoQWPfCDbvXRyhdTH7HBvPpzl:MLXNTIWdaAPfCDbf+dD7HBpzl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-13_76ecc05d3f9c1ca855726d6ab7970835_avoslocker
Files
-
2024-09-13_76ecc05d3f9c1ca855726d6ab7970835_avoslocker.exe windows:6 windows x86 arch:x86
de7577ca85b1defbcc9fd28fcfaad16a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
kernel32
GetCurrentProcess
lstrcmpA
GetThreadLocale
SetThreadLocale
DeviceIoControl
SetFileAttributesW
MoveFileExW
SetEndOfFile
GetFileSizeEx
InitializeCriticalSectionAndSpinCount
DecodePointer
WriteConsoleW
FlushFileBuffers
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetQueuedCompletionStatus
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
GetConsoleOutputCP
CreateEventW
GetConsoleMode
SetFilePointerEx
GetFileType
GetStdHandle
ExitProcess
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
QueryPerformanceFrequency
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
RtlUnwind
GetSystemTimeAsFileTime
QueryPerformanceCounter
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WaitForSingleObjectEx
LCMapStringEx
GetCPInfo
GetStringTypeW
LoadLibraryExA
VirtualFree
VirtualAlloc
IsProcessorFeaturePresent
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
EncodePointer
IsDebuggerPresent
RaiseException
GetLastError
GetFileAttributesExW
GetTimeZoneInformation
CreateIoCompletionPort
GetExitCodeThread
GetSystemInfo
PostQueuedCompletionStatus
SetEvent
ResetEvent
GetSystemTime
HeapDestroy
HeapAlloc
GetNativeSystemInfo
lstrlenA
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
InitializeCriticalSectionEx
DeleteCriticalSection
FindResourceExW
LoadResource
LockResource
SizeofResource
FindResourceW
SetLastError
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
GetModuleFileNameW
GetFileSize
DeleteFileW
WriteFile
CreateFileA
SystemTimeToFileTime
GetWindowsDirectoryW
FileTimeToSystemTime
LocalFree
LocalAlloc
K32GetModuleFileNameExW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
ReadFile
GetStartupInfoW
TerminateProcess
GetExitCodeProcess
CreateProcessW
MoveFileW
RemoveDirectoryW
FindClose
FindNextFileW
FindFirstFileW
OutputDebugStringW
SetFilePointer
GetPrivateProfileStringW
GetPrivateProfileIntW
CopyFileW
lstrlenW
CreateThread
TerminateThread
WaitForSingleObject
InitializeCriticalSection
GetVersionExW
ReadConsoleW
LoadLibraryW
GetTickCount
GetModuleHandleW
MulDiv
GetCurrentProcessId
OpenProcess
FreeResource
GlobalFree
GlobalAlloc
Sleep
VerSetConditionMask
VerifyVersionInfoW
WideCharToMultiByte
MultiByteToWideChar
WritePrivateProfileStringW
lstrcmpiW
LoadLibraryExW
GetProcAddress
FreeLibrary
CloseHandle
CreateFileW
CreateDirectoryW
GetVersion
SetStdHandle
user32
GetShellWindow
IsClipboardFormatAvailable
RegisterClipboardFormatW
GetSysColor
SetCaretPos
CreateCaret
GetCaretBlinkTime
wsprintfW
UpdateWindow
UpdateLayeredWindow
SetActiveWindow
SetWindowPos
MoveWindow
ShowWindow
PostQuitMessage
LoadCursorW
KillTimer
SetTimer
DestroyWindow
IsWindow
CreateWindowExW
GetClassInfoExW
RegisterClassExW
SetWindowLongW
GetWindowLongW
GetDlgItem
UnregisterClassW
CallWindowProcW
DefWindowProcW
IsRectEmpty
SendMessageW
SetWindowTextW
FillRect
CharLowerBuffW
BringWindowToTop
AttachThreadInput
GetWindowThreadProcessId
GetFocus
GetWindowTextLengthW
GetClientRect
GetWindowRect
MapWindowPoints
GetParent
GetWindow
LoadIconW
MonitorFromWindow
GetMonitorInfoW
MessageBoxW
GetMessageW
TranslateMessage
DispatchMessageW
PeekMessageW
CharNextW
GetCursorPos
WindowFromPoint
SetRectEmpty
EqualRect
SetCursor
ClientToScreen
PtInRect
ScreenToClient
GetDoubleClickTime
CopyRect
IntersectRect
PostMessageW
SystemParametersInfoW
BeginPaint
EndPaint
IsIconic
InvalidateRect
TrackMouseEvent
SetFocus
SetCapture
ReleaseCapture
SetWindowRgn
EnableWindow
GetForegroundWindow
GetWindowTextW
SetForegroundWindow
IsWindowVisible
IsZoomed
MonitorFromRect
OffsetRect
SetLayeredWindowAttributes
LoadImageW
ReleaseDC
DrawTextW
GetCursor
GetIconInfo
GetDC
gdi32
CreatePen
RestoreDC
ExtSelectClipRgn
CreateRectRgnIndirect
SaveDC
GetDeviceCaps
GetStockObject
SetBkColor
CreateSolidBrush
GetBitmapBits
StretchBlt
SetStretchBltMode
Rectangle
CreateDIBSection
GetObjectW
SetTextColor
SetBkMode
CreateRectRgn
CombineRgn
CreateRoundRectRgn
DeleteDC
BitBlt
SelectObject
CreateCompatibleDC
DeleteObject
CreateFontIndirectW
SetBitmapBits
GetTextColor
GetCurrentObject
SetTextCharacterExtra
GetViewportOrgEx
SetPixel
advapi32
RegDeleteValueW
GetUserNameW
FreeSid
CheckTokenMembership
AllocateAndInitializeSid
ConvertSidToStringSidW
LookupAccountNameW
DeleteService
CloseServiceHandle
ControlService
StartServiceW
ChangeServiceConfigW
QueryServiceConfigW
QueryServiceStatus
OpenServiceW
OpenSCManagerW
SetSecurityDescriptorDacl
RegSetKeySecurity
InitializeSecurityDescriptor
RegEnumKeyW
CreateProcessWithTokenW
DuplicateTokenEx
OpenProcessToken
RegQueryValueExW
RegSetValueExW
RegQueryInfoKeyW
RegOpenKeyExW
RegEnumKeyExW
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
shell32
ShellExecuteExW
SHGetMalloc
SHGetPathFromIDListW
SHGetSpecialFolderLocation
SHBrowseForFolderW
ShellExecuteW
ord165
SHCreateDirectoryExW
SHChangeNotify
SHGetSpecialFolderPathW
ole32
CoInitializeSecurity
OleRun
RegisterDragDrop
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CreateStreamOnHGlobal
CoInitialize
CoTaskMemRealloc
CoTaskMemAlloc
CoCreateInstance
CoTaskMemFree
CoUninitialize
oleaut32
SysAllocString
VarBstrCmp
VarUI4FromStr
VariantCopy
VariantClear
LoadRegTypeLi
LoadTypeLi
SysFreeString
SysStringLen
VariantInit
GetErrorInfo
shlwapi
PathIsDirectoryW
PathSearchAndQualifyW
PathRemoveBackslashW
SHDeleteValueW
SHGetValueW
StrCmpIW
PathCombineW
PathAppendW
PathRemoveFileSpecW
PathRemoveExtensionW
PathFindFileNameW
PathFileExistsW
comctl32
ord17
DrawShadowText
InitCommonControlsEx
msimg32
AlphaBlend
wininet
HttpQueryInfoW
InternetCrackUrlW
InternetOpenW
InternetSetOptionW
InternetConnectW
HttpOpenRequestW
HttpSendRequestW
InternetCloseHandle
InternetReadFile
gdiplus
GdipCreateBitmapFromHICON
GdipCreateBitmapFromHBITMAP
GdipCreateBitmapFromScan0
GdipCreateBitmapFromStream
GdipCreateBitmapFromFile
GdipCreateSolidFill
GdipGetImagePixelFormat
GdipCloneImage
GdipBitmapLockBits
GdipDrawImageRectI
GdipGetImageWidth
GdipDeleteGraphics
GdipGetImageGraphicsContext
GdipCreateFromHDC
GdipDisposeImage
GdipAlloc
GdipFree
GdipDeleteBrush
GdipSetTextRenderingHint
GdipDrawString
GdipGetImageHeight
GdipCreateFontFamilyFromName
GdipDeleteFontFamily
GdipCreateFont
GdipDeleteFont
GdiplusStartup
GdipSetInterpolationMode
secur32
GetUserNameExW
crypt32
CryptBinaryToStringW
CryptStringToBinaryW
iphlpapi
GetAdaptersInfo
GetIpAddrTable
netapi32
Netbios
Sections
.text Size: 855KB - Virtual size: 855KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 170KB - Virtual size: 169KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 95KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 25.6MB - Virtual size: 25.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ