Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-30_317453d382d1ac582910cec71091c30e_avoslocker_cobalt-strike_floxif.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-30_317453d382d1ac582910cec71091c30e_avoslocker_cobalt-strike_floxif.exe
Resource
win10v2004-20240508-en
Target
2024-05-30_317453d382d1ac582910cec71091c30e_avoslocker_cobalt-strike_floxif
Size
433KB
MD5
317453d382d1ac582910cec71091c30e
SHA1
6f509f280ed4b10fb7e945ee6201d6d216365175
SHA256
2ec1098f0b582eabf23ae4584860c3e3d0dcc241841b044580ec3decedd113d6
SHA512
feefda7bc50212e560cfb942be235e767659d7ec46b4451b8a0c377f16ec30ddf96a516fc67dc080144e7776d8f0d4c15f097138294f34ce2fd9142564410b9a
SSDEEP
12288:2Fd1dYQq5gnEiz1S1yEs7U79BuXzQ4RJ7QBjvrEH7oTB:kEiz1f7U79r4RVSrEH7uB
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\a\1\s\Win32\Release\regjump.pdb
HeapReAlloc
HeapSize
SetFilePointerEx
GetFileSizeEx
GetConsoleOutputCP
FlushFileBuffers
SetConsoleCtrlHandler
GetProcessHeap
GetStringTypeW
ReadFile
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
MultiByteToWideChar
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
WriteConsoleW
GlobalLock
GlobalUnlock
LoadLibraryA
OpenProcess
GetCurrentProcess
CreateProcessA
GetLastError
Sleep
CloseHandle
ExpandEnvironmentStringsA
LocalFree
LocalAlloc
GetProcAddress
GetModuleHandleA
GetFileType
GetCommandLineW
GetStdHandle
LoadLibraryExA
GetVersionExA
SetStdHandle
SetLastError
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
InterlockedPushEntrySList
InterlockedFlushSList
RtlUnwind
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
EncodePointer
RaiseException
ExitProcess
GetModuleHandleExW
GetConsoleCP
WriteFile
GetModuleFileNameW
GetCommandLineA
GetCurrentThread
HeapFree
HeapAlloc
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
WideCharToMultiByte
CreateFileW
GetConsoleMode
SetConsoleMode
GetNumberOfConsoleInputEvents
ReadConsoleInputW
PeekConsoleInputA
ReadConsoleW
OutputDebugStringW
FindClose
DecodePointer
GetWindowThreadProcessId
FindWindowExA
FindWindowA
SetForegroundWindow
SetFocus
GetClipboardData
CloseClipboard
OpenClipboard
ShowWindow
EnumDisplaySettingsA
LoadCursorA
InflateRect
GetSysColorBrush
SetCursor
SetWindowTextA
GetDlgItem
EndDialog
DialogBoxIndirectParamA
SendMessageA
WaitForInputIdle
StartPage
EndDoc
StartDocA
SetMapMode
GetDeviceCaps
EndPage
PrintDlgA
GetTokenInformation
FreeSid
EqualSid
AllocateAndInitializeSid
OpenProcessToken
RegSetValueExA
RegQueryValueExW
RegQueryValueExA
RegOpenKeyExA
RegOpenKeyA
RegCreateKeyA
RegCloseKey
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ