Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Behavioral task
behavioral1
Sample
2024-05-02_a956028cff4ecbdc08bcadb9b9d4c4df_avoslocker_cobalt-strike.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-05-02_a956028cff4ecbdc08bcadb9b9d4c4df_avoslocker_cobalt-strike.exe
Resource
win10v2004-20240419-en
Target
2024-05-02_a956028cff4ecbdc08bcadb9b9d4c4df_avoslocker_cobalt-strike
Size
2.2MB
MD5
a956028cff4ecbdc08bcadb9b9d4c4df
SHA1
ff43ccd7100a98c052d0c9ac291d375bcddc87cd
SHA256
e38e5b9e887239883a29f7384413e6bca994de3a2ebd61c483a1a255d87b45be
SHA512
b9484070186d4b4897e4e38290156c3d7f7c2c8a681ac69397c9f6fb5888ec62ad5779e0d409facf3a675f9763178a407919f7eced5d3bda4ebcb4cb163b4c26
SSDEEP
49152:WY+BF5f37D5to87s3Kv3mqI6VeOMjUfkptVxIyijdTB:WY+BFB3X7oMs3Kv3mjUu5SB
metasploit
windows/reverse_http
http://192.168.0.5:8080/1W3YY6hY6XbimOOZhKpksg7UC2EV6
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetTokenInformation
RegCloseKey
OpenProcessToken
CopySid
EqualSid
ConvertStringSidToSidA
ConvertStringSecurityDescriptorToSecurityDescriptorA
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetProcessHeap
HeapSize
ReadFile
GetFileSizeEx
SetFilePointerEx
ReadConsoleW
CreateDirectoryA
GetLastError
WaitForSingleObject
GetExitCodeProcess
CreateProcessA
GetModuleHandleExA
GetProcAddress
SetDllDirectoryA
MultiByteToWideChar
WideCharToMultiByte
CloseHandle
GetCurrentProcess
LocalFree
GetCommandLineW
GetTempPathA
SetLastError
GetSystemDirectoryA
GetNativeSystemInfo
GetModuleFileNameA
GetModuleHandleExW
CreateFileA
DeleteFileA
FindClose
FindFirstFileA
FindNextFileA
GetDriveTypeA
GetFileAttributesA
RemoveDirectoryA
SetFileAttributesA
DecodePointer
RaiseException
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetTickCount
CopyFileA
MoveFileExA
LoadResource
LockResource
SizeofResource
FindResourceA
Sleep
GetCurrentProcessId
GetCurrentThreadId
GetLocalTime
FormatMessageW
FreeLibrary
LoadLibraryW
QueryPerformanceCounter
FlushFileBuffers
GetStringTypeW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
EncodePointer
LCMapStringEx
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
OutputDebugStringW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
FindNextFileW
FindFirstFileExW
GetTimeZoneInformation
HeapReAlloc
SetStdHandle
GetCurrentDirectoryW
RtlUnwind
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
GetCommandLineA
CreateFileW
GetFileInformationByHandle
GetFileType
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
SetEndOfFile
WriteFile
GetConsoleOutputCP
GetConsoleMode
GetStdHandle
GetModuleFileNameW
WriteConsoleW
ExitProcess
HeapFree
HeapAlloc
CompareStringW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ