Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-25_5a32fae118669b59de7e5bb54649d42e_avoslocker_floxif_hijackloader_magniber.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-25_5a32fae118669b59de7e5bb54649d42e_avoslocker_floxif_hijackloader_magniber.exe
Resource
win10v2004-20240802-en
Target
2024-09-25_5a32fae118669b59de7e5bb54649d42e_avoslocker_floxif_hijackloader_magniber
Size
11.9MB
MD5
5a32fae118669b59de7e5bb54649d42e
SHA1
c2910b356b77d71fe94708512c7ab7bf23e48bb7
SHA256
f1df70a1b62a8a5eef71e2eba3d102198a6b9cb96cf908ad787521d85f6974a3
SHA512
eca4a06a3fbfebb36826a3c7bed3b25791febe7d1b922c019c955121b14001f27aa66ff0db93c2d07a853898cdda69b35d6d11dc13f203726a4768857bcfa168
SSDEEP
196608:Kq8dh87uZO6JIFYY9J8RO8v4arFe0DyIrkdx9azlou33xtrOMCmZ:Kq8/ty+8UvNZrkdx8ou33xtrOre
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\ent-slave-root\workspace\VNCConnect\Builds\Clients\VNC_7.12.x\label\con-windows-64\bld32\RelWithDebInfo\installers\viewer_bootstrap.pdb
WSAEnumNetworkEvents
WSAEventSelect
WSAIoctl
accept
bind
closesocket
ioctlsocket
getsockopt
setsockopt
socket
htons
WSAStartup
WSASetLastError
getservbyname
getservbyport
gethostbyname
gethostbyaddr
ntohs
ntohl
inet_ntoa
inet_addr
WSAGetLastError
htonl
getsockname
getpeername
WSASocketW
WSADuplicateSocketW
WSAConnect
_TrackMouseEvent
InitCommonControlsEx
ImageList_Destroy
ImageList_Create
ImageList_ReplaceIcon
ImageList_Add
GetProcAddress
LoadLibraryW
WaitForSingleObject
GetExitCodeProcess
ResetEvent
CreateEventW
GetComputerNameW
QueryPerformanceCounter
QueryPerformanceFrequency
Sleep
GetSystemTimeAsFileTime
GetModuleHandleW
ExpandEnvironmentStringsW
SetEvent
RtlCaptureStackBackTrace
GetModuleHandleExW
GetStdHandle
GetFileType
AllocConsole
FreeConsole
GetConsoleMode
ReadConsoleW
WriteConsoleW
WaitForMultipleObjects
SystemTimeToTzSpecificLocalTime
GetTimeZoneInformation
GetHandleInformation
SetHandleInformation
GetTimeFormatW
GetDateFormatW
GetSystemDirectoryA
LoadLibraryA
GetVersionExW
GlobalLock
GlobalAlloc
GlobalFree
GlobalSize
HeapSize
GetProcessHeap
GetStringTypeW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
DecodePointer
HeapReAlloc
SetEnvironmentVariableW
GetFileSizeEx
FlushFileBuffers
SetConsoleCtrlHandler
GetConsoleOutputCP
SetFilePointerEx
EnumSystemLocalesW
IsValidLocale
LCMapStringW
CompareStringW
HeapFree
HeapAlloc
GetCurrentThread
DuplicateHandle
WriteFile
ExitProcess
ReadFile
LoadLibraryExW
EncodePointer
InterlockedFlushSList
InterlockedPushEntrySList
RtlUnwind
RaiseException
GetStartupInfoW
IsDebuggerPresent
InitializeSListHead
GetCurrentThreadId
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WaitForSingleObjectEx
InitializeCriticalSectionAndSpinCount
ReOpenFile
LocalAlloc
MultiByteToWideChar
SetErrorMode
FindNextFileW
FindFirstFileW
FindClose
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
QueryFullProcessImageNameW
GetModuleFileNameW
CreateFileW
SearchPathW
LoadLibraryExA
OutputDebugStringW
GetCurrentProcess
GetCurrentProcessId
SetStdHandle
FindResourceW
SizeofResource
LockResource
LoadResource
GetUserDefaultLCID
GetLocaleInfoW
CreateProcessW
GetCommandLineW
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
GetSystemInfo
WideCharToMultiByte
GetTempPathW
MoveFileW
LocalFree
SetLastError
SetFilePointer
SetEndOfFile
RemoveDirectoryW
GetFileAttributesExW
GetFileAttributesW
DeleteFileW
CreateDirectoryW
GetCurrentDirectoryW
SetCurrentDirectoryW
FormatMessageW
FreeLibrary
GetSystemDirectoryW
GetProcessId
GetLastError
CloseHandle
ConnectNamedPipe
CreateNamedPipeW
GetOverlappedResult
CancelIo
OpenProcess
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
CreateThread
TerminateThread
ResumeThread
GetThreadTimes
VirtualProtect
VirtualQuery
GlobalUnlock
EnumDisplaySettingsW
ChangeDisplaySettingsExW
GetNextDlgTabItem
ScrollWindowEx
RedrawWindow
KillTimer
SetTimer
DefDlgProcW
IsIconic
DestroyWindow
CreateWindowExW
ScreenToClient
RegisterClipboardFormatW
DefWindowProcW
IsWindowVisible
GetMessagePos
GetDoubleClickTime
CreateMenu
SetMenu
SetMenuDefaultItem
SetMenuItemInfoW
InsertMenuItemW
TrackPopupMenu
DeleteMenu
GetMenuItemCount
CheckMenuItem
DestroyMenu
CreatePopupMenu
GetMenuState
GetKeyboardLayout
GetWindowThreadProcessId
GetOpenClipboardWindow
EmptyClipboard
SetClipboardData
CloseClipboard
OpenClipboard
IsDialogMessageW
DestroyIcon
EnumChildWindows
SetWindowTextW
GetDlgItem
EndDialog
DialogBoxParamW
CreateDialogParamW
SetParent
GetClassNameW
IsWindowEnabled
PostMessageW
GetCursor
GetScrollInfo
SetScrollInfo
OffsetRect
AdjustWindowRectEx
GetCursorPos
InvalidateRect
GetWindowTextLengthW
GetWindowTextW
GetClipboardData
LoadIconW
GetDesktopWindow
SetWindowLongW
MapWindowPoints
ClientToScreen
GetWindowRect
EndPaint
BeginPaint
SetForegroundWindow
GetForegroundWindow
EnableMenuItem
GetSystemMenu
EnableWindow
ReleaseCapture
SetCapture
GetKeyState
GetDlgCtrlID
GetWindowPlacement
SetWindowPos
ShowWindow
IsChild
GetMessageW
GetComboBoxInfo
GetWindowDC
GetAncestor
SystemParametersInfoW
GetWindowLongW
InflateRect
FrameRect
FillRect
DrawFocusRect
GetSysColorBrush
GetSysColor
SetCursor
GetClientRect
DrawTextW
GetFocus
SendMessageW
DrawFrameControl
SetFocus
LoadCursorW
MsgWaitForMultipleObjects
PeekMessageW
GetSystemMetrics
ReleaseDC
GetDC
DispatchMessageW
TranslateMessage
MonitorFromRect
MonitorFromWindow
GetMonitorInfoW
EnumDisplayMonitors
ToUnicodeEx
GetKeyboardLayoutList
GetAsyncKeyState
ToAsciiEx
VkKeyScanExA
VkKeyScanExW
keybd_event
MapVirtualKeyW
SetWindowsHookExW
UnhookWindowsHookEx
CallNextHookEx
WindowFromPoint
CreateIconIndirect
GetParent
CallWindowProcW
UnregisterClassW
RegisterClassExW
GetDeviceCaps
GetStockObject
SelectObject
SetBkMode
SetTextColor
GetCharWidthW
CreateSolidBrush
DeleteObject
CreatePen
LineTo
PatBlt
SetBkColor
CreateCompatibleBitmap
DeleteDC
GetPixel
BitBlt
CreateCompatibleDC
CreateDCW
GetClipBox
StretchBlt
SetWindowOrgEx
CreateBitmap
GdiAlphaBlend
CreateDIBSection
SetDIBColorTable
CreateFontIndirectW
GetTextExtentPoint32W
SetMapMode
GetDIBits
GetObjectW
MoveToEx
GetTextMetricsW
ExcludeClipRect
ShellExecuteW
SHGetKnownFolderPath
SHGetFileInfoW
ord74
SHFileOperationW
CoCreateInstance
CoUninitialize
CoInitializeEx
CoTaskMemFree
OleInitialize
RegisterDragDrop
DoDragDrop
ReleaseStgMedium
CoTaskMemAlloc
CoTaskMemRealloc
CoMarshalInterThreadInterfaceInStream
CoGetInterfaceAndReleaseStream
OleUninitialize
SysAllocString
SysFreeString
GetUserNameW
RegSetValueExW
RegQueryValueExW
RegQueryInfoKeyW
RegOpenKeyExW
RegNotifyChangeKeyValue
RegEnumValueW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyExW
RegCreateKeyExW
RegCloseKey
CreateProcessWithLogonW
LogonUserW
SetSecurityInfo
SetNamedSecurityInfoW
GetSecurityInfo
GetNamedSecurityInfoW
SetSecurityDescriptorSacl
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
SetSecurityDescriptorDacl
SetSecurityDescriptorControl
MakeSelfRelativeSD
MakeAbsoluteSD
InitializeSecurityDescriptor
GetSecurityDescriptorLength
GetSecurityDescriptorControl
SetEntriesInAclW
InitializeAcl
GetAclInformation
ConvertStringSidToSidW
ConvertSidToStringSidW
LookupAccountNameW
LookupAccountSidW
IsValidSid
GetTokenInformation
GetSidIdentifierAuthority
CreateProcessAsUserW
OpenProcessToken
AllocateAndInitializeSid
CopySid
EqualSid
FreeSid
GetLengthSid
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ