Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
8ff29bcec12b0b1ddb2ea756a3bba931_mafia_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
8ff29bcec12b0b1ddb2ea756a3bba931_mafia_JC.exe
Resource
win10v2004-20230703-en
Target
8ff29bcec12b0b1ddb2ea756a3bba931_mafia_JC.exe
Size
3.0MB
MD5
8ff29bcec12b0b1ddb2ea756a3bba931
SHA1
87ed598e8b7b71db035ede808981b7940846536e
SHA256
c269e1e0c5604890b2280266eb32ab80894147cf427028ee78471262c7265ae7
SHA512
887b78011aa960d324a4b1cf5af8321b72df9a4bcb3ebacea0f52aa1689dd45ecda357eb5e46928350e71ae3a80c240a4f4fc530da73b466436fe75e2eff42f2
SSDEEP
49152:LPdoJ6PZ5o30S8x6ZIwTKnL91TvPdpPXLqGOvkb7nB6rKn3NEHT3XbHph900JQsO:jM6P20S8x6NSTTXfOMbbcKnUXn9lQRT
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
WNetCancelConnection2A
WNetAddConnection2A
CertFreeCertificateContext
CertDuplicateCertificateContext
CertEnumCertificatesInStore
CertGetCertificateContextProperty
CertOpenStore
CertCloseStore
CryptMsgClose
CertGetNameStringW
CertGetNameStringA
CertFindCertificateInStore
CryptMsgGetParam
CryptQueryObject
getaddrinfo
inet_ntoa
accept
listen
closesocket
htons
bind
setsockopt
connect
send
WSASetLastError
recv
freeaddrinfo
getservbyname
getnameinfo
ioctlsocket
WSAStartup
WSAGetLastError
getsockname
WSACleanup
gethostbyname
getsockopt
socket
ntohs
HeapAlloc
SetConsoleMode
GetConsoleMode
ReadConsoleA
GetStdHandle
CopyFileA
GetCurrentDirectoryA
SizeofResource
LockResource
LoadResource
FindResourceA
Sleep
WaitNamedPipeA
SetConsoleTitleA
GetCurrentProcessId
ExitThread
SetConsoleCursorPosition
FillConsoleOutputCharacterA
GetConsoleScreenBufferInfo
WaitForSingleObject
CreateProcessA
SetLastError
GetComputerNameA
SetConsoleCtrlHandler
InterlockedDecrement
LeaveCriticalSection
EnterCriticalSection
InterlockedIncrement
GetModuleHandleExW
GetEnvironmentVariableW
GetModuleHandleW
GetFileType
GetVersion
TlsGetValue
InterlockedCompareExchange
TlsSetValue
InitializeCriticalSectionAndSpinCount
InterlockedExchangeAdd
DeleteCriticalSection
GetCurrentThreadId
TlsAlloc
TlsFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
CreateFiber
SwitchToFiber
DeleteFiber
FormatMessageW
ReadConsoleW
ConvertThreadToFiber
ConvertFiberToThread
FreeLibrary
GetProcessHeap
LoadLibraryA
FindFirstFileW
FindNextFileW
InitializeCriticalSection
WaitForMultipleObjects
ResetEvent
ReleaseMutex
CreateMutexW
GetDiskFreeSpaceExW
CreateDirectoryW
RemoveDirectoryW
DeleteFileW
CreateHardLinkW
MoveFileExW
CloseHandle
FindFirstFileA
FindClose
GetTimeZoneInformation
GetSystemTime
SystemTimeToTzSpecificLocalTime
SystemTimeToFileTime
WideCharToMultiByte
MultiByteToWideChar
CopyFileW
SetFileAttributesW
SetFileTime
GetFileAttributesExW
GetFileAttributesW
GetEnvironmentVariableA
GetSystemInfo
CreateEventW
GetLogicalDriveStringsW
ExpandEnvironmentStringsW
GetTempPathW
GetSystemDirectoryW
GetLongPathNameW
SetThreadPriority
SetEvent
GetExitCodeThread
TryEnterCriticalSection
VirtualQuery
SetEndOfFile
GetDriveTypeW
GetUserDefaultLCID
SetEnvironmentVariableA
CompareStringW
CreateFileW
WriteConsoleW
HeapFree
FormatMessageA
LocalFree
GetModuleHandleA
GetProcAddress
GetCurrentProcess
GetModuleFileNameA
DeleteFileA
WriteFile
GetStringTypeW
lstrlenA
IsValidLocale
EnumSystemLocalesA
GetVersionExA
CreateFileA
GetFileSize
ReadFile
LoadLibraryW
GetLastError
HeapReAlloc
RaiseException
RtlUnwind
ExitProcess
DecodePointer
ResumeThread
CreateThread
MoveFileA
GetCommandLineA
HeapSetInformation
EncodePointer
InterlockedExchange
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileExA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
HeapCreate
HeapDestroy
GetCurrentThread
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
IsProcessorFeaturePresent
SetHandleCount
GetStartupInfoW
FatalAppExitA
GetConsoleCP
FlushFileBuffers
SetFilePointer
LCMapStringW
GetModuleFileNameW
GetLocaleInfoW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetTickCount
HeapSize
SetStdHandle
GetFullPathNameA
GetFileInformationByHandle
PeekNamedPipe
GetCurrentDirectoryW
SetCurrentDirectoryW
GetLocaleInfoA
GetUserObjectSecurity
CloseDesktop
CloseWindowStation
OpenDesktopA
SetProcessWindowStation
OpenWindowStationA
GetProcessWindowStation
GetUserObjectInformationW
MessageBoxW
SetUserObjectSecurity
GetTokenInformation
CryptGetUserKey
CryptDestroyHash
CryptDecrypt
CryptDestroyKey
CryptCreateHash
CryptGetProvParam
CryptEnumProvidersW
CryptSignHashW
CryptExportKey
CryptSetHashParam
CryptGenRandom
CryptReleaseContext
CryptAcquireContextW
ReportEventW
DeregisterEventSource
RegisterEventSourceW
RevertToSelf
ImpersonateLoggedOnUser
CreateProcessAsUserA
AddAccessAllowedAce
GetSecurityDescriptorDacl
GetAclInformation
InitializeAcl
GetAce
AddAce
LogonUserA
CreateProcessWithLogonW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
OpenSCManagerA
OpenServiceA
CreateServiceA
CloseServiceHandle
StartServiceA
GetLengthSid
CopySid
OpenProcessToken
CryptAcquireContextA
EqualSid
FreeSid
AllocateAndInitializeSid
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
SHCreateDirectoryExA
GetAdaptersInfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ