Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024100246b605e99242a05b69fee2c3725aa61eavoslockercobaltstrikehijackloader.exe
Resource
win7-20240903-en
Target
2024100246b605e99242a05b69fee2c3725aa61eavoslockercobaltstrikehijackloader
Size
495KB
MD5
46b605e99242a05b69fee2c3725aa61e
SHA1
5d3c19a6c86548d8369629cb2a381a743f022e7c
SHA256
70342ecdff7596fbdf400e5c0b674abdfa6f7220874d99333067e7e3e3573c87
SHA512
cef0a94aa704d20ceb701ed9c8b0ea02a2854a601e06b3d135da5c5a31d1c52d787ce0d71d51b240ac7c016396b8f57b10709f434dd24c5fa0485e70c749699a
SSDEEP
6144:+7WQ0j4ltziolIGlnE2deWDrlBu0R+J5JlLgPYfq8ZF02IlLZDm0nXe72pL57h:ui4lZiopDfu0R+J5JlLgPbDm0ne2l57h
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\VSS\Solutions\CBootstrap\VerifyAndLaunch\Release\VerifyAndLaunch.pdb
InternetCanonicalizeUrlA
InternetOpenUrlA
InternetOpenA
InternetReadFile
HttpQueryInfoA
PathRemoveExtensionW
PathFindFileNameW
PathFileExistsW
HeapReAlloc
HeapSize
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
GlobalAlloc
GlobalFree
SizeofResource
WriteFile
FindResourceA
CreateFileW
GetLastError
LockResource
DeleteFileW
CloseHandle
ReadFile
WideCharToMultiByte
Process32First
TerminateProcess
GetModuleFileNameW
GetTempPathW
WaitForSingleObject
OpenProcess
CreateToolhelp32Snapshot
MultiByteToWideChar
GetVersionExA
DeleteFileA
Process32Next
SetFilePointerEx
GetFileSizeEx
GetProcessHeap
ReadConsoleW
SetEndOfFile
DecodePointer
LoadResource
IsDebuggerPresent
LCMapStringW
GetStringTypeW
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
WriteConsoleW
GetStartupInfoW
GetModuleHandleW
RtlUnwind
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
RaiseException
ExitProcess
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
MoveFileExW
GetStdHandle
HeapAlloc
HeapFree
GetFileType
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
MessageBoxW
wsprintfA
RegQueryValueExA
RegSetValueExA
RegOpenKeyExA
RegCloseKey
ShellExecuteW
SHCreateDirectoryExW
SHGetSpecialFolderPathW
ShellExecuteExW
CoSetProxyBlanket
CoCreateInstance
CoUninitialize
CoInitialize
SysFreeString
SysAllocStringLen
VariantInit
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ