Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-04_ed56b5c1af59116779570690802d2d07_avoslocker_cobalt-strike_hijackloader.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-09-04_ed56b5c1af59116779570690802d2d07_avoslocker_cobalt-strike_hijackloader.exe
Resource
win10v2004-20240802-en
Target
2024-09-04_ed56b5c1af59116779570690802d2d07_avoslocker_cobalt-strike_hijackloader
Size
861KB
MD5
ed56b5c1af59116779570690802d2d07
SHA1
affc002bdfae7e292ffd006fef0415240a043c2b
SHA256
28cea4f69942b6d61760751ab85fa9514bacc4bd5c609500d3f5cdabaade906f
SHA512
6eaffe98ea7fef7ae429ee6a030dcf065b4821d66333d1d77e26cbf292bd61b8fc667681a17e824b0999f51813ca24d4af135b01cb85f1dda1cf80ebdf1f27f2
SSDEEP
24576:f5KoVRa9CMoZEvUbYGAxSnbpMFsR5zKnyJ3nq:RKoa9CMoZEsbYGAxKbpMGR5zKyJ3nq
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\bamboo\home\xml-data\build-dir\CODRU-BA-SOURCES\bin\Win32\Release\DiscoverySrv.pdb
CryptMsgGetParam
CryptMsgClose
CertFindCertificateInStore
CertCloseStore
CertFreeCTLContext
CertFreeCRLContext
CertFreeCertificateContext
CryptQueryObject
CertGetNameStringW
CreateProcessW
GetExitCodeProcess
FindResourceW
LoadResource
LockResource
SizeofResource
SetEnvironmentVariableW
GetSystemDirectoryW
LoadLibraryExW
WideCharToMultiByte
MultiByteToWideChar
LocalFree
GetModuleHandleExW
Sleep
GetNativeSystemInfo
IsWow64Process
GetCurrentProcess
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
CreateFileW
CloseHandle
LoadLibraryW
GetLastError
FreeLibrary
FormatMessageA
WaitForSingleObject
GetCommandLineW
HeapSize
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
GetTimeZoneInformation
HeapReAlloc
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
ReadConsoleW
ReadFile
GetStringTypeW
CreateDirectoryW
FindClose
FindFirstFileExW
FindNextFileW
GetFileAttributesW
GetFileAttributesExW
GetFileInformationByHandle
GetFinalPathNameByHandleW
SetEndOfFile
SetFileAttributesW
SetFilePointerEx
AreFileApisANSI
DeviceIoControl
GetFileInformationByHandleEx
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
TryEnterCriticalSection
DeleteCriticalSection
GetCurrentThreadId
EncodePointer
DecodePointer
LCMapStringEx
QueryPerformanceCounter
QueryPerformanceFrequency
InitializeConditionVariable
WakeConditionVariable
WakeAllConditionVariable
SleepConditionVariableCS
SleepConditionVariableSRW
GetSystemTimeAsFileTime
GetTickCount64
GetLocaleInfoEx
CompareStringEx
GetCPInfo
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetCurrentProcessId
InitializeSListHead
GetEnvironmentVariableW
ExpandEnvironmentStringsW
DeleteFileW
GetFileSizeEx
SetFilePointer
WriteFile
DebugBreak
OutputDebugStringA
OutputDebugStringW
SetLastError
HeapAlloc
HeapFree
GetProcessHeap
GetProcessTimes
GetCurrentThread
GetLocalTime
GetWindowsDirectoryW
FindResourceExW
GetModuleFileNameA
LoadLibraryExA
LoadLibraryA
FormatMessageW
SetSearchPathMode
FileTimeToSystemTime
K32GetMappedFileNameW
WriteConsoleW
SuspendThread
ResumeThread
GetThreadContext
SetThreadContext
FlushInstructionCache
VirtualAlloc
VirtualProtect
VirtualFree
VirtualQuery
GetLongPathNameW
QueryDosDeviceW
RtlUnwind
RaiseException
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
ExitProcess
GetStdHandle
CreateThread
ExitThread
FreeLibraryAndExitThread
SetStdHandle
GetFileType
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
GetExitCodeThread
DispatchMessageW
TranslateMessage
GetMessageW
OpenProcessToken
LookupAccountSidW
GetAclInformation
GetTokenInformation
RegGetValueW
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
RegOpenKeyExW
GetAce
GetFileSecurityW
GetSecurityDescriptorDacl
GetSidIdentifierAuthority
GetSidSubAuthority
GetSidSubAuthorityCount
GetNamedSecurityInfoW
RegSetValueExW
RegCreateKeyExW
RegCloseKey
RegQueryValueExW
CommandLineToArgvW
CoUninitialize
CoInitializeSecurity
CoInitializeEx
CoCreateInstance
SysAllocString
SysFreeString
VariantClear
PathIsRelativeW
CryptCATCatalogInfoFromContext
CryptCATAdminCalcHashFromFileHandle
CryptCATAdminAcquireContext
CryptCATAdminEnumCatalogFromHash
CryptCATAdminReleaseContext
WinVerifyTrust
timeGetTime
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ