Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-02_5bff614eb754428af4713ac6e5b7b72a_avoslocker_cobalt-strike.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-10-02_5bff614eb754428af4713ac6e5b7b72a_avoslocker_cobalt-strike.exe
Resource
win10v2004-20240802-en
Target
2024-10-02_5bff614eb754428af4713ac6e5b7b72a_avoslocker_cobalt-strike
Size
857KB
MD5
5bff614eb754428af4713ac6e5b7b72a
SHA1
816af6d5f795d30a6d8696c103d9f3e2e6b8dbf2
SHA256
ddb0f86b735ba42a62dc92eaed6e335814ef43e75ba2a8ada87c7715d86998a5
SHA512
1a272ad4115ec065c703e5644bd4fe4d63a32c5c846e5246985ad2c9c976c40097a2f79888675060c79d1c77f95d2f7ee7558d3d7cde7d73b87e26e0b95067e0
SSDEEP
24576:F5m/SAeVVEPPU4Qi0L7roXFxEpMvBjkf7tuOxqjQ3jl:6CVVEPPUFhL7rUFupMpjkTqjQ3jl
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\bamboo\home\xml-data\build-dir\CODRU-BA-SOURCES\bin\Win32\Release\DiscoverySrv.pdb
CryptMsgGetParam
CryptMsgClose
CertFindCertificateInStore
CertCloseStore
CertFreeCTLContext
CertFreeCRLContext
CertFreeCertificateContext
CryptQueryObject
CertGetNameStringW
CreateProcessW
GetExitCodeProcess
FindResourceW
LoadResource
LockResource
SizeofResource
SetEnvironmentVariableW
GetSystemDirectoryW
LoadLibraryExW
WideCharToMultiByte
MultiByteToWideChar
LocalFree
GetModuleHandleExW
Sleep
GetNativeSystemInfo
IsWow64Process
GetCurrentProcess
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
CreateFileW
CloseHandle
LoadLibraryW
GetLastError
FreeLibrary
FormatMessageA
WaitForSingleObject
GetCommandLineW
HeapSize
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
GetTimeZoneInformation
HeapReAlloc
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
ReadConsoleW
ReadFile
GetStringTypeW
CreateDirectoryW
FindClose
FindFirstFileExW
FindNextFileW
GetFileAttributesW
GetFileAttributesExW
GetFileInformationByHandle
GetFinalPathNameByHandleW
SetEndOfFile
SetFileAttributesW
SetFilePointerEx
AreFileApisANSI
DeviceIoControl
GetFileInformationByHandleEx
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
TryEnterCriticalSection
DeleteCriticalSection
GetCurrentThreadId
EncodePointer
DecodePointer
LCMapStringEx
QueryPerformanceCounter
QueryPerformanceFrequency
InitializeConditionVariable
WakeConditionVariable
WakeAllConditionVariable
SleepConditionVariableCS
SleepConditionVariableSRW
GetSystemTimeAsFileTime
GetTickCount64
GetLocaleInfoEx
CompareStringEx
GetCPInfo
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetCurrentProcessId
InitializeSListHead
GetEnvironmentVariableW
ExpandEnvironmentStringsW
DeleteFileW
GetFileSizeEx
SetFilePointer
WriteFile
DebugBreak
OutputDebugStringA
OutputDebugStringW
SetLastError
HeapAlloc
HeapFree
GetProcessHeap
GetProcessTimes
GetCurrentThread
GetLocalTime
GetWindowsDirectoryW
FindResourceExW
GetModuleFileNameA
LoadLibraryExA
LoadLibraryA
FormatMessageW
SetSearchPathMode
FileTimeToSystemTime
K32GetMappedFileNameW
WriteConsoleW
SuspendThread
ResumeThread
GetThreadContext
SetThreadContext
FlushInstructionCache
VirtualAlloc
VirtualProtect
VirtualFree
VirtualQuery
GetLongPathNameW
QueryDosDeviceW
RtlUnwind
RaiseException
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
ExitProcess
GetStdHandle
CreateThread
ExitThread
FreeLibraryAndExitThread
SetStdHandle
GetFileType
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
GetExitCodeThread
DispatchMessageW
TranslateMessage
GetMessageW
OpenProcessToken
LookupAccountSidW
GetAclInformation
GetTokenInformation
RegGetValueW
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
RegOpenKeyExW
GetAce
GetFileSecurityW
GetSecurityDescriptorDacl
GetSidIdentifierAuthority
GetSidSubAuthority
GetSidSubAuthorityCount
GetNamedSecurityInfoW
RegSetValueExW
RegCreateKeyExW
RegCloseKey
RegQueryValueExW
CommandLineToArgvW
CoUninitialize
CoInitializeSecurity
CoInitializeEx
CoCreateInstance
SysAllocString
SysFreeString
VariantClear
PathIsRelativeW
CryptCATCatalogInfoFromContext
CryptCATAdminCalcHashFromFileHandle
CryptCATAdminAcquireContext
CryptCATAdminEnumCatalogFromHash
CryptCATAdminReleaseContext
WinVerifyTrust
timeGetTime
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ