Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-31_edefc4e1f74451dcb841f60b8a74bf19_avoslocker_cobalt-strike.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-31_edefc4e1f74451dcb841f60b8a74bf19_avoslocker_cobalt-strike.exe
Resource
win10v2004-20240508-en
Target
2024-05-31_edefc4e1f74451dcb841f60b8a74bf19_avoslocker_cobalt-strike
Size
669KB
MD5
edefc4e1f74451dcb841f60b8a74bf19
SHA1
793491a31bffe3243dfcab8369eaf2683bdcae26
SHA256
088fa25907fffd2ff3557e95841bb8654fc4bec7229e040066a518cbd0974ca7
SHA512
2586d24a8126e68a35fa78843dda97bf9c49e3cbd3fab3d76656fa0508dea55c0af24f7cfdddffee38e46c90e0fd3a27ca7b01773922c26c6df68ee131e311fb
SSDEEP
12288:goPBHHTlzu9eMB1JUiCAq2ZObJTmkbP3MTCj0NaUtLp8l2Yk8N5Ytz2iPo+Pu9Gl:fcBvU9z2ZOVTpbljKaUtUF4PkFwqbMvV
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
E:\bamboo-agent-home-2\xml-data\build-dir\PGSC-MON-JOB1\Monolith\Build\ProtectorGamesApp\Release\GameLauncher.pdb
GetProcessHeap
ReleaseMutex
MultiByteToWideChar
WideCharToMultiByte
GetPrivateProfileSectionNamesW
GetGeoInfoW
GetUserGeoID
GetUserDefaultUILanguage
TerminateThread
CreateEventA
GetTickCount
CreateDirectoryW
OpenMutexW
GetSystemInfo
OpenFileMappingW
FormatMessageA
GetModuleHandleA
FindClose
FindNextFileW
GetFileAttributesW
GetFileSizeEx
GetFullPathNameW
FindResourceExW
LoadResource
GetCurrentDirectoryW
FileTimeToLocalFileTime
GetSystemTime
SystemTimeToFileTime
GetPrivateProfileStringW
OutputDebugStringW
SetLastError
CreateMutexA
OpenMutexA
CreateFileMappingA
OpenFileMappingA
FlushFileBuffers
SetFilePointerEx
GetVolumeInformationA
DeviceIoControl
GetWindowsDirectoryA
WriteConsoleW
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
WriteFile
GetACP
IsValidCodePage
FindFirstFileExW
GetTimeZoneInformation
ReadConsoleW
SetStdHandle
GetConsoleMode
GetConsoleCP
GetStdHandle
ExitProcess
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
GetFileType
GetFileInformationByHandle
GetDriveTypeW
MoveFileExW
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
GetCommandLineW
GetCommandLineA
LoadLibraryExW
HeapSize
HeapAlloc
HeapDestroy
SetEndOfFile
GetFileSize
CreateFileW
K32EnumProcesses
GetModuleFileNameW
VirtualQuery
GetNativeSystemInfo
GetVersionExW
DuplicateHandle
GetExitCodeThread
WaitForMultipleObjects
CreateRemoteThread
FlushInstructionCache
VirtualProtectEx
CreateEventW
WriteProcessMemory
VirtualAllocEx
UnmapViewOfFile
MapViewOfFile
IsWow64Process
ReadFile
SetFilePointer
CreateFileA
DecodePointer
RaiseException
InitializeCriticalSectionEx
OpenEventW
ResumeThread
AssignProcessToJobObject
CreateProcessW
SetInformationJobObject
CreateJobObjectW
SetEvent
GetCurrentThread
GetProcAddress
GetModuleHandleW
GetCurrentProcess
CheckRemoteDebuggerPresent
IsDebuggerPresent
CreateToolhelp32Snapshot
Process32NextW
Process32FirstW
K32GetProcessImageFileNameW
OpenProcess
QueryInformationJobObject
TerminateJobObject
CreateFileMappingW
CreateMutexW
GetCurrentThreadId
OpenThread
CreateThread
DeleteFileW
GetLastError
GetExitCodeProcess
CloseHandle
GetCurrentProcessId
Sleep
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
RtlUnwind
InitializeSListHead
QueryPerformanceCounter
GetStartupInfoW
WaitForSingleObjectEx
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
GetStringTypeW
LCMapStringW
CompareStringW
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
EncodePointer
InitOnceComplete
InitOnceBeginInitialize
HeapReAlloc
HeapFree
FreeLibrary
WaitForSingleObject
GetTickCount64
ResetEvent
LocalFree
GetOEMCP
FindWindowW
ShowWindow
SetFocus
PostMessageW
IsWindowVisible
ChangeDisplaySettingsW
PostQuitMessage
BroadcastSystemMessageW
DestroyWindow
GetClassNameA
ReleaseDC
GetDC
EnumDisplaySettingsW
GetDlgItem
BringWindowToTop
GetWindowThreadProcessId
FindWindowA
RegisterWindowMessageA
GetSystemMetrics
DialogBoxParamW
AttachThreadInput
MsgWaitForMultipleObjectsEx
PeekMessageW
TranslateMessage
SetForegroundWindow
DispatchMessageW
SetWindowTextW
SetDlgItemTextW
LoadIconW
SendMessageW
CreateDialogParamW
IsWindow
GetForegroundWindow
MessageBoxW
GetDeviceCaps
OpenProcessToken
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegSetValueExA
RegSetKeySecurity
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
ImpersonateSelf
StartServiceW
QueryServiceStatusEx
OpenServiceW
OpenSCManagerW
CloseServiceHandle
RegCreateKeyExW
CryptGenRandom
RegQueryValueExA
RegQueryInfoKeyA
RegOpenKeyExA
RegEnumKeyExA
CryptDecrypt
CryptSetKeyParam
CryptDestroyKey
CryptDeriveKey
RevertToSelf
ImpersonateLoggedOnUser
OpenThreadToken
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGetHashParam
CryptReleaseContext
CryptAcquireContextW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
GetUserNameW
SHGetKnownFolderPath
ShellExecuteExA
CoSetProxyBlanket
CoInitializeSecurity
CoTaskMemFree
StringFromCLSID
CoCreateInstance
CoUninitialize
CoInitialize
CoInitializeEx
SysAllocString
SysFreeString
VariantInit
VariantClear
VariantChangeType
PathUnquoteSpacesW
PathFileExistsA
PathFileExistsW
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
GetUserNameExW
InternetCloseHandle
InternetConnectA
InternetReadFile
InternetQueryOptionA
InternetGetLastResponseInfoA
HttpOpenRequestA
HttpAddRequestHeadersA
InternetOpenA
HttpSendRequestA
HttpQueryInfoA
CryptMsgGetAndVerifySigner
CertFreeCertificateContext
CertNameToStrW
CryptQueryObject
CryptMsgClose
WinVerifyTrust
WSAStartup
gethostbyname
ntohl
GetAdaptersInfo
UuidCreate
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ