D:\Users\haoning\Documents\GitHub\@bitcookies\winrar-keygen\bin\Win32-Release\winrar-keygen.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-04_bc457946347150a4c685bda3cae8a038_avoslocker_cobalt-strike.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-04_bc457946347150a4c685bda3cae8a038_avoslocker_cobalt-strike.exe
Resource
win10v2004-20240419-en
General
-
Target
2024-05-04_bc457946347150a4c685bda3cae8a038_avoslocker_cobalt-strike
-
Size
348KB
-
MD5
bc457946347150a4c685bda3cae8a038
-
SHA1
16b880e231763e7b9b6d76cf64c80a923f3b9485
-
SHA256
45d77bd5ade1ec169d5dc0580f77edc97a4526cb5c88b7276b8374a7dceb6137
-
SHA512
814ea9b7107fe17f5d62c9ddee97601146408f28f5587830ab1d1a95dd2347a2f0b863dfc477725a6028732aacb54813471b43c07cf2886014bb96581486f6be
-
SSDEEP
6144:ti0majtnn22DBUOeu8aq1kjlXMIwrQJS5UXwYBW0s0LJzmObvPhmBcTZQ1RmuB:tiXa22DBn8aq1kjlXMh+s0ll75KyZQRB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-04_bc457946347150a4c685bda3cae8a038_avoslocker_cobalt-strike
Files
-
2024-05-04_bc457946347150a4c685bda3cae8a038_avoslocker_cobalt-strike.exe windows:6 windows x86 arch:x86
41159f59c87e3aa973150d9c677e6e56
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
WideCharToMultiByte
GetLastError
CreateFileW
DecodePointer
LocalFree
FormatMessageA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwind
RaiseException
SetLastError
EncodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
GetStdHandle
WriteFile
GetCommandLineA
GetCommandLineW
HeapFree
HeapAlloc
GetFileType
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
HeapReAlloc
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
MultiByteToWideChar
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetProcessHeap
SetStdHandle
GetStringTypeW
GetFileSizeEx
SetFilePointerEx
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
HeapSize
CloseHandle
WriteConsoleW
advapi32
CryptAcquireContextW
CryptCreateHash
CryptReleaseContext
CryptGetHashParam
CryptHashData
CryptDestroyHash
ntdll
RtlComputeCrc32
Sections
.text Size: 212KB - Virtual size: 211KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 134KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 77KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ