Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
417d22322cf23c1417212ee0db070ded_mafia_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
417d22322cf23c1417212ee0db070ded_mafia_JC.exe
Resource
win10v2004-20230703-en
Target
417d22322cf23c1417212ee0db070ded_mafia_JC.exe
Size
494KB
MD5
417d22322cf23c1417212ee0db070ded
SHA1
1577552aeb695e7c067d209cd058f4f5da896c6d
SHA256
f93c4ead815aa28b6aeacd2cf95e6a7cf9fefd11b703c49242f6059e83029bb6
SHA512
c39da3c96287c53fffeddfb08ccaca71b018927d4af2b6f017d3f864996956abf24ce70db2292ec2ef23ce5313c540bc43795a8c720dd1efc83b220b63c7af32
SSDEEP
12288:DnKfyxV2ImdvPGBFfi8WuJ6+1x0KCYT88VtX0B+:LKfwV2HtPgFfN9/pDA+
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetFileSize
CreateDirectoryW
WaitForSingleObject
WriteFile
CreateFileW
GetTempPathW
GetLastError
CloseHandle
FindFirstFileW
OpenProcess
GetVersionExW
GetProcAddress
GetModuleFileNameW
FindClose
RemoveDirectoryW
FindNextFileW
DeleteFileW
SetFilePointer
SystemTimeToFileTime
WideCharToMultiByte
ReadFile
MultiByteToWideChar
GetCurrentDirectoryW
LocalFileTimeToFileTime
SetEndOfFile
CreateFileA
WriteConsoleW
LoadLibraryW
GetFileAttributesW
GetModuleHandleW
SetStdHandle
HeapReAlloc
IsValidLocale
EnumSystemLocalesA
InterlockedIncrement
InterlockedDecrement
InterlockedCompareExchange
InterlockedExchange
GetStringTypeW
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
GetCPInfo
ExitProcess
GetSystemTimeAsFileTime
HeapAlloc
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
LCMapStringW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
HeapCreate
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetLocaleInfoW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
HeapSize
GetUserDefaultLCID
GetLocaleInfoA
GetProcessHeap
MessageBoxW
wsprintfW
RegOpenKeyExW
RegQueryValueExW
EnumProcesses
GetModuleBaseNameW
EnumProcessModules
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ