Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-24_9274eca87060e50924574e3ff9d09c75_avoslocker_cobalt-strike.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-04-24_9274eca87060e50924574e3ff9d09c75_avoslocker_cobalt-strike.exe
Resource
win10v2004-20240412-en
Target
2024-04-24_9274eca87060e50924574e3ff9d09c75_avoslocker_cobalt-strike
Size
449KB
MD5
9274eca87060e50924574e3ff9d09c75
SHA1
cdb08ba6f556320bf7f04e1ce3d625151378b6cc
SHA256
67f034f7d0869e572f652b062f31c2482eb72c2724e044a1564f33aff00091af
SHA512
d65000b83a05f08fb770092e54aa3a677e9076afa2385f1908f41e0b0433e4902b10b5152bcabd7643f0dd1186bcc3ccb3ffd9ed11d2ec0a0bb98ae07d6bdebe
SSDEEP
6144:0KdO3mK6X6AmIKI0SVBWmoVEVbuLoYHFfAOXO6huLhus2FtFk:YWdX6AmIKI0cAouLoYd8MsD2Fta
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
O:\webex-windows-plugin\output\i386\bin\Release\webex.pdb
GetUserGeoID
GetUserDefaultLCID
SetThreadUILanguage
GetThreadUILanguage
DecodePointer
RaiseException
InitializeCriticalSectionEx
lstrlenW
MultiByteToWideChar
WideCharToMultiByte
MapViewOfFile
UnmapViewOfFile
CreateFileMappingA
SetLastError
LocalFree
FormatMessageW
WaitForSingleObject
Sleep
CreateThread
TerminateThread
GetFileSize
ReadFile
SetFilePointer
GetVersionExW
FreeLibrary
GetProcAddress
LoadLibraryW
lstrcpynW
GetSystemDefaultLangID
CreateProcessA
GetNativeSystemInfo
SetEvent
CreateEventW
OpenEventW
LCIDToLocaleName
GetLocaleInfoEx
GetCurrentProcess
CreateProcessW
IsProcessInJob
FindResourceExW
FreeResource
LoadResource
LockResource
CreateFileW
GetConsoleMode
GetGeoInfoA
SetFilePointerEx
GetLocalTime
SetStdHandle
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
HeapReAlloc
GetFileType
HeapAlloc
HeapFree
GetStdHandle
GetModuleFileNameW
GetModuleHandleExW
ExitProcess
GetFileAttributesExW
QueryPerformanceFrequency
LoadLibraryExW
RtlUnwind
OutputDebugStringW
WriteConsoleW
InitializeSListHead
QueryPerformanceCounter
GetStartupInfoW
IsDebuggerPresent
WaitForSingleObjectEx
ResetEvent
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStringTypeW
LCMapStringW
GetModuleHandleW
GetModuleFileNameA
GetSystemTimeAsFileTime
CreateMutexW
GetLastError
GetTempFileNameA
GetConsoleOutputCP
GetCommandLineA
TlsFree
TlsSetValue
TlsGetValue
GetCurrentThreadId
GetCurrentProcessId
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
CloseHandle
GetTempPathA
WriteFile
FlushFileBuffers
CreateFileA
HeapSize
SetDefaultDllDirectories
GetSystemInfo
VirtualProtect
VirtualQuery
LoadLibraryExA
EncodePointer
GetCPInfo
InitializeCriticalSectionAndSpinCount
TlsAlloc
LoadImageW
GetClientRect
GetWindowTextW
DrawTextW
DialogBoxParamW
ChangeWindowMessageFilterEx
LoadIconW
LoadCursorW
GetWindowThreadProcessId
SetWindowLongW
GetWindowLongW
SetCursor
GetWindowRect
SetWindowTextW
SetWindowTextA
SetPropW
SetPropA
SetForegroundWindow
GetForegroundWindow
SetActiveWindow
UpdateWindow
KillTimer
SetTimer
SetFocus
DefDlgProcW
GetDlgItem
CreateDialogParamW
BringWindowToTop
IsWindowVisible
SetWindowPos
ShowWindow
DestroyWindow
CreateWindowExW
RegisterClassW
AttachThreadInput
SendMessageW
FindWindowExA
GetDesktopWindow
WaitForInputIdle
GetMonitorInfoW
MonitorFromPoint
GetCursorPos
ReleaseDC
GetDC
PostQuitMessage
PostMessageW
LoadStringW
DispatchMessageW
TranslateMessage
GetMessageW
MessageBoxExW
SelectObject
GetTextExtentPoint32W
GetStockObject
DeleteObject
GetDeviceCaps
CreateFontIndirectW
SetTextColor
SHGetFolderPathA
ShellExecuteW
CryptDestroyHash
CryptReleaseContext
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
ConvertStringSecurityDescriptorToSecurityDescriptorW
CryptAcquireContextW
CryptHashData
CryptCreateHash
CryptGetHashParam
InitCommonControlsEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ