Static task
static1
Behavioral task
behavioral1
Sample
2024-10-05_7437f967866375e049f2856f48b17045_avoslocker_hijackloader.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-05_7437f967866375e049f2856f48b17045_avoslocker_hijackloader.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-10-05_7437f967866375e049f2856f48b17045_avoslocker_hijackloader
-
Size
2.8MB
-
MD5
7437f967866375e049f2856f48b17045
-
SHA1
5eea5136a1069b3d92d2a88abad27ea46ca850b7
-
SHA256
ee70562cf223882c1e1b3d563c6eadf5ed4eff487b6e86144f70545e2823dbe3
-
SHA512
6b1bae5e549ce23ffaebb94786a1966eb00a41714f7b79e0530a2e9a6e24e9d13279e6b889c3a64ba61ca02b3d893000deaafef5a66d9401dccafdf878990057
-
SSDEEP
49152:8DU/zXNUfEeXAxhF2rl/IuOryOvKODjj3POMjUfkptVxp/Kj79efCY:8DU/jIEeQfoR/IuOFVjUu5S5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-10-05_7437f967866375e049f2856f48b17045_avoslocker_hijackloader
Files
-
2024-10-05_7437f967866375e049f2856f48b17045_avoslocker_hijackloader.exe windows:6 windows x86 arch:x86
9841ebde0455176831e66c2c6381dfb0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
GetTokenInformation
RegCloseKey
OpenProcessToken
CopySid
EqualSid
ConvertStringSidToSidA
ConvertStringSecurityDescriptorToSecurityDescriptorA
kernel32
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetProcessHeap
HeapSize
WriteConsoleW
FlushFileBuffers
ReadFile
GetFileSizeEx
SetFilePointerEx
CreateDirectoryA
GetLastError
WaitForSingleObject
GetExitCodeProcess
CreateProcessA
GetModuleHandleA
GetModuleHandleExA
GetProcAddress
SetDllDirectoryA
MultiByteToWideChar
WideCharToMultiByte
CloseHandle
GetCurrentProcess
LocalFree
GetCommandLineW
GetTempPathA
SetLastError
GetSystemDirectoryA
GetNativeSystemInfo
GetModuleFileNameA
GetModuleHandleExW
CreateFileA
DeleteFileA
FindClose
FindFirstFileA
FindNextFileA
GetDriveTypeA
GetFileAttributesA
RemoveDirectoryA
SetFileAttributesA
DecodePointer
RaiseException
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetTickCount
CopyFileA
MoveFileExA
LoadResource
LockResource
SizeofResource
FindResourceA
Sleep
GetCurrentProcessId
GetCurrentThreadId
GetLocalTime
FormatMessageW
FreeLibrary
LoadLibraryW
EnumSystemLocalesW
GetStringTypeW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
EncodePointer
LCMapStringEx
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
OutputDebugStringW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
IsValidCodePage
FindNextFileW
FindFirstFileExW
HeapReAlloc
SetEndOfFile
SetStdHandle
RtlUnwind
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
GetCommandLineA
WriteFile
GetConsoleOutputCP
GetConsoleMode
CreateFileW
GetFileType
GetStdHandle
GetModuleFileNameW
ExitProcess
HeapFree
HeapAlloc
ReadConsoleW
Sections
.text Size: 183KB - Virtual size: 183KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 71KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.9MB - Virtual size: 1.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 576KB - Virtual size: 580KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE