Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-05_0e101aa091bd4c591a30942e2fbaef18_avoslocker_hijackloader.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-05_0e101aa091bd4c591a30942e2fbaef18_avoslocker_hijackloader.exe
Resource
win10v2004-20240802-en
Target
2024-09-05_0e101aa091bd4c591a30942e2fbaef18_avoslocker_hijackloader
Size
7.7MB
MD5
0e101aa091bd4c591a30942e2fbaef18
SHA1
74b3ffa961b3dd670af501b7646868dd79f71bb3
SHA256
45b6eade24a9f380358defeb0ddb5ebd13826984701cc9585273c778eee82271
SHA512
cdc0113d06833f6f2722c1f1ca1572fed7a850a41808c6b712cd7f94e55b18e10a29f5564ca5a615df577a0e1e37df6d29183783554f93c6c04554632417f8e0
SSDEEP
98304:WW2qkg8cVNydrKPmbWt5k3bjyuOKADQbJ4zkKAFu:3NQuzoypKx
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\Jenkins\workspace\ccd-hyperdrive\main\native\win32\build\msvs_win32_x86\Release\x86\sym\HDBootStrapper\HDBootStrapper\Set-up.pdb
FindFirstFileW
SetLastError
FindNextFileW
lstrlenW
RemoveDirectoryW
GetModuleFileNameW
GetTempPathW
FindClose
LocalAlloc
CreateFileW
GetFileAttributesW
SetFileAttributesW
FormatMessageW
GetLastError
GetDiskFreeSpaceExW
DeleteFileW
CloseHandle
GetCurrentDirectoryW
SetCurrentDirectoryW
LocalFree
MoveFileExW
CopyFileW
lstrcmpiW
lstrcmpW
GetDriveTypeW
GetCurrentProcess
ReadFile
WaitForSingleObject
GetProcAddress
CreateProcessW
GetModuleHandleW
GetExitCodeProcess
TerminateProcess
OpenProcess
CreateToolhelp32Snapshot
MultiByteToWideChar
Sleep
Process32NextW
Process32FirstW
LoadLibraryW
FreeLibrary
WideCharToMultiByte
HeapFree
InitializeCriticalSectionEx
HeapSize
HeapReAlloc
HeapAlloc
DecodePointer
HeapDestroy
DeleteCriticalSection
GetProcessHeap
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
GlobalAlloc
RaiseException
GlobalLock
GlobalUnlock
MulDiv
GetStdHandle
AttachConsole
FreeConsole
GetConsoleWindow
CreateMutexW
ReleaseMutex
GetSystemDirectoryW
SetDllDirectoryW
GetVersionExW
GetFullPathNameW
OpenMutexW
SetWaitableTimer
CreateWaitableTimerW
WaitForMultipleObjects
CancelWaitableTimer
CreateEventW
SetEvent
ResetEvent
GetOverlappedResult
ReadDirectoryChangesW
GetFileSizeEx
GetLocalTime
GetTimeFormatW
GetDateFormatW
SetHandleInformation
ExpandEnvironmentStringsW
DeviceIoControl
GetUserDefaultLangID
CreatePipe
GetComputerNameExW
FileTimeToSystemTime
GetNativeSystemInfo
GetWindowsDirectoryW
VerSetConditionMask
VerifyVersionInfoW
InitializeCriticalSection
GetCurrentProcessId
GetLocaleInfoA
EnumSystemLocalesW
GetUserDefaultUILanguage
GetACP
WriteConsoleW
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetSystemInfo
VirtualProtect
VirtualQuery
LoadLibraryExA
LoadLibraryA
LCMapStringW
GetUserDefaultLCID
SizeofResource
WriteFile
LockResource
LoadResource
FindResourceW
GetFileSize
FlushFileBuffers
GetCurrentThread
GlobalFree
CreateThread
SetFilePointer
ProcessIdToSessionId
TerminateThread
FindResourceExW
QueryFullProcessImageNameW
GetFileInformationByHandle
CreateNamedPipeW
ConnectNamedPipe
CreateDirectoryW
ReleaseSemaphore
OpenSemaphoreW
CreateSemaphoreW
GetTimeZoneInformation
SystemTimeToFileTime
VirtualFree
VirtualAlloc
CreateFileA
AreFileApisANSI
TryEnterCriticalSection
HeapCreate
GetDiskFreeSpaceW
OutputDebugStringA
LockFile
GetFullPathNameA
SetEndOfFile
UnlockFileEx
UnmapViewOfFile
HeapValidate
GetTempPathA
GetDiskFreeSpaceA
GetFileAttributesA
GetFileAttributesExW
OutputDebugStringW
FlushViewOfFile
WaitForSingleObjectEx
DeleteFileA
HeapCompact
UnlockFile
LockFileEx
GetSystemTimeAsFileTime
GetSystemTime
FormatMessageA
CreateFileMappingW
MapViewOfFile
QueryPerformanceCounter
GetTickCount
SetFilePointerEx
ResumeThread
SetThreadPriority
GetStringTypeW
InitializeConditionVariable
WakeConditionVariable
WakeAllConditionVariable
SleepConditionVariableCS
SleepConditionVariableSRW
IsProcessorFeaturePresent
FreeLibraryWhenCallbackReturns
CreateThreadpoolWork
SubmitThreadpoolWork
CloseThreadpoolWork
GetModuleHandleExW
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
GetLocaleInfoEx
QueryPerformanceFrequency
InitOnceComplete
InitOnceBeginInitialize
GetExitCodeThread
EncodePointer
LCMapStringEx
CompareStringEx
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
InterlockedPopEntrySList
InterlockedPushEntrySList
FlushInstructionCache
RtlUnwind
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
GetFileType
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
SetStdHandle
ExitThread
FreeLibraryAndExitThread
ExitProcess
CompareStringW
GetLocaleInfoW
IsValidLocale
GetConsoleOutputCP
GetConsoleMode
ReadConsoleW
FindFirstFileExW
IsValidCodePage
getnameinfo
WSAStartup
WSACleanup
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ