Static task
static1
Behavioral task
behavioral1
Sample
2024-09-21_7f42b3c62fe1bcb9a4aac7d8f55c39c3_avoslocker_hijackloader.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-21_7f42b3c62fe1bcb9a4aac7d8f55c39c3_avoslocker_hijackloader.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-21_7f42b3c62fe1bcb9a4aac7d8f55c39c3_avoslocker_hijackloader
-
Size
2.8MB
-
MD5
7f42b3c62fe1bcb9a4aac7d8f55c39c3
-
SHA1
d90be0187f2a78c03707eacb2bfa1430eab9c5d7
-
SHA256
e02c0de17976c04fac23ad615e9649a6fd9355e1c97b24a1764277288ea3968f
-
SHA512
c6b28d4d1283926839d133ba8d149d7a2f95132bbbc41e14349e7fc445307063bbce49293703ad0911cc6bb8d96e39acd9ad2ffd56b85ed8a337deda4caf3814
-
SSDEEP
49152:FDU/zXNUfEeXAxhF2rl/IuOryOvKODjj3POMjUfkptVxp/lDmg27RnWGj:FDU/jIEeQfoR/IuOFVjUu5/D527BWG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-21_7f42b3c62fe1bcb9a4aac7d8f55c39c3_avoslocker_hijackloader
Files
-
2024-09-21_7f42b3c62fe1bcb9a4aac7d8f55c39c3_avoslocker_hijackloader.exe windows:6 windows x86 arch:x86
9841ebde0455176831e66c2c6381dfb0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
GetTokenInformation
RegCloseKey
OpenProcessToken
CopySid
EqualSid
ConvertStringSidToSidA
ConvertStringSecurityDescriptorToSecurityDescriptorA
kernel32
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetProcessHeap
HeapSize
WriteConsoleW
FlushFileBuffers
ReadFile
GetFileSizeEx
SetFilePointerEx
CreateDirectoryA
GetLastError
WaitForSingleObject
GetExitCodeProcess
CreateProcessA
GetModuleHandleA
GetModuleHandleExA
GetProcAddress
SetDllDirectoryA
MultiByteToWideChar
WideCharToMultiByte
CloseHandle
GetCurrentProcess
LocalFree
GetCommandLineW
GetTempPathA
SetLastError
GetSystemDirectoryA
GetNativeSystemInfo
GetModuleFileNameA
GetModuleHandleExW
CreateFileA
DeleteFileA
FindClose
FindFirstFileA
FindNextFileA
GetDriveTypeA
GetFileAttributesA
RemoveDirectoryA
SetFileAttributesA
DecodePointer
RaiseException
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetTickCount
CopyFileA
MoveFileExA
LoadResource
LockResource
SizeofResource
FindResourceA
Sleep
GetCurrentProcessId
GetCurrentThreadId
GetLocalTime
FormatMessageW
FreeLibrary
LoadLibraryW
EnumSystemLocalesW
GetStringTypeW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
EncodePointer
LCMapStringEx
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
OutputDebugStringW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
IsValidCodePage
FindNextFileW
FindFirstFileExW
HeapReAlloc
SetEndOfFile
SetStdHandle
RtlUnwind
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
GetCommandLineA
WriteFile
GetConsoleOutputCP
GetConsoleMode
CreateFileW
GetFileType
GetStdHandle
GetModuleFileNameW
ExitProcess
HeapFree
HeapAlloc
ReadConsoleW
Sections
.text Size: 183KB - Virtual size: 183KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 71KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.9MB - Virtual size: 1.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 576KB - Virtual size: 580KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE