Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-16_16dca05d49f5d75e8c747ccd0904e91e_avoslocker_cobalt-strike.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-05-16_16dca05d49f5d75e8c747ccd0904e91e_avoslocker_cobalt-strike.exe
Resource
win10v2004-20240426-en
Target
2024-05-16_16dca05d49f5d75e8c747ccd0904e91e_avoslocker_cobalt-strike
Size
810KB
MD5
16dca05d49f5d75e8c747ccd0904e91e
SHA1
2d704bdcf2dbe98ab4c4a56ced9b791e1a740d0d
SHA256
ba29dfc2bd96a454416d25b6c44517a1524feaa151f3695001e95d4a19bccc86
SHA512
705ad423e58cfb1c6e57a6c5a820022e941be113c8df3fdc3e1b56296ef60866a8f0bd4fb78c0a4d91d29c64defafb80f8674a0e3b5fd568218c143e9c8d8944
SSDEEP
24576:VzHjDE1D9rJS1Gg7xFTkGlKTKK4KKOQK5VcZ1EEVmEEE1EEEEEEEEEEEsKK1KKKu:Wndg7xeYKTKK4KKOQK5VcZ1EEVmEEE13
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\wftssffjk.pdb
GetUserNameA
CopySid
EqualSid
GetLengthSid
RegCloseKey
RegEnumKeyA
RegOpenKeyA
AllocateAndInitializeSid
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
SetSecurityDescriptorOwner
GetSaveFileNameA
GetOpenFileNameA
GetStockObject
ShellExecuteA
Shell_NotifyIconA
IsDialogMessageA
DestroyIcon
LoadIconA
LoadCursorA
GetDesktopWindow
SetWindowLongA
GetWindowLongA
GetCursorPos
MessageBeep
MessageBoxA
GetWindowRect
SetForegroundWindow
SetActiveWindow
SetMenuDefaultItem
GetMenuDefaultItem
GetMenuItemInfoA
InsertMenuItemA
TrackPopupMenu
RemoveMenu
AppendMenuA
GetMenuItemCount
DestroyMenu
CreatePopupMenu
GetDlgItemTextA
EnableWindow
SendDlgItemMessageA
SetDlgItemTextA
GetDlgItem
EndDialog
DialogBoxParamA
CreateDialogParamA
SetWindowPos
MoveWindow
ShowWindow
DestroyWindow
IsWindow
CreateWindowExA
RegisterClassA
PostQuitMessage
DefWindowProcA
PostMessageA
SendMessageA
DispatchMessageA
TranslateMessage
GetMessageA
RegisterWindowMessageA
WinHelpA
FindWindowA
MessageBoxIndirectA
CreateMenu
WriteConsoleW
SetEndOfFile
HeapSize
CreateFileW
FlushFileBuffers
GetProcessHeap
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
GetStringTypeW
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
OutputDebugStringW
GetConsoleOutputCP
ReadConsoleW
GetConsoleMode
ReadFile
SetFilePointerEx
GetFileSizeEx
SetConsoleCtrlHandler
HeapReAlloc
GetCurrentThread
HeapAlloc
HeapFree
GetFileType
GetModuleFileNameW
WriteFile
GetStdHandle
GetModuleHandleExW
ExitProcess
RaiseException
EncodePointer
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
FreeLibrary
GetModuleFileNameA
GetProcAddress
GetLastError
GetSystemDirectoryA
GetVersionExA
LoadLibraryA
FormatMessageA
CloseHandle
GetCurrentProcessId
OpenProcess
VirtualProtect
MapViewOfFile
UnmapViewOfFile
GetModuleHandleA
LocalFree
OpenFileMappingA
GetCurrentThreadId
LocalAlloc
CreateFileMappingA
GetCurrentProcess
SetCurrentDirectoryA
GetCurrentDirectoryA
TlsAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
InterlockedPushEntrySList
InterlockedFlushSList
RtlUnwind
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
DecodePointer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ