Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-01_32fe47b010f6fdf3b210cb42c9cbe2e5_avoslocker_cobalt-strike.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-01_32fe47b010f6fdf3b210cb42c9cbe2e5_avoslocker_cobalt-strike.exe
Resource
win10v2004-20240508-en
Target
2024-06-01_32fe47b010f6fdf3b210cb42c9cbe2e5_avoslocker_cobalt-strike
Size
475KB
MD5
32fe47b010f6fdf3b210cb42c9cbe2e5
SHA1
716b6d9e5c789d9f6d77c6c72bab083e8699832c
SHA256
1320095a0ce7d32b1e212e3b751d0250bf5ab5f352afa7b7a91e7623e13b7c7f
SHA512
36c59e0f2db4a06dbc46983c58a6e58995584a80e6f227a2e291db754169aaa387b41faa68915c74fca53272ae367b880be5ed5beb22438d5426176ee66cfeb6
SSDEEP
12288:V1vKpgoIWgqAyymyzIunr1a8Fp/2yMsDAoau+3:7vKCoBlymSDakKspaH
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
O:\webex-windows-plugin\output\i386\bin\Release\webex.pdb
GetUserGeoID
GetUserDefaultLCID
SetThreadUILanguage
GetThreadUILanguage
DecodePointer
RaiseException
InitializeCriticalSectionEx
lstrlenW
MultiByteToWideChar
WideCharToMultiByte
MapViewOfFile
UnmapViewOfFile
CreateFileMappingA
SetLastError
LocalFree
FormatMessageW
WaitForSingleObject
Sleep
CreateThread
TerminateThread
GetFileSize
ReadFile
SetFilePointer
GetVersionExW
FreeLibrary
GetProcAddress
LoadLibraryW
lstrcpynW
GetSystemDefaultLangID
CreateProcessA
GetNativeSystemInfo
SetEvent
CreateEventW
OpenEventW
LCIDToLocaleName
GetLocaleInfoEx
GetCurrentProcess
CreateProcessW
IsProcessInJob
FindResourceExW
FreeResource
LoadResource
LockResource
CreateFileW
GetConsoleMode
GetGeoInfoA
SetFilePointerEx
GetLocalTime
SetStdHandle
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
HeapReAlloc
GetFileType
HeapAlloc
HeapFree
GetStdHandle
GetModuleFileNameW
GetModuleHandleExW
ExitProcess
GetFileAttributesExW
QueryPerformanceFrequency
LoadLibraryExW
RtlUnwind
OutputDebugStringW
WriteConsoleW
InitializeSListHead
QueryPerformanceCounter
GetStartupInfoW
IsDebuggerPresent
WaitForSingleObjectEx
ResetEvent
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStringTypeW
LCMapStringW
GetModuleHandleW
GetModuleFileNameA
GetSystemTimeAsFileTime
CreateMutexW
GetLastError
GetTempFileNameA
GetConsoleOutputCP
GetCommandLineA
TlsFree
TlsSetValue
TlsGetValue
GetCurrentThreadId
GetCurrentProcessId
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
CloseHandle
GetTempPathA
WriteFile
FlushFileBuffers
CreateFileA
HeapSize
SetDefaultDllDirectories
GetSystemInfo
VirtualProtect
VirtualQuery
LoadLibraryExA
EncodePointer
GetCPInfo
InitializeCriticalSectionAndSpinCount
TlsAlloc
LoadImageW
GetClientRect
GetWindowTextW
DrawTextW
DialogBoxParamW
ChangeWindowMessageFilterEx
LoadIconW
LoadCursorW
GetWindowThreadProcessId
SetWindowLongW
GetWindowLongW
SetCursor
GetWindowRect
SetWindowTextW
SetWindowTextA
SetPropW
SetPropA
SetForegroundWindow
GetForegroundWindow
SetActiveWindow
UpdateWindow
KillTimer
SetTimer
SetFocus
DefDlgProcW
GetDlgItem
CreateDialogParamW
BringWindowToTop
IsWindowVisible
SetWindowPos
ShowWindow
DestroyWindow
CreateWindowExW
RegisterClassW
AttachThreadInput
SendMessageW
FindWindowExA
GetDesktopWindow
WaitForInputIdle
GetMonitorInfoW
MonitorFromPoint
GetCursorPos
ReleaseDC
GetDC
PostQuitMessage
PostMessageW
LoadStringW
DispatchMessageW
TranslateMessage
GetMessageW
MessageBoxExW
SelectObject
GetTextExtentPoint32W
GetStockObject
DeleteObject
GetDeviceCaps
CreateFontIndirectW
SetTextColor
SHGetFolderPathA
ShellExecuteW
CryptDestroyHash
CryptReleaseContext
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
ConvertStringSecurityDescriptorToSecurityDescriptorW
CryptAcquireContextW
CryptHashData
CryptCreateHash
CryptGetHashParam
InitCommonControlsEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ