Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-16_6d3554bd8db016ca1af061bd1b13678c_avoslocker_cobalt-strike.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-16_6d3554bd8db016ca1af061bd1b13678c_avoslocker_cobalt-strike.exe
Resource
win10v2004-20240508-en
Target
2024-05-16_6d3554bd8db016ca1af061bd1b13678c_avoslocker_cobalt-strike
Size
810KB
MD5
6d3554bd8db016ca1af061bd1b13678c
SHA1
315ec0480eeaa03e67a7633124df135fed89a768
SHA256
d9021974f7844ca86e630ebeb5e99027e2caec70dd34a3db2b3977713d732f50
SHA512
2dd483e6b58de675041d93cc41672dbc8b36661f64ec9a4aef87c8d311594cdf1836a40af26280fafc1969ff123ccf73c282a6665ffb59605304a9f362ad156f
SSDEEP
24576:1zHjDE1D9rJS1Gg7xFTkvlKTKK4KKOQK5VcZ1EEVmEEE1EEEEEEEEEEEsKK1KKKw:2ndg7xeNKTKK4KKOQK5VcZ1EEVmEEE1Z
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\wftssffjk.pdb
GetUserNameA
CopySid
EqualSid
GetLengthSid
RegCloseKey
RegEnumKeyA
RegOpenKeyA
AllocateAndInitializeSid
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
SetSecurityDescriptorOwner
GetSaveFileNameA
GetOpenFileNameA
GetStockObject
ShellExecuteA
Shell_NotifyIconA
IsDialogMessageA
DestroyIcon
LoadIconA
LoadCursorA
GetDesktopWindow
SetWindowLongA
GetWindowLongA
GetCursorPos
MessageBeep
MessageBoxA
GetWindowRect
SetForegroundWindow
SetActiveWindow
SetMenuDefaultItem
GetMenuDefaultItem
GetMenuItemInfoA
InsertMenuItemA
TrackPopupMenu
RemoveMenu
AppendMenuA
GetMenuItemCount
DestroyMenu
CreatePopupMenu
GetDlgItemTextA
EnableWindow
SendDlgItemMessageA
SetDlgItemTextA
GetDlgItem
EndDialog
DialogBoxParamA
CreateDialogParamA
SetWindowPos
MoveWindow
ShowWindow
DestroyWindow
IsWindow
CreateWindowExA
RegisterClassA
PostQuitMessage
DefWindowProcA
PostMessageA
SendMessageA
DispatchMessageA
TranslateMessage
GetMessageA
RegisterWindowMessageA
WinHelpA
FindWindowA
MessageBoxIndirectA
CreateMenu
WriteConsoleW
SetEndOfFile
HeapSize
CreateFileW
FlushFileBuffers
GetProcessHeap
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
GetStringTypeW
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
OutputDebugStringW
GetConsoleOutputCP
ReadConsoleW
GetConsoleMode
ReadFile
SetFilePointerEx
GetFileSizeEx
SetConsoleCtrlHandler
HeapReAlloc
GetCurrentThread
HeapAlloc
HeapFree
GetFileType
GetModuleFileNameW
WriteFile
GetStdHandle
GetModuleHandleExW
ExitProcess
RaiseException
EncodePointer
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
FreeLibrary
GetModuleFileNameA
GetProcAddress
GetLastError
GetSystemDirectoryA
GetVersionExA
LoadLibraryA
FormatMessageA
CloseHandle
GetCurrentProcessId
OpenProcess
VirtualProtect
MapViewOfFile
UnmapViewOfFile
GetModuleHandleA
LocalFree
OpenFileMappingA
GetCurrentThreadId
LocalAlloc
CreateFileMappingA
GetCurrentProcess
SetCurrentDirectoryA
GetCurrentDirectoryA
TlsAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
InterlockedPushEntrySList
InterlockedFlushSList
RtlUnwind
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
DecodePointer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ