Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-14_4bffef2e86a9bf70c093f19fab684cde_avoslocker_cobalt-strike.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-14_4bffef2e86a9bf70c093f19fab684cde_avoslocker_cobalt-strike.exe
Resource
win10v2004-20241007-en
Target
2024-10-14_4bffef2e86a9bf70c093f19fab684cde_avoslocker_cobalt-strike
Size
818KB
MD5
4bffef2e86a9bf70c093f19fab684cde
SHA1
b715e9758b477b83e343aa695d2a705c8957f6ea
SHA256
4a71bf0a214ad2f82c98c57a53e7c3c4c6c69d9d250066b2f83e3aaac489d81b
SHA512
3946eb6589e508842da542819668d8bb45c292dc2c051f4327cc56a6f4482a769f072a695dfebd77d833f43d93261c03b988d60a300606f332b9112de56e5f3f
SSDEEP
24576:Uo9vpZvxz7tIABHQjafLxgqFSJz2UuVAwgxpA:ddpB9tOQxgySNluVAwgxpA
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\Bobo\GIT\APOConfig\Release\ClownfishVoicechanger.pdb
BCryptOpenAlgorithmProvider
BCryptFinishHash
BCryptCloseAlgorithmProvider
BCryptDestroyHash
BCryptHashData
BCryptCreateHash
BCryptGetProperty
InternetQueryDataAvailable
HttpOpenRequestA
HttpQueryInfoW
InternetQueryOptionW
InternetOpenA
InternetCloseHandle
HttpSendRequestA
InternetConnectA
InternetSetOptionW
InternetReadFile
HttpAddRequestHeadersA
PathFileExistsW
freeaddrinfo
WSACleanup
__WSAFDIsSet
closesocket
gethostbyname
select
shutdown
getaddrinfo
WSAStartup
inet_addr
gethostbyaddr
send
socket
connect
WSAAddressToStringW
recv
htons
FreeLibraryAndExitThread
ExitThread
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetModuleFileNameW
HeapFree
GetCurrentProcess
LocalAlloc
HeapAlloc
LocalFree
GetProcessHeap
MultiByteToWideChar
FormatMessageW
CreateDirectoryW
ReadFile
FindFirstFileW
CreateNamedPipeA
EnterCriticalSection
FindNextFileW
lstrlenW
WriteFile
lstrcpynW
GetUserDefaultUILanguage
LeaveCriticalSection
InitializeCriticalSection
CreateMutexW
InitializeCriticalSectionEx
FindClose
GetLocaleInfoW
WaitForSingleObject
CreateFileW
GetVersionExW
DisconnectNamedPipe
Sleep
GetLastError
GetCurrentThread
LoadLibraryA
ExitProcess
CloseHandle
LoadLibraryW
CreateThread
DecodePointer
GetProcAddress
GetFileSize
DeleteCriticalSection
GetCurrentProcessId
GetModuleHandleW
FreeLibrary
CopyFileW
WideCharToMultiByte
ConnectNamedPipe
SetUnhandledExceptionFilter
FlushFileBuffers
GetExitCodeProcess
GetModuleFileNameA
SetLastError
OutputDebugStringA
GetEnvironmentVariableW
GetEnvironmentVariableA
GetFileAttributesW
SuspendThread
GetCurrentDirectoryA
ResumeThread
GetVersionExA
GetThreadContext
ReadProcessMemory
CreateEventExW
WaitForMultipleObjects
SetEvent
ResetEvent
GetSystemTimeAsFileTime
InitializeSListHead
OutputDebugStringW
RaiseException
RtlUnwind
GetStdHandle
GetConsoleOutputCP
GetConsoleMode
GetFileSizeEx
SetFilePointerEx
GetFileType
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetCurrentThreadId
QueryPerformanceCounter
GetStartupInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
TerminateProcess
UnhandledExceptionFilter
GetCPInfo
GetStringTypeW
EncodePointer
HeapReAlloc
ReadConsoleW
GetTimeZoneInformation
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
GetModuleHandleExW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetStdHandle
HeapSize
WriteConsoleW
DeleteFileW
SetEndOfFile
InitializeCriticalSectionAndSpinCount
MessageBeep
RegisterClassExW
GetWindowPlacement
LoadAcceleratorsW
TrackPopupMenu
LoadStringW
GetSubMenu
ShowWindow
IsWindow
GetAsyncKeyState
OffsetRect
DispatchMessageW
SetTimer
CopyRect
SwitchToThisWindow
SetMenuItemInfoW
GetWindowTextA
SetWindowPlacement
SetMenuInfo
SetWindowTextA
SendDlgItemMessageW
DialogBoxIndirectParamW
MoveWindow
SetMenu
IsDlgButtonChecked
UnhookWindowsHookEx
DestroyMenu
SetFocus
TranslateAcceleratorW
FindWindowW
LoadCursorW
SendMessageA
SetWindowsHookExW
RemoveMenu
CheckMenuItem
GetDlgItem
AppendMenuW
SetRect
KillTimer
PostQuitMessage
GetDesktopWindow
GetParent
DialogBoxParamW
UpdateWindow
SetForegroundWindow
GetWindowLongW
GetMessageW
GetMenuItemInfoW
DefWindowProcW
LoadImageW
GetCursorPos
BeginPaint
EndPaint
EnableWindow
GetWindowTextW
ModifyMenuW
AdjustWindowRectEx
LoadMenuW
PostMessageW
GetWindowRect
DestroyWindow
SetWindowPos
MessageBoxW
GetMenuItemCount
CreateWindowExW
SendMessageW
CallNextHookEx
EndDialog
MessageBoxA
SetWindowTextW
TranslateMessage
GetStockObject
SetTextColor
SetBkMode
GetObjectW
DeleteObject
CreateFontIndirectW
CreateSolidBrush
GetOpenFileNameW
GetSaveFileNameW
GetUserNameA
SetEntriesInAclA
CryptAcquireContextW
CryptCreateHash
CryptHashData
CryptDestroyHash
RegQueryValueExW
RegDeleteValueW
RegOpenKeyExW
InitializeSecurityDescriptor
RegSetValueExW
RegEnumKeyExW
AllocateAndInitializeSid
RegCloseKey
SetSecurityDescriptorDacl
CryptReleaseContext
CryptGetHashParam
RegCreateKeyW
SHBrowseForFolderW
ShellExecuteExW
SHGetPathFromIDListW
SHFileOperationW
SHGetFolderPathW
Shell_NotifyIconW
ShellExecuteW
CoTaskMemAlloc
CoInitializeEx
PropVariantClear
OleInitialize
CoUninitialize
OleUninitialize
CoTaskMemFree
CLSIDFromString
CoCreateInstance
VariantInit
VariantClear
GetFileVersionInfoSizeA
VerQueryValueW
GetFileVersionInfoA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ