C:\Users\okuma\Downloads\Сервер\Сервер\Release\ProxyTabs.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-03_b775233fa7bc5db52afd8eaa647a416c_avoslocker_cobalt-strike.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-07-03_b775233fa7bc5db52afd8eaa647a416c_avoslocker_cobalt-strike.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-07-03_b775233fa7bc5db52afd8eaa647a416c_avoslocker_cobalt-strike
-
Size
443KB
-
MD5
b775233fa7bc5db52afd8eaa647a416c
-
SHA1
ab5b647eb759f2a4788322556994b5d7970a9164
-
SHA256
7755ce916508c28a3b744c52123ee4d0ca7d5bacaedb31d2d7b1b8072f93ebd7
-
SHA512
77333540cf2f9d032478c8929701cbb722ccbf4189e11e19c6ddc42708051eee82922b10ea5b71a15466e837a05fce985b1bb4893978c2bee19c686ead3d87da
-
SSDEEP
12288:ihS2BhsHTxsPsPPiuBz80uzwF/yL+oA3LsKJi4Wq9XEC+uU4uBbExbZvabxvtbmh:iVBhQsPsPPrzASroA3OA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-07-03_b775233fa7bc5db52afd8eaa647a416c_avoslocker_cobalt-strike
Files
-
2024-07-03_b775233fa7bc5db52afd8eaa647a416c_avoslocker_cobalt-strike.exe windows:6 windows x86 arch:x86
5c8699c9afbd3a90a6c32541b76b0bf0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
webview2loader
CreateCoreWebView2EnvironmentWithOptions
kernel32
CreateSemaphoreExW
HeapFree
SetLastError
ReleaseSemaphore
GetModuleHandleExW
InitializeCriticalSectionEx
WaitForSingleObject
GetCurrentThreadId
ReleaseMutex
FormatMessageW
GetLastError
OutputDebugStringW
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
RaiseException
HeapAlloc
GetCurrentDirectoryW
DecodePointer
GetModuleFileNameA
CreateMutexExW
DeleteCriticalSection
GetCurrentProcessId
GetProcessHeap
GetModuleHandleW
DebugBreak
IsDebuggerPresent
CreateFileW
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
WriteConsoleW
GetProcAddress
GetCPInfo
FindClose
HeapSize
MultiByteToWideChar
GetStringTypeW
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
EncodePointer
LCMapStringEx
GetLocaleInfoEx
CompareStringEx
SetEndOfFile
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwind
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleFileNameW
GetStdHandle
WriteFile
GetFileType
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
GetFileSizeEx
SetFilePointerEx
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
ReadFile
HeapReAlloc
ReadConsoleW
GetTimeZoneInformation
user32
PostQuitMessage
TranslateMessage
GetMessageW
DefWindowProcW
GetDC
CreateWindowExW
RegisterClassW
DispatchMessageW
GetClientRect
gdi32
CreateSolidBrush
GetDeviceCaps
ole32
CoTaskMemFree
CoTaskMemAlloc
Sections
.text Size: 329KB - Virtual size: 328KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 81KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ