Static task
static1
Behavioral task
behavioral1
Sample
2024-10-08_8da47f17312a9eecc2d55523a0e092bf_avoslocker_hijackloader.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-10-08_8da47f17312a9eecc2d55523a0e092bf_avoslocker_hijackloader.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-08_8da47f17312a9eecc2d55523a0e092bf_avoslocker_hijackloader
-
Size
2.8MB
-
MD5
8da47f17312a9eecc2d55523a0e092bf
-
SHA1
6a2bf7bfedfe23be88907aca83317e13d3422357
-
SHA256
6beac5084fc21f2165a5026ec72ba9bf1489f782e623677fa4bc4ca6ebf60e92
-
SHA512
e3d15af8cd6f4ec8407ecd0cf1923587cd81d719f6fc5c0eb3728f67580a35289c65b09fddfc0d26448d6501f820c332b015eab47f314e9b365a4719b7e9ca89
-
SSDEEP
49152:BDU/zXNUfEeXAxhF2rl/IuOryOvKODjj3POMjUfkptVxp/4Dmg27RnWGj:BDU/jIEeQfoR/IuOFVjUu5OD527BWG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-10-08_8da47f17312a9eecc2d55523a0e092bf_avoslocker_hijackloader
Files
-
2024-10-08_8da47f17312a9eecc2d55523a0e092bf_avoslocker_hijackloader.exe windows:6 windows x86 arch:x86
9841ebde0455176831e66c2c6381dfb0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
GetTokenInformation
RegCloseKey
OpenProcessToken
CopySid
EqualSid
ConvertStringSidToSidA
ConvertStringSecurityDescriptorToSecurityDescriptorA
kernel32
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetProcessHeap
HeapSize
WriteConsoleW
FlushFileBuffers
ReadFile
GetFileSizeEx
SetFilePointerEx
CreateDirectoryA
GetLastError
WaitForSingleObject
GetExitCodeProcess
CreateProcessA
GetModuleHandleA
GetModuleHandleExA
GetProcAddress
SetDllDirectoryA
MultiByteToWideChar
WideCharToMultiByte
CloseHandle
GetCurrentProcess
LocalFree
GetCommandLineW
GetTempPathA
SetLastError
GetSystemDirectoryA
GetNativeSystemInfo
GetModuleFileNameA
GetModuleHandleExW
CreateFileA
DeleteFileA
FindClose
FindFirstFileA
FindNextFileA
GetDriveTypeA
GetFileAttributesA
RemoveDirectoryA
SetFileAttributesA
DecodePointer
RaiseException
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetTickCount
CopyFileA
MoveFileExA
LoadResource
LockResource
SizeofResource
FindResourceA
Sleep
GetCurrentProcessId
GetCurrentThreadId
GetLocalTime
FormatMessageW
FreeLibrary
LoadLibraryW
EnumSystemLocalesW
GetStringTypeW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
EncodePointer
LCMapStringEx
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
OutputDebugStringW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
IsValidCodePage
FindNextFileW
FindFirstFileExW
HeapReAlloc
SetEndOfFile
SetStdHandle
RtlUnwind
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
GetCommandLineA
WriteFile
GetConsoleOutputCP
GetConsoleMode
CreateFileW
GetFileType
GetStdHandle
GetModuleFileNameW
ExitProcess
HeapFree
HeapAlloc
ReadConsoleW
Sections
.text Size: 183KB - Virtual size: 183KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 71KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.9MB - Virtual size: 1.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 576KB - Virtual size: 580KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE