Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-23_4c4c8e0cd8244cf5466a00d2b12e5408_avoslocker_cobalt-strike_hijackloader.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2024-08-23_4c4c8e0cd8244cf5466a00d2b12e5408_avoslocker_cobalt-strike_hijackloader.exe
Resource
win10v2004-20240802-en
Target
2024-08-23_4c4c8e0cd8244cf5466a00d2b12e5408_avoslocker_cobalt-strike_hijackloader
Size
387KB
MD5
4c4c8e0cd8244cf5466a00d2b12e5408
SHA1
f3c5e7da307f0456d615de15073ac7512ad146b7
SHA256
6955d0640f20ce5d7a7c00ce9d07da7eeedf254ce2fd514dae5eeae3139db614
SHA512
f2f29517c385f513dd0176b5373e1d002997bcbb7113ab3b9fae9b7ca4a16a1be53dc74c9539c88ed6d90a8a7be1446971c84a6c42558b36deef82900680a16d
SSDEEP
12288:vXsPBemHtHN5fScB7yIL+5IotCIe5zurSnZJdjvDxT2:vSeoSRJcZ5ztnZJdXxC
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
c:\jenkins\workspace\8-2-build-windows-i586-cygwin-sans-NAS\jdk8u411\893\build\windows-i586\deploy\jre-image\bin\javaws.pdb
GetCurrentProcessId
WideCharToMultiByte
FreeLibrary
GetModuleHandleW
GetProcAddress
LoadLibraryW
CreateDirectoryW
FindClose
FindFirstFileW
CloseHandle
WaitForSingleObject
CreateEventW
OpenProcess
GetTickCount
GetSystemWindowsDirectoryW
GetModuleFileNameW
GetThreadLocale
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
VerSetConditionMask
GetEnvironmentVariableW
CreateFileW
GetLongPathNameW
GetShortPathNameW
GetTempPathW
DecodePointer
RaiseException
GetLastError
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetCurrentProcess
CreateProcessW
GlobalMemoryStatusEx
GetLocalTime
GetSystemDirectoryW
GetWindowsDirectoryW
GetVersionExW
GetNativeSystemInfo
GlobalAlloc
GlobalFree
LocalAlloc
LocalFree
FormatMessageW
lstrlenW
VerifyVersionInfoW
WTSGetActiveConsoleSessionId
OutputDebugStringW
GetCurrentThreadId
GetExitCodeProcess
GetModuleHandleExW
GetFileAttributesW
GetFullPathNameW
GetCurrentDirectoryW
SetEnvironmentVariableW
HeapAlloc
HeapFree
WriteConsoleW
HeapSize
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
GetFileSizeEx
GetFileAttributesExW
GetStringTypeW
WriteFile
GetStdHandle
SetFilePointerEx
ReadConsoleW
ReadFile
SetEndOfFile
HeapReAlloc
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
SetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeZoneInformation
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetSystemInfo
VirtualProtect
VirtualQuery
LoadLibraryExA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
EnterCriticalSection
LeaveCriticalSection
MultiByteToWideChar
RtlUnwind
SetLastError
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
GetDriveTypeW
GetFileInformationByHandle
GetFileType
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
ExitProcess
GetCommandLineA
GetCommandLineW
DeleteFileW
GetDateFormatW
DispatchMessageW
DefWindowProcW
RegisterClassW
CreateWindowExW
SetTimer
LoadCursorW
wsprintfW
OpenInputDesktop
CloseDesktop
GetShellWindow
GetWindowThreadProcessId
GetMessageW
TranslateMessage
MessageBoxW
StringFromCLSID
CoTaskMemFree
SysStringLen
SysFreeString
SysAllocString
SysAllocStringByteLen
VariantClear
WSAAsyncSelect
recv
accept
bind
connect
getsockname
htons
ioctlsocket
listen
ntohs
send
socket
WSAStartup
WSAGetLastError
closesocket
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ