Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-08_d350c5e93f389cbb7c44c873c38f5eb8_avoslocker_hijackloader_qakbot_revil.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-08_d350c5e93f389cbb7c44c873c38f5eb8_avoslocker_hijackloader_qakbot_revil.exe
Resource
win10v2004-20241007-en
Target
2024-10-08_d350c5e93f389cbb7c44c873c38f5eb8_avoslocker_hijackloader_qakbot_revil
Size
2.5MB
MD5
d350c5e93f389cbb7c44c873c38f5eb8
SHA1
27d0b108b219a43ee547451911c5fd552daadf2d
SHA256
9c99e8f700c5b4ef90009b2bdf67559b7edd85541d259fffa1339f1665b841ec
SHA512
160b2846aa9815fb28dac6062b93dfeeeec2a618cb418abb27a52e0f5ecd27f75472ce1b9822f41c834b4f90fda37a227e2b8f6536eb8dffaa9de69880eb37f1
SSDEEP
49152:c+veA+1UtJ3CF/cfwG3Qh82oV21QiWMGS2tPrtmOaWmFhRZAP3l:c+v+UtIF7GAqDg1QiWo2ltmWmF2
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\buildworker\steam_rel_client_win32\build\src\SteamServiceHost\Release\SteamService_exe.pdb
RemoveDirectoryW
OutputDebugStringA
SetLastError
GetCurrentProcess
GetCurrentProcessId
ProcessIdToSessionId
GetVersionExA
GetModuleFileNameW
GlobalAlloc
GlobalUnlock
GlobalLock
LocalAlloc
VerifyVersionInfoW
WTSGetActiveConsoleSessionId
MultiByteToWideChar
CreateToolhelp32Snapshot
Process32First
Process32Next
InitializeCriticalSection
SetEvent
ResetEvent
CreateEventA
WideCharToMultiByte
GetCurrentDirectoryW
SetThreadAffinityMask
TlsFree
CreateDirectoryW
ExpandEnvironmentStringsA
WriteConsoleW
GetStringTypeW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
DecodePointer
SetStdHandle
GetConsoleCP
SetFilePointerEx
VerSetConditionMask
HeapReAlloc
LCMapStringW
CompareStringW
HeapFree
HeapAlloc
GetFullPathNameW
GetFileSize
DeleteCriticalSection
LocalFree
GetTickCount
OpenProcess
TerminateProcess
CreateSymbolicLinkW
DeviceIoControl
GetConsoleWindow
SetConsoleTitleW
SetConsoleCtrlHandler
MoveFileExW
CopyFileW
Sleep
CreateMutexA
ReleaseMutex
OutputDebugStringW
WriteFile
SetFilePointer
SetFileAttributesW
ReadFile
GetFileInformationByHandle
GetProcAddress
GetFileAttributesExW
GetFileAttributesW
FindNextFileW
FindFirstFileW
FindClose
DeleteFileW
CreateFileW
GetCommandLineW
CreateProcessW
GetExitCodeProcess
WaitForSingleObject
CloseHandle
SetCurrentDirectoryW
ExpandEnvironmentStringsW
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetLastError
GetModuleHandleA
LeaveCriticalSection
EnterCriticalSection
GetCurrentThreadId
FindResourceA
LockResource
LoadResource
LoadLibraryExA
FreeLibrary
ExitProcess
HeapValidate
HeapSize
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
GetModuleHandleExW
GetLocalTime
VirtualQuery
EncodePointer
RtlUnwind
InitializeSListHead
GetStartupInfoW
IsProcessorFeaturePresent
UnhandledExceptionFilter
SleepConditionVariableSRW
WakeAllConditionVariable
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
SystemTimeToFileTime
GetSystemTime
ReadConsoleW
ReadConsoleA
TlsSetValue
TlsGetValue
TlsAlloc
GetExitCodeThread
TerminateThread
OpenThread
SetConsoleMode
GetConsoleMode
ConvertFiberToThread
DeleteFiber
GetFileType
GetEnvironmentVariableW
GetStdHandle
SetProcessAffinityMask
GetProcessHeaps
LoadLibraryA
GetTimeZoneInformation
DebugBreak
SetUnhandledExceptionFilter
QueryPerformanceFrequency
QueryPerformanceCounter
FindFirstFileExW
FlushFileBuffers
GetDiskFreeSpaceA
GetDriveTypeW
GetFileSizeEx
SetEndOfFile
SetFileTime
SleepEx
GetSystemTimeAsFileTime
GetModuleHandleW
LoadLibraryExW
LoadLibraryW
GlobalMemoryStatusEx
VirtualAlloc
VirtualProtect
GetModuleFileNameA
IsDebuggerPresent
GetCommandLineA
GetProcessHeap
HeapSetInformation
HeapLock
HeapUnlock
HeapWalk
HeapQueryInformation
GetSystemInfo
GetProcessAffinityMask
DuplicateHandle
RaiseException
InitializeCriticalSectionAndSpinCount
TryEnterCriticalSection
SwitchToThread
CreateThread
GetCurrentThread
OpenClipboard
SetDlgItemTextA
GetDlgItemInt
SetDlgItemInt
SetClipboardData
MessageBoxA
GetProcessWindowStation
GetUserObjectInformationW
IsWindowVisible
EmptyClipboard
CloseClipboard
GetWindowTextLengthA
MessageBoxW
GetDesktopWindow
GetDlgItem
GetWindowThreadProcessId
EnumWindows
EndDialog
GetWindowRect
wsprintfA
SetWindowPos
DialogBoxParamA
ShowWindow
RegisterEventSourceW
DeregisterEventSource
SetNamedSecurityInfoW
RegSetValueExW
RegQueryValueExW
RegEnumValueW
RegDeleteValueW
LookupPrivilegeValueA
SetTokenInformation
DuplicateTokenEx
AdjustTokenPrivileges
OpenProcessToken
CreateProcessAsUserW
ConvertStringSidToSidW
SetEntriesInAclW
StartServiceW
StartServiceCtrlDispatcherW
SetServiceStatus
SetServiceObjectSecurity
RegisterServiceCtrlHandlerW
QueryServiceStatusEx
QueryServiceStatus
QueryServiceObjectSecurity
OpenServiceW
OpenSCManagerW
DeleteService
CreateServiceW
ControlService
CloseServiceHandle
ChangeServiceConfig2W
ChangeServiceConfigW
GetSecurityDescriptorDacl
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegSetValueExA
RegQueryValueExA
RegQueryInfoKeyA
RegOpenKeyExA
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegCreateKeyExA
RegCloseKey
ReportEventW
SHGetFolderPathW
ShellExecuteW
CommandLineToArgvW
CoUninitialize
CoInitializeEx
CoCreateInstance
VariantClear
VariantInit
SysFreeString
SysAllocString
WSAGetLastError
recv
send
WSACleanup
closesocket
gethostname
WSAStartup
WSASetLastError
SHDeleteKeyA
WinVerifyTrust
GetModuleFileNameExW
GetProcessMemoryInfo
BCryptGenRandom
CreateInterface
g_dwDllEntryThreadId
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ