Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-28_f4420c838459cf2aecec7fddea96930f_avoslocker_floxif_hijackloader_luca-stealer.exe
Resource
win7-20240903-en
Target
2024-12-28_f4420c838459cf2aecec7fddea96930f_avoslocker_floxif_hijackloader_luca-stealer
Size
1.4MB
MD5
f4420c838459cf2aecec7fddea96930f
SHA1
97413fc94b2703edc45e54c7fc033632aacf99c9
SHA256
fcb0a07d1962681f24deebc0902fe1fd3583902895a8e73490ececdf7563e39a
SHA512
15c3da914192a9eda8e7dafd2a86edc9e5d066f9ec5268a6a4164434fdd77dccd9bed639995a404c3aad55018253fec722878ba44b2292065f8688fc3571d54e
SSDEEP
24576:umpsOt65GmrDOW4hRgp/Iwj+iYXAm5j+5oV0OqerwrEH7o:umpsX5zyWyRC/IwjoXAej+54dqerY
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
JavaUninstallTool.exe.pdb
EqualSid
RegCloseKey
GetTokenInformation
ConvertStringSecurityDescriptorToSecurityDescriptorW
CopySid
OpenProcessToken
ConvertStringSidToSidW
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetProcessHeap
HeapSize
GetUserDefaultLCID
EnumSystemLocalesW
ReadFile
ReadConsoleW
QueryPerformanceCounter
CreateDirectoryW
GetModuleHandleExW
WaitForSingleObject
GetLastError
GetProcAddress
CreateProcessW
SetDllDirectoryW
GetExitCodeProcess
CloseHandle
SizeofResource
LockResource
LoadResource
FindResourceW
MultiByteToWideChar
WideCharToMultiByte
FindFirstFileW
SetLastError
FindNextFileW
RemoveDirectoryW
InitializeCriticalSectionAndSpinCount
FindClose
CreateFileW
GetFileAttributesW
SetFileAttributesW
DeleteFileW
RaiseException
DecodePointer
MoveFileExW
DeleteCriticalSection
CopyFileW
GetTickCount
GetDriveTypeW
LoadLibraryW
FreeLibrary
GetCurrentProcess
GetModuleFileNameW
GetTempPathW
GetSystemDirectoryW
GetNativeSystemInfo
GetCurrentThreadId
Sleep
FormatMessageW
GetLocalTime
LocalFree
GetCurrentProcessId
GetLocaleInfoW
IsValidLocale
GetStringTypeW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
EncodePointer
LCMapStringEx
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
OutputDebugStringW
LCMapStringW
CompareStringW
FlushFileBuffers
IsValidCodePage
FindFirstFileExW
GetTimeZoneInformation
HeapReAlloc
GetCurrentDirectoryW
RtlUnwind
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
GetCommandLineA
GetCommandLineW
SetEndOfFile
WriteFile
GetConsoleCP
GetConsoleMode
GetFileType
GetFileInformationByHandle
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetStdHandle
WriteConsoleW
ExitProcess
HeapFree
HeapAlloc
GetFileSizeEx
SetFilePointerEx
SetStdHandle
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ