Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-01_522cba05ac8cc86adeea7b3a56c10b4c_avoslocker_cobalt-strike.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-01_522cba05ac8cc86adeea7b3a56c10b4c_avoslocker_cobalt-strike.exe
Resource
win10v2004-20240508-en
Target
2024-06-01_522cba05ac8cc86adeea7b3a56c10b4c_avoslocker_cobalt-strike
Size
409KB
MD5
522cba05ac8cc86adeea7b3a56c10b4c
SHA1
2f3c65c953765f5833bee12a88b51a4df732afaa
SHA256
f96a5b3abea9098f4be45392d2121c5e6092310609e9a394ab60655f75a17ccc
SHA512
60b4d5dc9869306c900736ea8ba4abb2b8b30002da747128051033e519763972f64b8dcbe604baf90dc2612516e2b836f9a9dd86995c368434c932290642c5f5
SSDEEP
6144:/ebHbWj5H51/atIFRtIEMjfaTV/uaTP833ObZf5IuKINugJiZe6VLZvyepiJHz6c:R5ESvi3Oba3e6xCuupqYwBMsDQTJf
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
O:\webex-windows-plugin\output\i386\bin\Release\webex.pdb
WinVerifyTrust
HttpSendRequestA
InternetCrackUrlA
InternetOpenA
HttpQueryInfoA
InternetCloseHandle
HttpOpenRequestA
InternetSetOptionW
InternetSetOptionA
InternetReadFile
InternetConnectA
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueW
SetWindowTheme
WriteFile
GetTempPathA
CloseHandle
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetCurrentProcessId
GetCurrentThreadId
GetLocalTime
GetCommandLineA
GetTempFileNameA
GetLastError
CreateMutexW
GetSystemTimeAsFileTime
GetModuleFileNameA
GetModuleHandleW
GetUserDefaultLCID
SetThreadUILanguage
GetThreadUILanguage
DecodePointer
RaiseException
InitializeCriticalSectionEx
lstrlenW
MultiByteToWideChar
WideCharToMultiByte
MapViewOfFile
UnmapViewOfFile
CreateFileMappingA
SetLastError
LocalFree
FormatMessageW
WaitForSingleObject
Sleep
CreateThread
TerminateThread
GetFileSize
ReadFile
SetFilePointer
CreateProcessA
GetNativeSystemInfo
SetEvent
CreateEventW
OpenEventW
GetProcAddress
GetStringTypeW
FreeLibrary
FlushFileBuffers
lstrcpynW
GetSystemDefaultLangID
GetCommandLineW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
GetFileType
HeapAlloc
HeapFree
GetStdHandle
GetModuleFileNameW
GetModuleHandleExW
ExitProcess
QueryPerformanceFrequency
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetEnvironmentStringsW
EncodePointer
RtlUnwind
OutputDebugStringW
InitializeSListHead
QueryPerformanceCounter
GetStartupInfoW
IsDebuggerPresent
WaitForSingleObjectEx
ResetEvent
InitializeCriticalSectionAndSpinCount
IsProcessorFeaturePresent
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
CreateFileA
FreeEnvironmentStringsW
HeapSize
HeapReAlloc
SetFilePointerEx
LCMapStringW
GetProcessHeap
LoadLibraryW
SetStdHandle
GetConsoleOutputCP
GetConsoleMode
CreateFileW
GetVersionExW
WriteConsoleW
MonitorFromPoint
GetCursorPos
ChangeWindowMessageFilterEx
LoadIconW
LoadCursorW
GetWindowThreadProcessId
SetWindowLongW
GetWindowLongW
SetCursor
MessageBoxExW
GetMonitorInfoW
SetWindowTextW
SetWindowTextA
SetPropW
SetPropA
ReleaseDC
GetDC
SetForegroundWindow
GetForegroundWindow
SetActiveWindow
UpdateWindow
SetTimer
SetFocus
DefDlgProcW
CreateDialogParamW
BringWindowToTop
SetWindowPos
ShowWindow
DestroyWindow
CreateWindowExW
RegisterClassW
AttachThreadInput
SendMessageW
LoadStringW
FindWindowExA
GetDesktopWindow
WaitForInputIdle
MessageBoxExA
PostQuitMessage
PostMessageW
LoadStringA
DispatchMessageW
TranslateMessage
GetMessageW
KillTimer
GetDlgItem
SetTextColor
GetStockObject
DeleteObject
CreateFontIndirectW
GetTextExtentPoint32W
SelectObject
GetDeviceCaps
SHGetFolderPathA
CryptReleaseContext
CryptGetHashParam
CryptCreateHash
CryptHashData
CryptDestroyHash
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
CryptAcquireContextW
ObtainUserAgentString
InitCommonControlsEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ