Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-26_61115a587fc15a62d1532b56a86eec13_avoslocker_cobalt-strike_hijackloader_metamorfo_virut.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-07-26_61115a587fc15a62d1532b56a86eec13_avoslocker_cobalt-strike_hijackloader_metamorfo_virut.exe
Resource
win10v2004-20240709-en
Target
2024-07-26_61115a587fc15a62d1532b56a86eec13_avoslocker_cobalt-strike_hijackloader_metamorfo_virut
Size
330KB
MD5
61115a587fc15a62d1532b56a86eec13
SHA1
89bfa41cb35d63eaea290672aa257ca82635e36d
SHA256
657fdf6311ba383c171b6b8e0db1a3e5f3302c1bd295b9b4869769813361a234
SHA512
4e0731801013cc032f229580bdb7b3cf8888ac9c661991df47215fd3c9ba5c1520b904435c3b5d8e553cee0abba2d2e97bee250681e3779df16a096096ab3aa3
SSDEEP
6144:4WqRCQw01uRUTfNStTIHNF0l0jkXhSk3q/M4mF5sAOj/dxCUu+px0p9k:cRCYuRUTfNStTIHNF0likXF3f4OSdx97
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
H:\pub_8vp1\rc_2404\Build\Release\WPSOffice\office6\kvprinter\kvpins.pdb
SetEnvironmentVariableW
ExpandEnvironmentStringsW
DeleteFileW
GetTempFileNameW
RemoveDirectoryW
SetFileAttributesW
GetTempPathW
IsDebuggerPresent
OutputDebugStringW
CloseHandle
GetLastError
SetLastError
FatalAppExitW
HeapAlloc
HeapFree
GetProcessHeap
SetEvent
WaitForSingleObject
CreateEventW
SetWaitableTimer
Sleep
CreateWaitableTimerW
GetCurrentProcess
GetCurrentProcessId
TerminateProcess
GetExitCodeProcess
TerminateThread
GetExitCodeThread
ResumeThread
CreateProcessW
OpenProcess
GetTickCount
GetSystemDirectoryW
GetNativeSystemInfo
VirtualQuery
GetModuleFileNameW
GetModuleHandleW
GetProcAddress
LocalFree
FormatMessageW
GetPrivateProfileIntW
GetPrivateProfileStringW
CopyFileW
MoveFileExW
WideCharToMultiByte
GetLocaleInfoW
GetThreadLocale
GetSystemDefaultLCID
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
OutputDebugStringA
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
FreeLibrary
LoadLibraryExW
LoadResource
SizeofResource
FindResourceW
lstrcmpiW
MultiByteToWideChar
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
IsValidCodePage
CreateFileW
LoadLibraryW
GetCurrentThreadId
GetWindowsDirectoryW
IsWow64Process
DecodePointer
HeapReAlloc
HeapSize
GetConsoleMode
GetSystemInfo
VirtualProtect
LoadLibraryExA
lstrlenA
SwitchToThread
CreateThread
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
RtlUnwind
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
GetStdHandle
WriteFile
ExitProcess
GetFileType
LCMapStringW
FindClose
FindFirstFileExW
FindNextFileW
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetStringTypeW
SetFilePointerEx
FlushFileBuffers
GetConsoleCP
WriteConsoleW
?RunScript@ScriptInterpreter@@YGJPB_WPBD0PAPAUtagSAFEARRAY@@PAUtagVARIANT@@@Z
_UninstallRoutine@8
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE