Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2025-07-02_27395a5984905db2bf35bb8c61bfc585_black-basta_cobalt-strike_hijackloader_luca-stealer_satacom_vidar.exe
Resource
win10v2004-20250619-en
Behavioral task
behavioral2
Sample
2025-07-02_27395a5984905db2bf35bb8c61bfc585_black-basta_cobalt-strike_hijackloader_luca-stealer_satacom_vidar.exe
Resource
win11-20250619-en
Target
2025-07-02_27395a5984905db2bf35bb8c61bfc585_black-basta_cobalt-strike_hijackloader_luca-stealer_satacom_vidar
Size
149KB
MD5
27395a5984905db2bf35bb8c61bfc585
SHA1
3b38dda10539183119eb3ac610a6c783254c9cae
SHA256
c89f89028783094dff2d82e34b4782b83520e36839a167c5393a6c1266fc2290
SHA512
e00aa7d98534308edcf0192100477f6f6695b38e146950143df25ecfc0f87ffe48db1090ce2b26547b9f7b2cbf1ee0ab1d0ee5ee7a8f9dc98c3623cd706a40e9
SSDEEP
3072:J9QlS4SAWBh1Dd+5xNWlh1nEbwANiv9ah:KSFAWBM5/WhCwXv9a
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
D:\a\Sandboxie\Sandboxie\Sandboxie\Bin\x64\SbieRelease\SandboxieDcomLaunch.pdb
SbieApi_EnumProcessEx
SbieDll_Hook
SbieDll_IsBoxedService
SbieDll_StartBoxedService
Scm_HookSetServiceStatus
Scm_HookStartServiceCtrlDispatcherW
Scm_HookOpenServiceW
Scm_HookStartServiceW
Scm_HookCloseServiceHandle
Scm_HookControlService
SbieApi_QueryProcess
Scm_HookQueryServiceStatus
Scm_HookQueryServiceStatusEx
HeapReAlloc
HeapSize
SetFilePointerEx
LCMapStringW
SetEnvironmentVariableW
CloseHandle
GetLastError
SetLastError
HeapAlloc
HeapFree
GetProcessHeap
FlushFileBuffers
WaitForSingleObject
CreateEventW
OpenEventW
GetCurrentProcessId
ExitProcess
CreateThread
GetCurrentThreadId
TlsAlloc
TlsGetValue
TlsSetValue
OpenProcess
GetVersionExW
GetModuleHandleW
GetProcAddress
LoadLibraryW
GetConsoleOutputCP
GetConsoleMode
CreateFileW
WriteConsoleW
SetEvent
QueryPerformanceCounter
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
GetStringTypeW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwindEx
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsFree
FreeLibrary
LoadLibraryExW
EncodePointer
RaiseException
RtlPcToFileHeader
GetStdHandle
WriteFile
GetModuleFileNameW
GetModuleHandleExW
GetFileType
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
QueryServiceStatusEx
GetTokenInformation
DuplicateToken
AccessCheckByType
OpenProcessToken
SetThreadToken
StartServiceCtrlDispatcherW
NtOpenKey
RtlAdjustPrivilege
NtQueryValueKey
NtQueryInformationProcess
NtClose
RtlInitUnicodeString
wsprintfW
MessageBoxW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ