Static task
static1
Behavioral task
behavioral1
Sample
2024-10-03_5f2ecf2c8a618f38365fb8ac2dd3b9f4_avoslocker_hijackloader.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-03_5f2ecf2c8a618f38365fb8ac2dd3b9f4_avoslocker_hijackloader.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-10-03_5f2ecf2c8a618f38365fb8ac2dd3b9f4_avoslocker_hijackloader
-
Size
2.8MB
-
MD5
5f2ecf2c8a618f38365fb8ac2dd3b9f4
-
SHA1
904a56e9db013038345d190ed68c124eefb29fbf
-
SHA256
beb508c3b077d3b0e0e0e785591e382a3c81d7e446728e3ca1c61b50c40118fb
-
SHA512
d58619eda5ac5d113b677ed3130e72b2b63e626bdecb17b967926bcff3c73ad51a91a5e8bd316214c52576ab87179ab690d886059ab3e37251056c50baa33020
-
SSDEEP
49152:HDU/zXNUfEeXAxhF2rl/IuOryOvKODjj3POMjUfkptVxp/CzDOQ0K:HDU/jIEeQfoR/IuOFVjUu5gDb0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-10-03_5f2ecf2c8a618f38365fb8ac2dd3b9f4_avoslocker_hijackloader
Files
-
2024-10-03_5f2ecf2c8a618f38365fb8ac2dd3b9f4_avoslocker_hijackloader.exe windows:6 windows x86 arch:x86
9841ebde0455176831e66c2c6381dfb0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
GetTokenInformation
RegCloseKey
OpenProcessToken
CopySid
EqualSid
ConvertStringSidToSidA
ConvertStringSecurityDescriptorToSecurityDescriptorA
kernel32
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetProcessHeap
HeapSize
WriteConsoleW
FlushFileBuffers
ReadFile
GetFileSizeEx
SetFilePointerEx
CreateDirectoryA
GetLastError
WaitForSingleObject
GetExitCodeProcess
CreateProcessA
GetModuleHandleA
GetModuleHandleExA
GetProcAddress
SetDllDirectoryA
MultiByteToWideChar
WideCharToMultiByte
CloseHandle
GetCurrentProcess
LocalFree
GetCommandLineW
GetTempPathA
SetLastError
GetSystemDirectoryA
GetNativeSystemInfo
GetModuleFileNameA
GetModuleHandleExW
CreateFileA
DeleteFileA
FindClose
FindFirstFileA
FindNextFileA
GetDriveTypeA
GetFileAttributesA
RemoveDirectoryA
SetFileAttributesA
DecodePointer
RaiseException
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetTickCount
CopyFileA
MoveFileExA
LoadResource
LockResource
SizeofResource
FindResourceA
Sleep
GetCurrentProcessId
GetCurrentThreadId
GetLocalTime
FormatMessageW
FreeLibrary
LoadLibraryW
EnumSystemLocalesW
GetStringTypeW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
EncodePointer
LCMapStringEx
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
OutputDebugStringW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
IsValidCodePage
FindNextFileW
FindFirstFileExW
HeapReAlloc
SetEndOfFile
SetStdHandle
RtlUnwind
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
GetCommandLineA
WriteFile
GetConsoleOutputCP
GetConsoleMode
CreateFileW
GetFileType
GetStdHandle
GetModuleFileNameW
ExitProcess
HeapFree
HeapAlloc
ReadConsoleW
Sections
.text Size: 183KB - Virtual size: 183KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 71KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.9MB - Virtual size: 1.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 576KB - Virtual size: 580KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE