Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Behavioral task
behavioral1
Sample
2024-01-09_ae45c6cebda8480eb1386e8a1d716740_clop_cobalt-strike.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-09_ae45c6cebda8480eb1386e8a1d716740_clop_cobalt-strike.exe
Resource
win10v2004-20231215-en
Target
2024-01-09_ae45c6cebda8480eb1386e8a1d716740_clop_cobalt-strike
Size
107KB
MD5
ae45c6cebda8480eb1386e8a1d716740
SHA1
9027f9d584254f94969815396aa18561470be5ae
SHA256
491a6af81acbfab366c9352a40a513f5f2f6e095f1b397d180b629e6dadbbe1a
SHA512
7698cbff56803f902fa3bf0ed406a28dc434f134aad161224ac1da98d2309422a2b57cdc21dc921453841de488fa2411f8f60e5fe7c6440f7b164669fadae00c
SSDEEP
3072:IO4PuGUKJwRdtct2HhEBy852+wnioW+QBCovx:IJU3RdtcteEBR0l1ovx
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageServerAuth
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
ExtKeyUsageEmailProtection
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GlobalFree
CloseHandle
GetSystemInfo
CreateThread
MoveFileExW
lstrcpyW
CreateFileMappingW
MapViewOfFile
lstrcmpW
GetDriveTypeW
GetShortPathNameA
GetModuleFileNameA
EraseTape
CompareStringW
GetLongPathNameW
lstrlenW
ReleaseSemaphore
EnumResourceTypesW
TerminateProcess
GetUserDefaultUILanguage
GetDllDirectoryA
CreateMutexW
OpenFile
GetFirmwareEnvironmentVariableA
GetEnvironmentVariableA
GetComputerNameExW
GlobalDeleteAtom
GetACP
OpenProcess
GetConsoleAliasExesA
CreateToolhelp32Snapshot
CreateEventW
GetFileInformationByHandle
GetDevicePowerState
Process32NextW
GetConsoleDisplayMode
EncodeSystemPointer
ReadConsoleInputW
CreateFileA
SetEvent
DefineDosDeviceA
lstrcpyA
GetMailslotInfo
Process32FirstW
Sleep
GetProcAddress
GlobalLock
GetStartupInfoA
ExitProcess
GetCurrentProcessId
WideCharToMultiByte
DeleteTimerQueueTimer
ReadFileScatter
GetSystemRegistryQuota
WaitNamedPipeW
GetProfileStringA
SizeofResource
GetCurrentDirectoryA
LockResource
LoadResource
FindResourceW
GetModuleHandleW
DecodePointer
WriteConsoleW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
HeapReAlloc
HeapSize
GetProcessHeap
GetStringTypeW
GetFileType
SetStdHandle
RaiseException
LCMapStringW
DeleteFileW
GlobalAlloc
lstrcatW
GetCurrentThread
GetLastError
SetFileAttributesW
UnmapViewOfFile
CreateFileW
WaitForSingleObject
FindClose
lstrlenA
SetFilePointer
SetErrorMode
VirtualAlloc
WriteFile
FindNextFileW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
VirtualFree
FindFirstFileW
FindAtomA
ReadFile
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwind
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
GetStdHandle
MultiByteToWideChar
GetModuleHandleExW
HeapFree
HeapAlloc
FindFirstFileExA
wsprintfW
CharUpperW
DestroyWindow
SetActiveWindow
GetKeyboardState
wsprintfA
IsWindow
GetClassLongA
IsDialogMessageW
MapWindowPoints
GetKeyboardLayout
DrawTextExW
GetDlgItem
CharUpperBuffW
GetSysColorBrush
IsWindowUnicode
DialogBoxParamW
GetDC
AbortDoc
CreateHatchBrush
GetTextCharset
GetBkColor
OpenPrinterW
RegOpenKeyW
CryptGenKey
CryptExportKey
SetServiceStatus
RegisterServiceCtrlHandlerW
StartServiceCtrlDispatcherW
CryptReleaseContext
CryptDestroyKey
CryptAcquireContextW
CryptEncrypt
SHGetSpecialFolderPathW
ShellExecuteA
StrStrW
PathFindFileNameW
CryptStringToBinaryA
CryptDecodeObjectEx
CryptImportPublicKeyInfoEx
WNetOpenEnumW
WNetEnumResourceW
WNetCloseEnum
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ