Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-16_237275dab02196abc78711ad60b6a38a_avoslocker_cobalt-strike.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2024-06-16_237275dab02196abc78711ad60b6a38a_avoslocker_cobalt-strike.exe
Resource
win10v2004-20240508-en
Target
2024-06-16_237275dab02196abc78711ad60b6a38a_avoslocker_cobalt-strike
Size
669KB
MD5
237275dab02196abc78711ad60b6a38a
SHA1
6c8a3a397a6965a52c635ac4d1d77eca136739d1
SHA256
ae60f3f0d1d0b5de546680d8c8048919a8ba48306f7b5278309fe81f5ba4bac7
SHA512
5f2566c39c18f26573345174c0fe548b3de8b35b3a994b16bd91807465e5f5881a0aca537ab1a5ce7e22955c745fdf4c3878f8d86d3c25838abf8b65d8a6ee33
SSDEEP
12288:vAlCPHBWEj4LR/TkgNuKKQvJPdkaPkkzUtW02iRD42FNTvVMty5arlwf6dPMV:dsLR/Tkg4KTvJ6aPkkRpCRfAPm
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\Gitlab-Runner\builds\Uxz-yfy2e\0\client-software\monolith\Build\ProtectorGamesApp\Release\GameLauncher.pdb
WriteFile
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
ReleaseMutex
MultiByteToWideChar
WideCharToMultiByte
GetGeoInfoW
GetUserGeoID
GetUserDefaultUILanguage
CreateDirectoryW
OpenMutexW
GetSystemInfo
OpenFileMappingW
FormatMessageA
GetModuleHandleA
GetFileAttributesW
GetFileSizeEx
GetFullPathNameW
FindResourceExW
LoadResource
CreateMutexA
GetCurrentDirectoryW
FindClose
FindNextFileW
FileTimeToLocalFileTime
GetSystemTime
SystemTimeToFileTime
SetLastError
GetCurrentProcessId
OpenMutexA
CreateFileMappingA
OpenFileMappingA
GetPrivateProfileSectionNamesW
FlushFileBuffers
SetFilePointerEx
GetVolumeInformationA
DeviceIoControl
GetWindowsDirectoryA
GetPrivateProfileStringW
GetTickCount
WriteConsoleW
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetFileSize
GetACP
IsValidCodePage
FindFirstFileExW
GetTimeZoneInformation
ReadConsoleW
SetStdHandle
GetConsoleMode
GetConsoleCP
LCMapStringW
CompareStringW
GetStdHandle
ExitProcess
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
GetFileType
GetFileInformationByHandle
GetDriveTypeW
MoveFileExW
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
DeleteFileW
CreateFileW
K32EnumProcesses
GetModuleFileNameW
VirtualQuery
GetNativeSystemInfo
GetVersionExW
DuplicateHandle
LeaveCriticalSection
EnterCriticalSection
CreateEventW
InitializeCriticalSection
GetExitCodeThread
GetExitCodeProcess
WaitForMultipleObjects
CreateRemoteThread
FlushInstructionCache
VirtualProtectEx
WriteProcessMemory
VirtualAllocEx
UnmapViewOfFile
MapViewOfFile
IsWow64Process
ReadFile
SetFilePointer
CreateFileA
DeleteCriticalSection
DecodePointer
RaiseException
InitializeCriticalSectionEx
OpenEventW
QueryUnbiasedInterruptTime
ResumeThread
AssignProcessToJobObject
CreateProcessW
SetInformationJobObject
GetLastError
CreateJobObjectW
SetEvent
GetCurrentThread
GetProcAddress
GetModuleHandleW
GetCurrentProcess
CheckRemoteDebuggerPresent
IsDebuggerPresent
CreateToolhelp32Snapshot
Process32NextW
Process32FirstW
K32GetProcessImageFileNameW
OpenProcess
QueryInformationJobObject
CloseHandle
TerminateJobObject
CreateFileMappingW
CreateMutexW
GetCurrentThreadId
OpenThread
Sleep
WaitForSingleObject
GetTickCount64
ResetEvent
LocalFree
CreateThread
GetCommandLineW
GetCommandLineA
LoadLibraryExW
FreeLibrary
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
RtlUnwind
InitializeSListHead
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetStartupInfoW
WaitForSingleObjectEx
InitializeCriticalSectionAndSpinCount
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
OutputDebugStringW
GetCPInfo
GetStringTypeW
EncodePointer
SetEndOfFile
GetOEMCP
BroadcastSystemMessageW
FindWindowA
IsWindow
GetForegroundWindow
IsWindowVisible
GetWindowThreadProcessId
TranslateMessage
DispatchMessageW
CreateDialogParamW
DestroyWindow
LoadIconW
RegisterWindowMessageA
MessageBoxW
SetWindowTextW
PeekMessageW
MsgWaitForMultipleObjectsEx
PostQuitMessage
SetDlgItemTextW
GetDlgItem
EnumDisplaySettingsW
GetSystemMetrics
ShowWindow
BringWindowToTop
SetFocus
AttachThreadInput
GetDC
GetClassNameA
PostMessageW
FindWindowW
SendMessageW
SetForegroundWindow
ReleaseDC
ChangeDisplaySettingsW
GetDeviceCaps
CryptReleaseContext
CryptGetHashParam
RegSetValueExA
RegSetKeySecurity
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
ImpersonateSelf
StartServiceW
QueryServiceStatusEx
OpenServiceW
OpenSCManagerW
CloseServiceHandle
GetUserNameW
CryptGenRandom
RegQueryValueExA
RegQueryInfoKeyA
RegOpenKeyExA
RegEnumKeyExA
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptDecrypt
CryptSetKeyParam
CryptDestroyKey
CryptDeriveKey
CryptAcquireContextW
RevertToSelf
ImpersonateLoggedOnUser
OpenThreadToken
OpenProcessToken
ConvertStringSecurityDescriptorToSecurityDescriptorW
SHGetKnownFolderPath
CoInitializeSecurity
CoInitializeEx
CoUninitialize
CoCreateInstance
CoSetProxyBlanket
CoTaskMemFree
CoInitialize
SysAllocString
VariantInit
VariantClear
VariantChangeType
SysFreeString
PathFileExistsW
GetUserNameExW
InternetQueryOptionA
HttpOpenRequestA
InternetGetLastResponseInfoA
HttpAddRequestHeadersA
InternetConnectA
InternetReadFile
InternetOpenA
InternetCloseHandle
HttpSendRequestA
HttpQueryInfoA
WSAStartup
gethostbyname
ntohl
GetAdaptersInfo
UuidCreate
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ