Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-01_6ae08a2c71e1b2529e36ed8a18f59303_avoslocker_cobalt-strike_hijackloader.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2024-09-01_6ae08a2c71e1b2529e36ed8a18f59303_avoslocker_cobalt-strike_hijackloader.exe
Resource
win10v2004-20240802-en
Target
2024-09-01_6ae08a2c71e1b2529e36ed8a18f59303_avoslocker_cobalt-strike_hijackloader
Size
722KB
MD5
6ae08a2c71e1b2529e36ed8a18f59303
SHA1
2a4a8d34b0db08db064a585e06ff2ddeefe84286
SHA256
f37cb533e9478eef66f3ae5380e2f3e1d00731e96b5cbe7e67262a180a8d65b9
SHA512
041f62ed48d7415287e9d3f21dec3b773979c1cae3d9173d48af2305a841bccb9451f0b1e831b093df23822fc60986f637dfc496860741d5107bbdd2d77f621c
SSDEEP
12288:nZc08o70L43SZiHk/dg+vVeNFEIj2K+T4DPl0Tk7WCExQKf:nZcEP3cMgdTVeNFygPJ7HEyKf
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
WinHttpOpen
WinHttpReceiveResponse
WinHttpAddRequestHeaders
WinHttpQueryHeaders
WinHttpReadData
WinHttpOpenRequest
WinHttpSetOption
WinHttpCloseHandle
WinHttpGetIEProxyConfigForCurrentUser
WinHttpGetProxyForUrl
WinHttpSendRequest
WinHttpQueryDataAvailable
WinHttpSetTimeouts
WinHttpQueryOption
WinHttpConnect
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
TlsGetValue
TlsSetValue
TlsFree
GlobalReAlloc
GlobalHandle
LocalReAlloc
GetLocaleInfoW
GetSystemDefaultUILanguage
GetUserDefaultUILanguage
GlobalFlags
FindClose
FindFirstFileW
GetFullPathNameW
GetVolumeInformationW
LockFile
UnlockFile
DuplicateHandle
GetThreadLocale
FileTimeToSystemTime
VirtualProtect
SetErrorMode
FileTimeToLocalFileTime
GetFileAttributesExW
GetFileSizeEx
InitializeCriticalSection
SetFileAttributesW
SystemTimeToTzSpecificLocalTime
GetTickCount
GetUserDefaultLCID
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
QueryPerformanceCounter
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
CompareStringW
GlobalFindAtomW
GetSystemDirectoryW
EncodePointer
MulDiv
LoadLibraryA
GlobalAddAtomW
WritePrivateProfileStringW
GetPrivateProfileStringW
GetPrivateProfileIntW
lstrcmpW
lstrcmpA
GlobalDeleteAtom
FreeLibrary
GetCurrentThread
CreateEventW
SetEvent
GetModuleHandleA
LeaveCriticalSection
EnterCriticalSection
OutputDebugStringA
GetACP
GlobalUnlock
GlobalLock
GlobalAlloc
OutputDebugStringW
FormatMessageW
FlushFileBuffers
GetFileSize
GetLocalTime
GlobalFree
GetCurrentThreadId
SetEndOfFile
GetEnvironmentVariableW
SetLastError
GetModuleHandleW
LoadLibraryExW
GetSystemTimeAsFileTime
InitializeCriticalSectionEx
LCMapStringEx
GetStringTypeW
GetCPInfo
RtlUnwind
GetCommandLineA
MoveFileExW
GetTimeZoneInformation
GetDriveTypeW
SetStdHandle
VerifyVersionInfoW
VerSetConditionMask
LocalFree
SetCurrentDirectoryW
GetVersionExW
LocalAlloc
GetCurrentProcess
SystemTimeToFileTime
GetCurrentDirectoryW
LocalFileTimeToFileTime
CreateFileW
SetFilePointer
SetFileTime
WriteFile
ReadFile
CreateProcessW
CreateThread
Process32FirstW
Process32NextW
Sleep
CreateToolhelp32Snapshot
OpenProcess
GetFileAttributesW
TerminateProcess
IsBadStringPtrW
CopyFileW
GetCurrentProcessId
GetFileType
ExitProcess
GetModuleHandleExW
TlsAlloc
GetProcAddress
LoadLibraryW
DeleteFileW
ReleaseMutex
WaitForSingleObject
CreateMutexW
GetStdHandle
WideCharToMultiByte
FindResourceW
LoadResource
CloseHandle
LockResource
MultiByteToWideChar
GetModuleFileNameW
GetCommandLineW
SizeofResource
CreateDirectoryW
GetProcessHeap
DeleteCriticalSection
DecodePointer
HeapAlloc
RaiseException
HeapReAlloc
GetLastError
HeapSize
InitializeCriticalSectionAndSpinCount
HeapFree
HeapQueryInformation
GetSystemInfo
VirtualAlloc
VirtualQuery
GetConsoleMode
ReadConsoleW
GetConsoleOutputCP
SetFilePointerEx
LCMapStringW
IsValidLocale
EnumSystemLocalesW
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetFileTime
WriteConsoleW
IsRectEmpty
IntersectRect
SetRect
InvalidateRgn
CopyAcceleratorTableW
CharNextW
CharUpperW
GetSysColorBrush
LoadCursorW
ReleaseCapture
SetCapture
InvalidateRect
RealChildWindowFromPoint
DestroyMenu
ClientToScreen
GetWindowDC
TabbedTextOutW
GrayStringW
DrawTextExW
DrawTextW
IsDialogMessageW
SetWindowTextW
MoveWindow
GetMonitorInfoW
MonitorFromWindow
WinHelpW
UnhookWindowsHookEx
GetTopWindow
GetClassNameW
GetClassLongW
SetWindowLongW
PtInRect
EqualRect
GetSysColor
MapWindowPoints
GetNextDlgGroupItem
AdjustWindowRectEx
GetWindowTextLengthW
GetWindowTextW
RemovePropW
GetPropW
GetScrollPos
RedrawWindow
EndPaint
BeginPaint
SetForegroundWindow
GetForegroundWindow
UpdateWindow
SetMenu
GetMenu
GetCapture
SetFocus
GetDlgCtrlID
EndDeferWindowPos
DeferWindowPos
BeginDeferWindowPos
IsChild
IsMenu
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
CallWindowProcW
DefWindowProcW
GetMessageTime
GetMessagePos
RegisterWindowMessageW
LoadBitmapW
SetMenuItemInfoW
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
EnableMenuItem
CheckMenuItem
GetFocus
GetMenuItemCount
GetMenuItemID
MessageBeep
CopyRect
ReleaseDC
RegisterClipboardFormatW
PostThreadMessageW
ScreenToClient
GetDC
MapDialogRect
GetWindow
SetWindowContextHelpId
SetWindowPos
GetWindowRect
GetSubMenu
GetDesktopWindow
SetActiveWindow
GetNextDlgTabItem
GetDlgItem
EndDialog
CreateDialogIndirectParamW
DestroyWindow
IsWindow
GetLastActivePopup
GetWindowThreadProcessId
GetWindowLongW
IsWindowEnabled
SetCursor
PostQuitMessage
CallNextHookEx
SetWindowsHookExW
GetCursorPos
ValidateRect
GetKeyState
GetActiveWindow
IsWindowVisible
PeekMessageW
DispatchMessageW
TranslateMessage
GetMessageW
GetParent
OffsetRect
SetRectEmpty
SendDlgItemMessageA
OpenClipboard
CloseClipboard
EmptyClipboard
SetClipboardData
GetSystemMenu
PostMessageW
MessageBoxW
SendMessageW
GetSystemMetrics
DrawIcon
ShowWindow
SetTimer
LoadIconW
GetClientRect
KillTimer
IsIconic
EnableWindow
UnregisterClassW
SetPropW
ScaleViewportExtEx
ScaleWindowExtEx
GetBkColor
GetRgnBox
OffsetViewportOrgEx
SetWindowExtEx
SetViewportOrgEx
GetMapMode
SetViewportExtEx
ExtTextOutW
TextOutW
GetTextColor
SetMapMode
SelectObject
ExtSelectClipRgn
SaveDC
RestoreDC
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
GetStockObject
GetClipBox
Escape
DeleteObject
GetObjectW
SetTextColor
SetBkColor
CreateBitmap
GetDeviceCaps
CreateRectRgnIndirect
DeleteDC
DocumentPropertiesW
ClosePrinter
OpenPrinterW
SetSecurityDescriptorDacl
RegSetValueExW
RegQueryValueW
RegEnumKeyW
RegDeleteKeyW
RegDeleteValueW
RegEnumValueW
RegQueryValueExW
RegOpenKeyExW
AllocateAndInitializeSid
FreeSid
CheckTokenMembership
InitializeSecurityDescriptor
GetUserNameW
RegCloseKey
RegCreateKeyExW
SHGetFolderPathW
ShellExecuteW
InitCommonControlsEx
PathIsURLW
PathRemoveFileSpecW
PathFindExtensionW
PathFindFileNameW
PathIsUNCW
PathStripToRootW
PathFileExistsW
CoCreateInstance
CoCreateGuid
CoUninitialize
CoInitializeEx
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
CoTaskMemFree
CoTaskMemAlloc
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CreateILockBytesOnHGlobal
CoFreeUnusedLibraries
OleInitialize
OleUninitialize
CoRevokeClassObject
OleFlushClipboard
OleIsCurrentClipboard
CoRegisterMessageFilter
CoInitialize
OleCreateFontIndirect
VariantCopy
SafeArrayDestroy
SysFreeString
SysAllocString
SysAllocStringLen
VariantInit
VariantClear
SysStringLen
SystemTimeToVariantTime
VariantTimeToSystemTime
VariantChangeType
OleUIBusyW
CreateStdAccessibleObject
LresultFromObject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ