Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-29_e87493b0dcc9b4e86f3108148b55c681_avoslocker_cobalt-strike_floxif.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-29_e87493b0dcc9b4e86f3108148b55c681_avoslocker_cobalt-strike_floxif.exe
Resource
win10v2004-20240508-en
Target
2024-05-29_e87493b0dcc9b4e86f3108148b55c681_avoslocker_cobalt-strike_floxif
Size
558KB
MD5
e87493b0dcc9b4e86f3108148b55c681
SHA1
0eff1dccb4da2dece2f16f5cfaf6ee45bfc79f2e
SHA256
3968883cb8b4c416b0e84ec701e6cbadb51f5dbf534dbbe3cc84c0d2762f0321
SHA512
2ba5becb01269061df3a5a0dc10b6ed0c1f32c0cafc5511e83a03fa9314337262a3a5fced0218f714878c65e48d02a9037f393096255b27779ed5369c78e1724
SSDEEP
12288:72QNOESixZsjRC+vr9WMdEiidQ3lWCY+BcnPgipRue5sSuRmBjvrEH73y:72+iEi/3l7BcnPgiyt6rEH73y
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\a\1\s\EtDiskmon\Win32\Release\Diskmon.pdb
ord17
CreateToolbarEx
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
ReadProcessMemory
GetUserDefaultLangID
CreateFileA
QueryPerformanceFrequency
EnterCriticalSection
LeaveCriticalSection
lstrlenW
InitializeCriticalSection
MultiByteToWideChar
WideCharToMultiByte
lstrcpynA
SetEndOfFile
WriteConsoleW
ReadFile
HeapReAlloc
HeapSize
SetFilePointerEx
GetFileSizeEx
GetConsoleOutputCP
FlushFileBuffers
SetConsoleCtrlHandler
GetStringTypeW
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
OutputDebugStringW
ReadConsoleW
PeekConsoleInputA
ReadConsoleInputW
GetNumberOfConsoleInputEvents
SetConsoleMode
GetConsoleMode
CreateFileW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
GetCurrentThread
GetModuleFileNameW
WriteFile
FreeLibraryAndExitThread
ResumeThread
ExitThread
CreateThread
GetConsoleCP
GetModuleHandleExW
ExitProcess
RaiseException
EncodePointer
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
RtlUnwind
InterlockedFlushSList
InterlockedPushEntrySList
GetModuleHandleW
GetStartupInfoW
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
SetLastError
GetVersionExA
LoadLibraryExA
Sleep
GetLastError
CloseHandle
lstrlenA
lstrcatA
lstrcpyA
GlobalLock
GlobalUnlock
GlobalReAlloc
GlobalAlloc
GetTickCount
GetProcessHeap
HeapFree
HeapAlloc
GetTimeFormatA
SystemTimeToFileTime
FileTimeToSystemTime
VerifyVersionInfoW
FormatMessageA
OpenProcess
LoadLibraryA
FreeLibrary
GetSystemTime
GetCurrentProcess
FileTimeToLocalFileTime
VerSetConditionMask
LocalFree
LocalAlloc
GetProcAddress
GetModuleHandleA
GetFileType
GetCommandLineW
GetStdHandle
DecodePointer
GetDlgItem
GetSysColorBrush
SetWindowTextA
EndDialog
DialogBoxIndirectParamA
SendMessageA
IsIconic
IsZoomed
SetCursor
DestroyIcon
SetWindowLongA
ScreenToClient
ClientToScreen
GetClientRect
DrawTextA
GetFocus
EmptyClipboard
SetClipboardData
CloseClipboard
OpenClipboard
CallWindowProcA
IsWindowEnabled
EnableWindow
IsDlgButtonChecked
CheckRadioButton
CheckDlgButton
GetDlgItemTextA
SetDlgItemTextA
WinHelpA
IsDialogMessageA
LoadIconA
GetCursorPos
MessageBoxA
InvalidateRgn
ReleaseDC
GetDC
UpdateWindow
TrackPopupMenu
GetSubMenu
EnableMenuItem
CheckMenuItem
DestroyMenu
GetMenu
LoadMenuA
GetSystemMetrics
TranslateAcceleratorA
LoadAcceleratorsA
KillTimer
SetTimer
ReleaseCapture
SetCapture
SetFocus
DialogBoxParamA
SetWindowPos
ShowWindow
DestroyWindow
CreateWindowExA
RegisterClassA
PostQuitMessage
DefWindowProcA
PostMessageA
DispatchMessageA
TranslateMessage
GetMessageA
RegisterWindowMessageA
LoadStringA
GetParent
GetSysColor
ChildWindowFromPoint
GetWindowRect
InvalidateRect
MoveWindow
LoadCursorA
InflateRect
ExtTextOutA
GetTextExtentPoint32A
SetBkColor
GetTextMetricsA
DeleteObject
CreateSolidBrush
CreateCompatibleDC
GetObjectA
SetTextColor
SetBkMode
SelectObject
GetStockObject
CreateFontIndirectA
EndPage
StartPage
EndDoc
StartDocA
SetMapMode
GetDeviceCaps
FindTextA
GetSaveFileNameA
ChooseColorA
ChooseFontA
PrintDlgA
RegQueryValueExW
RegOpenKeyA
RegCloseKey
RegOpenKeyExA
LookupAccountSidW
LookupAccountSidA
GetTokenInformation
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
RegSetValueExA
RegQueryValueExA
RegCreateKeyA
CommandLineToArgvW
SHGetFileInfoA
Shell_NotifyIconA
ShellExecuteA
CoInitialize
CoCreateInstance
CoSetProxyBlanket
VariantClear
VariantChangeType
VariantInit
SafeArrayGetElement
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayDestroy
SysFreeString
SysAllocString
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ