Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-29_d36e5eed8fcdbf3ef93f18971b3f2862_avoslocker_cobalt-strike.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-04-29_d36e5eed8fcdbf3ef93f18971b3f2862_avoslocker_cobalt-strike.exe
Resource
win10v2004-20240419-en
Target
2024-04-29_d36e5eed8fcdbf3ef93f18971b3f2862_avoslocker_cobalt-strike
Size
449KB
MD5
d36e5eed8fcdbf3ef93f18971b3f2862
SHA1
4df97ade2f75dfd20dbd52759a9858cc9ec3842f
SHA256
a479d5ce88716f746deafde66e91d68f51a615cb63e6184753a1e4f0c971f3c2
SHA512
6e15f88e7e1e27cb59b263d3870c209dbacadb3330b0eab31d5600a36ea92281bc2c6748449189f952278a010e13d59eb5cbbe05627c7ac70639e1da7f9d306e
SSDEEP
6144:bKdO3mK6X6AmIKI0SVBWmoVEVbuLoYHFfAOrO6huLhus2Ft98:7WdX6AmIKI0cAouLoYd4MsD2Ftq
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
O:\webex-windows-plugin\output\i386\bin\Release\webex.pdb
GetUserGeoID
GetUserDefaultLCID
SetThreadUILanguage
GetThreadUILanguage
DecodePointer
RaiseException
InitializeCriticalSectionEx
lstrlenW
MultiByteToWideChar
WideCharToMultiByte
MapViewOfFile
UnmapViewOfFile
CreateFileMappingA
SetLastError
LocalFree
FormatMessageW
WaitForSingleObject
Sleep
CreateThread
TerminateThread
GetFileSize
ReadFile
SetFilePointer
GetVersionExW
FreeLibrary
GetProcAddress
LoadLibraryW
lstrcpynW
GetSystemDefaultLangID
CreateProcessA
GetNativeSystemInfo
SetEvent
CreateEventW
OpenEventW
LCIDToLocaleName
GetLocaleInfoEx
GetCurrentProcess
CreateProcessW
IsProcessInJob
FindResourceExW
FreeResource
LoadResource
LockResource
CreateFileW
GetConsoleMode
GetGeoInfoA
SetFilePointerEx
GetLocalTime
SetStdHandle
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
HeapReAlloc
GetFileType
HeapAlloc
HeapFree
GetStdHandle
GetModuleFileNameW
GetModuleHandleExW
ExitProcess
GetFileAttributesExW
QueryPerformanceFrequency
LoadLibraryExW
RtlUnwind
OutputDebugStringW
WriteConsoleW
InitializeSListHead
QueryPerformanceCounter
GetStartupInfoW
IsDebuggerPresent
WaitForSingleObjectEx
ResetEvent
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStringTypeW
LCMapStringW
GetModuleHandleW
GetModuleFileNameA
GetSystemTimeAsFileTime
CreateMutexW
GetLastError
GetTempFileNameA
GetConsoleOutputCP
GetCommandLineA
TlsFree
TlsSetValue
TlsGetValue
GetCurrentThreadId
GetCurrentProcessId
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
CloseHandle
GetTempPathA
WriteFile
FlushFileBuffers
CreateFileA
HeapSize
SetDefaultDllDirectories
GetSystemInfo
VirtualProtect
VirtualQuery
LoadLibraryExA
EncodePointer
GetCPInfo
InitializeCriticalSectionAndSpinCount
TlsAlloc
LoadImageW
GetClientRect
GetWindowTextW
DrawTextW
DialogBoxParamW
ChangeWindowMessageFilterEx
LoadIconW
LoadCursorW
GetWindowThreadProcessId
SetWindowLongW
GetWindowLongW
SetCursor
GetWindowRect
SetWindowTextW
SetWindowTextA
SetPropW
SetPropA
SetForegroundWindow
GetForegroundWindow
SetActiveWindow
UpdateWindow
KillTimer
SetTimer
SetFocus
DefDlgProcW
GetDlgItem
CreateDialogParamW
BringWindowToTop
IsWindowVisible
SetWindowPos
ShowWindow
DestroyWindow
CreateWindowExW
RegisterClassW
AttachThreadInput
SendMessageW
FindWindowExA
GetDesktopWindow
WaitForInputIdle
GetMonitorInfoW
MonitorFromPoint
GetCursorPos
ReleaseDC
GetDC
PostQuitMessage
PostMessageW
LoadStringW
DispatchMessageW
TranslateMessage
GetMessageW
MessageBoxExW
SelectObject
GetTextExtentPoint32W
GetStockObject
DeleteObject
GetDeviceCaps
CreateFontIndirectW
SetTextColor
SHGetFolderPathA
ShellExecuteW
CryptDestroyHash
CryptReleaseContext
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
ConvertStringSecurityDescriptorToSecurityDescriptorW
CryptAcquireContextW
CryptHashData
CryptCreateHash
CryptGetHashParam
InitCommonControlsEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ