Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-15_afc1b50e6bce05b6da7c83b3bde0e849_cobalt-strike_megazord.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-15_afc1b50e6bce05b6da7c83b3bde0e849_cobalt-strike_megazord.exe
Resource
win10v2004-20240802-en
Target
2024-09-15_afc1b50e6bce05b6da7c83b3bde0e849_cobalt-strike_megazord
Size
4.5MB
MD5
afc1b50e6bce05b6da7c83b3bde0e849
SHA1
c2d107500518dc5bf3f92f89a679ab629f7e2369
SHA256
ff7e90145fb1f80bd8731b5f7c97267b3b2d5bd431889692d8c0b8399ad523f0
SHA512
30a234f28d4918d975f29f5a66d7a3222f4c58c5449ce3f386f0f3c1bbf2858f7b1ef370bfc1e85f70dca5c779bcfc78a02cd856d0cc22239a4ce83aee1e1505
SSDEEP
49152:vSJZ5BgIw0zXCWSKkVGgX+kR3RDSBZTagcoErCtOe9wJqJnsT6ZlYmxR3lDaNS/n:Q/zKgZRHcsgIT
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
D:\a\1\s\ripgrep\target\x86_64-pc-windows-msvc\release\deps\rg.pdb
SystemFunction036
OpenProcessToken
CloseHandle
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
GetSystemInfo
CreateFileMappingW
MapViewOfFile
VirtualProtect
UnmapViewOfFile
ReleaseMutex
WaitForSingleObject
CreateMutexA
VirtualAlloc
VirtualFree
GetFileType
GetLastError
GetStdHandle
GetConsoleMode
GetFileInformationByHandleEx
ReleaseSRWLockShared
GetFileInformationByHandle
SleepConditionVariableSRW
GetConsoleScreenBufferInfo
SetConsoleTextAttribute
SetConsoleMode
TryAcquireSRWLockExclusive
FreeEnvironmentStringsW
FindClose
CompareStringOrdinal
AddVectoredExceptionHandler
SetThreadStackGuarantee
SwitchToThread
Sleep
GetCurrentProcess
GetCurrentThread
RtlCaptureContext
GetProcAddress
RtlLookupFunctionEntry
SetLastError
GetCurrentDirectoryW
GetEnvironmentStringsW
GetEnvironmentVariableW
SetEnvironmentVariableW
GetCommandLineW
FlushFileBuffers
DuplicateHandle
SetFilePointerEx
GetCurrentProcessId
WriteFileEx
SleepEx
ReadFileEx
GetExitCodeProcess
TerminateProcess
WakeAllConditionVariable
QueryPerformanceCounter
QueryPerformanceFrequency
HeapAlloc
GetProcessHeap
HeapFree
HeapReAlloc
AcquireSRWLockShared
WaitForSingleObjectEx
LoadLibraryA
GetModuleHandleA
FindNextFileW
CreateFileW
FindFirstFileW
GetFinalPathNameByHandleW
GetModuleHandleW
FormatMessageW
GetModuleFileNameW
ExitProcess
GetFullPathNameW
CreateNamedPipeW
GetSystemDirectoryW
GetWindowsDirectoryW
CreateProcessW
GetFileAttributesW
MultiByteToWideChar
WriteConsoleW
WideCharToMultiByte
ReadConsoleW
CreateThread
TlsGetValue
TlsSetValue
GetSystemTimeAsFileTime
GetConsoleOutputCP
HeapSize
LCMapStringW
CompareStringW
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
GetStringTypeW
SetStdHandle
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetCommandLineA
GetModuleHandleExW
WriteFile
LoadLibraryExW
FreeLibrary
TlsFree
TlsAlloc
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
EncodePointer
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetCurrentThreadId
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwindEx
RtlPcToFileHeader
RaiseException
GetUserProfileDirectoryW
BCryptGenRandom
RtlNtStatusToDosError
NtReadFile
NtWriteFile
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ