Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-24_83bcff86e9f8882fbc798982a6f9b1d0_cobalt-strike_megazord.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-08-24_83bcff86e9f8882fbc798982a6f9b1d0_cobalt-strike_megazord.exe
Resource
win10v2004-20240802-en
Target
2024-08-24_83bcff86e9f8882fbc798982a6f9b1d0_cobalt-strike_megazord
Size
4.5MB
MD5
83bcff86e9f8882fbc798982a6f9b1d0
SHA1
53ad97b2d2887eaf26f2770b98a0439b1498cd56
SHA256
da228460116e2f20cbc728bf6a14d1fa1a27d2cec9aacc9e2d320a72b76315c7
SHA512
cc7fe3c102cd5a66b7977935c1ad6d75a71ca6128427e5d164cb17366c5f7513f7356abeb0bf5c9ac81910c690b39e6a1874d01870268285c52d5887299c0c19
SSDEEP
49152:iSJZ5BgIw0zXCWSKkVGgX+kR3RDSBZTagcoErCtOe9wJqJnsT6ZlYmxR3lDaNS/B:5/zKgZRHcsgI9
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
D:\a\1\s\ripgrep\target\x86_64-pc-windows-msvc\release\deps\rg.pdb
SystemFunction036
OpenProcessToken
CloseHandle
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
GetSystemInfo
CreateFileMappingW
MapViewOfFile
VirtualProtect
UnmapViewOfFile
ReleaseMutex
WaitForSingleObject
CreateMutexA
VirtualAlloc
VirtualFree
GetFileType
GetLastError
GetStdHandle
GetConsoleMode
GetFileInformationByHandleEx
ReleaseSRWLockShared
GetFileInformationByHandle
SleepConditionVariableSRW
GetConsoleScreenBufferInfo
SetConsoleTextAttribute
SetConsoleMode
TryAcquireSRWLockExclusive
FreeEnvironmentStringsW
FindClose
CompareStringOrdinal
AddVectoredExceptionHandler
SetThreadStackGuarantee
SwitchToThread
Sleep
GetCurrentProcess
GetCurrentThread
RtlCaptureContext
GetProcAddress
RtlLookupFunctionEntry
SetLastError
GetCurrentDirectoryW
GetEnvironmentStringsW
GetEnvironmentVariableW
SetEnvironmentVariableW
GetCommandLineW
FlushFileBuffers
DuplicateHandle
SetFilePointerEx
GetCurrentProcessId
WriteFileEx
SleepEx
ReadFileEx
GetExitCodeProcess
TerminateProcess
WakeAllConditionVariable
QueryPerformanceCounter
QueryPerformanceFrequency
HeapAlloc
GetProcessHeap
HeapFree
HeapReAlloc
AcquireSRWLockShared
WaitForSingleObjectEx
LoadLibraryA
GetModuleHandleA
FindNextFileW
CreateFileW
FindFirstFileW
GetFinalPathNameByHandleW
GetModuleHandleW
FormatMessageW
GetModuleFileNameW
ExitProcess
GetFullPathNameW
CreateNamedPipeW
GetSystemDirectoryW
GetWindowsDirectoryW
CreateProcessW
GetFileAttributesW
MultiByteToWideChar
WriteConsoleW
WideCharToMultiByte
ReadConsoleW
CreateThread
TlsGetValue
TlsSetValue
GetSystemTimeAsFileTime
GetConsoleOutputCP
HeapSize
LCMapStringW
CompareStringW
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
GetStringTypeW
SetStdHandle
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetCommandLineA
GetModuleHandleExW
WriteFile
LoadLibraryExW
FreeLibrary
TlsFree
TlsAlloc
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
EncodePointer
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetCurrentThreadId
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwindEx
RtlPcToFileHeader
RaiseException
GetUserProfileDirectoryW
BCryptGenRandom
RtlNtStatusToDosError
NtReadFile
NtWriteFile
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ