Static task
static1
Behavioral task
behavioral1
Sample
2024-10-14_bd8331e7ec5bca5dc3688a074eb70614_avoslocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-14_bd8331e7ec5bca5dc3688a074eb70614_avoslocker.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-14_bd8331e7ec5bca5dc3688a074eb70614_avoslocker
-
Size
2.3MB
-
MD5
bd8331e7ec5bca5dc3688a074eb70614
-
SHA1
45f9a1afd8ab0b2cb5040e3229626dcf4a63bc81
-
SHA256
a291f4383fa754ac88cf99777d37465182fa456869c59f3e823e84fc586065f2
-
SHA512
fca4f8879bb557df8bd214955fd271d8686739cfb20ad6cd68e0ecd1e8e6ed0f702cc55ac40468988e3bfe7a9396fc7f6dbf5b18eca36684b53708b55e4f6162
-
SSDEEP
49152:pluTFHa2N+qOkYvDQb6pLr4E1GGlq5GC96AYPZZunkYLhm:pluTFnTOtDQb69r4E1tY5S94dtm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-10-14_bd8331e7ec5bca5dc3688a074eb70614_avoslocker
Files
-
2024-10-14_bd8331e7ec5bca5dc3688a074eb70614_avoslocker.exe windows:5 windows x86 arch:x86
7d3c36341b27bfb392bab9b19fabc70d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetWindowsDirectoryA
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GlobalAlloc
GlobalUnlock
GlobalLock
GlobalHandle
GlobalFree
GlobalMemoryStatus
LocalAlloc
LocalFree
DosDateTimeToFileTime
lstrcmpiA
lstrcpyA
lstrcatA
lstrlenA
lstrlenW
_lopen
GetVersion
CreateFileA
_lwrite
_lclose
_llseek
VerifyVersionInfoW
MultiByteToWideChar
GetCommandLineA
GetCommandLineW
DeleteFileA
FindNextFileA
GetFileAttributesA
GetLongPathNameA
RemoveDirectoryA
GetTempPathA
WaitForSingleObject
CreateProcessA
GetTickCount
GetSystemDirectoryA
LoadLibraryExA
CopyFileA
CreateFileW
GetSystemTime
CreateProcessW
ExitProcess
SetErrorMode
CloseHandle
GetVolumeInformationA
WriteFile
SetFileTime
LocalFileTimeToFileTime
GetDriveTypeA
FindFirstFileA
_lcreat
FindClose
CreateDirectoryA
GetCurrentDirectoryA
SetCurrentDirectoryA
VerSetConditionMask
GetEnvironmentVariableA
_lread
RaiseException
GetLastError
GetSystemInfo
VirtualProtect
VirtualQuery
FreeLibrary
GetModuleHandleW
GetProcAddress
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwind
SetLastError
EncodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
GetStdHandle
GetModuleHandleExW
WideCharToMultiByte
HeapFree
HeapAlloc
GetFileType
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetStringTypeW
LCMapStringW
GetProcessHeap
SetFilePointerEx
HeapSize
HeapReAlloc
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
DecodePointer
WriteConsoleW
gdi32
ExtTextOutA
SetTextAlign
SetTextColor
SetBkColor
GetTextExtentPoint32A
GetBkColor
SelectObject
GetDeviceCaps
DeleteObject
DeleteDC
CreateFontIndirectA
CreateDCA
advapi32
RegGetValueW
RegOpenKeyW
RegEnumValueW
RegCloseKey
RegQueryValueW
Sections
.text Size: 107KB - Virtual size: 107KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
_winzip_ Size: 2.1MB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ