Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
42cb52d7bf136d3706036f8994c9d65c_mafia_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
42cb52d7bf136d3706036f8994c9d65c_mafia_JC.exe
Resource
win10v2004-20230703-en
Target
42cb52d7bf136d3706036f8994c9d65c_mafia_JC.exe
Size
545KB
MD5
42cb52d7bf136d3706036f8994c9d65c
SHA1
1577dac8405064e4fa94ae9f0470d3a619a41197
SHA256
78996444fd75ce7b69ce695dc4a08a690994e425f4842647d6507f58591991d2
SHA512
42dbb3087d2d0b29a091e134b6a51d5790fac12927d00661eddeae23ccf3868a279c4c8000ee99fda4d33740db4eae16d557ac2a26707c1b89d5841293fbf2ed
SSDEEP
12288:Q8UYOUfvgNzvvCS0DMN+7s2Snp+rh6w+bu7cA7rpIZtGvMDJ18X11va:wah6tbu797rgtGv++X11C
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
WriteFile
CreateDirectoryW
SetCurrentDirectoryW
CopyFileW
DeleteFileW
MoveFileExW
FindFirstFileW
FindClose
FindNextFileW
GetLogicalDriveStringsW
QueryDosDeviceW
GetLastError
GetModuleFileNameW
GetTempPathW
GetTempFileNameW
FindResourceW
SizeofResource
LoadResource
LockResource
GetVersionExW
WaitForSingleObject
CreateEventW
OpenEventW
SetEvent
ResetEvent
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
CreateMutexW
OpenMutexW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
CreateThread
OpenProcess
TerminateProcess
GetExitCodeProcess
CreateProcessW
GetCurrentProcessId
WideCharToMultiByte
lstrcmpA
lstrcmpiA
FlushFileBuffers
FindResourceExW
GetModuleHandleW
GetProcAddress
Sleep
ReleaseMutex
GetNativeSystemInfo
InterlockedDecrement
GetPriorityClass
Module32FirstW
HeapDestroy
ReadFile
HeapSize
RaiseException
InitializeCriticalSectionAndSpinCount
SetEnvironmentVariableA
LoadLibraryW
FreeLibrary
SetConsoleCtrlHandler
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
FatalAppExitA
IsValidCodePage
GetOEMCP
GetACP
GetLocaleInfoW
GetTimeZoneInformation
IsProcessorFeaturePresent
SetFilePointer
CloseHandle
GetFileSize
CreateFileW
GetFileAttributesW
CompareFileTime
SystemTimeToFileTime
GetSystemTime
HeapFree
MultiByteToWideChar
lstrlenA
GetProcessHeap
HeapAlloc
GetCommandLineW
lstrlenW
FormatMessageW
IsDebuggerPresent
UnhandledExceptionFilter
GetCurrentProcess
GetTickCount
QueryPerformanceCounter
HeapCreate
GetCurrentThread
SetLastError
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStdHandle
ExitProcess
SetUnhandledExceptionFilter
CompareStringW
LCMapStringW
GetCPInfo
RtlUnwind
GetCurrentThreadId
ExitThread
GetSystemTimeAsFileTime
GetStartupInfoW
HeapSetInformation
DecodePointer
EncodePointer
InterlockedExchange
InterlockedCompareExchange
GetStringTypeW
InterlockedIncrement
LocalFree
HeapReAlloc
ShowWindow
GetDlgItem
PeekMessageW
SendMessageW
GetSystemMetrics
CreateDialogParamW
PostQuitMessage
GetMessageW
TranslateMessage
DispatchMessageW
wvsprintfW
wsprintfW
CharLowerBuffW
CharLowerBuffA
CryptCreateHash
GetCurrentHwProfileW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegEnumValueW
RegEnumKeyExW
RegDeleteKeyW
RegCreateKeyExW
RegOpenCurrentUser
CryptReleaseContext
CryptDestroyHash
CryptGetHashParam
CryptHashData
CryptAcquireContextW
CoInitialize
CoInitializeSecurity
CoSetProxyBlanket
CoUninitialize
CoCreateInstance
ShellExecuteW
SHGetFolderPathW
SHFileOperationW
CommandLineToArgvW
ShellExecuteExW
SysStringByteLen
SetErrorInfo
GetErrorInfo
SysFreeString
SysStringLen
SysAllocStringLen
SysAllocStringByteLen
CreateErrorInfo
VariantClear
SysAllocString
VariantInit
VariantCopy
VarBstrCat
VariantChangeType
StrStrIW
StrCmpW
StrCmpIW
StrToIntExW
PathFileExistsW
StrToIntExA
WinHttpSendRequest
WinHttpQueryDataAvailable
WinHttpSetTimeouts
WinHttpOpen
WinHttpCrackUrl
WinHttpReadData
WinHttpSetOption
WinHttpCloseHandle
WinHttpQueryHeaders
WinHttpOpenRequest
WinHttpConnect
WinHttpReceiveResponse
ord17
UuidToStringW
UuidEqual
UuidCreate
UuidCreateSequential
RpcStringFreeW
GetProcessImageFileNameW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ