Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-09_a9f508d285529523ae79c9285bc569c1_avoslocker_cobalt-strike.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-09_a9f508d285529523ae79c9285bc569c1_avoslocker_cobalt-strike.exe
Resource
win10v2004-20240508-en
Target
2024-05-09_a9f508d285529523ae79c9285bc569c1_avoslocker_cobalt-strike
Size
291KB
MD5
a9f508d285529523ae79c9285bc569c1
SHA1
a29b5bc0f7458f381cf6431dde60856f4fe6c61f
SHA256
108720e7344b0e35c1b6e8b815400c677423ab4c28777d060aef6e9cb2de3dc0
SHA512
7fd11a3a5fc6a43d7c2e78e9afcbfa7c126a3fa5ce7e6152cb4b53e2a3fbc207fb4135344be96782e18f5d34e563993e06e96ff965d474d3b75109a66902565e
SSDEEP
6144:utoaPw11a4PNTOCVBoP8Ul9ORJBO/qiFEFAOmK3KP44x+VfG4C:uto7W4PNTOCVBoP8Ul9OR8quEFwK3K9F
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
BraveCrashHandler_unsigned.pdb
GetProcessHeap
DeleteCriticalSection
GetModuleHandleW
IsDebuggerPresent
OutputDebugStringW
EnterCriticalSection
LeaveCriticalSection
CloseHandle
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwind
SetLastError
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
GetStdHandle
WriteFile
GetCurrentThread
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringW
GetFileType
SetStdHandle
GetStringTypeW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
GetFileSizeEx
GetProcAddress
ReadFile
CreateFileW
WriteConsoleW
CreateDirectoryW
SizeofResource
RemoveDirectoryW
WaitForMultipleObjects
GetEnvironmentVariableW
WaitForSingleObject
ReleaseMutex
DuplicateHandle
LockResource
DeleteFileW
LoadLibraryW
FindResourceExW
LoadResource
FindResourceW
LocalFree
lstrcmpiW
WaitNamedPipeW
GetTickCount
GetExitCodeProcess
GetTempPathW
VirtualQuery
OpenProcess
Sleep
ReadProcessMemory
lstrlenW
SetFilePointer
GetFileAttributesExW
MoveFileExW
GetFileTime
CreateProcessW
SetProcessWorkingSetSize
GetPrivateProfileIntW
OutputDebugStringA
GetPrivateProfileStringW
GetLocalTime
lstrcmpW
VerSetConditionMask
VerifyVersionInfoW
TryEnterCriticalSection
InitializeCriticalSection
CreateMutexW
lstrcpynW
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
WaitForDebugEvent
GetProcessId
DebugActiveProcessStop
ContinueDebugEvent
GetSystemInfo
GetThreadContext
DebugActiveProcess
VirtualQueryEx
SetNamedPipeHandleState
CreateSemaphoreW
ReleaseSemaphore
RtlCaptureContext
CreateThread
HeapDestroy
DecodePointer
HeapAlloc
RaiseException
HeapReAlloc
GetLastError
TransactNamedPipe
GetSystemDefaultLangID
GetUserDefaultLangID
DeviceIoControl
GetComputerNameExW
ConnectNamedPipe
GetOverlappedResult
DisconnectNamedPipe
CreateNamedPipeW
GetProcessTimes
UnregisterWait
UnregisterWaitEx
RegisterWaitForSingleObject
VirtualProtect
VirtualAlloc
HeapSize
InitializeCriticalSectionAndSpinCount
SetFilePointerEx
HeapFree
GetWindowThreadProcessId
IsWindowVisible
EnumWindows
CharUpperW
wvsprintfW
GetMessageW
DispatchMessageW
PeekMessageW
GetProcessWindowStation
CreateWindowStationW
PostThreadMessageW
OpenClipboard
CloseClipboard
EmptyClipboard
SetProcessWindowStation
CreateDesktopW
CloseDesktop
GetThreadDesktop
SetThreadDesktop
CloseWindowStation
wsprintfW
SetClipboardData
CharLowerW
MessageBoxW
SetTokenInformation
TraceEvent
GetTraceLoggerHandle
GetTraceEnableFlags
GetTraceEnableLevel
RegisterTraceGuidsW
UnregisterTraceGuids
GetTokenInformation
SetSecurityDescriptorGroup
MakeAbsoluteSD
MakeSelfRelativeSD
GetSecurityDescriptorLength
GetLengthSid
InitializeAcl
InitializeSecurityDescriptor
OpenProcessToken
AddAce
IsValidSid
GetSecurityDescriptorOwner
InitializeSid
ConvertStringSidToSidW
CopySid
GetSecurityDescriptorControl
SetNamedSecurityInfoW
GetSidLengthRequired
GetSidSubAuthority
GetSecurityDescriptorGroup
EqualSid
GetAce
SetSecurityDescriptorOwner
GetAclInformation
GetSecurityDescriptorDacl
SetSecurityDescriptorDacl
GetSecurityDescriptorSacl
OpenThreadToken
ConvertSidToStringSidW
RegQueryValueExW
RegOpenKeyExW
RegDeleteValueW
RegSetValueExW
RegEnumKeyExW
RegCreateKeyExW
RegDeleteKeyW
RegQueryInfoKeyW
RegCloseKey
CheckTokenMembership
FreeSid
AllocateAndInitializeSid
SetSecurityDescriptorSacl
CoCreateGuid
StringFromGUID2
SHGetFolderPathW
NetWkstaGetInfo
NetApiBufferFree
NetGetJoinInformation
UuidCreate
PathStripPathW
PathRemoveExtensionW
PathRemoveFileSpecW
SHQueryValueExW
PathIsRelativeW
PathAppendW
PathCanonicalizeW
UnloadUserProfile
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ