Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
199f2686ab128f06528a6a1c6bb03be4_mafia_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
199f2686ab128f06528a6a1c6bb03be4_mafia_JC.exe
Resource
win10v2004-20230703-en
Target
199f2686ab128f06528a6a1c6bb03be4_mafia_JC.exe
Size
5.3MB
MD5
199f2686ab128f06528a6a1c6bb03be4
SHA1
6b89d48207b046ec31df25516d8677e28a0b43bd
SHA256
c9195a456209de27173e1efbac06ba78a2776c71e967fab92ffcb0d2e565413e
SHA512
95db292b3e6c0d5c80622ae53ca702c29ed39e9ce13dcb3c04df50c25d6c2531c21dbd3b8026338b3c9d79add68390ba8759174a71f5d11c794672980aed9cb3
SSDEEP
98304:TIuqrw7UwrzKxUuZPYt/ZPYt1mbANrkw:sul7PVu+Xw
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
LeaveCriticalSection
GetModuleFileNameW
FreeLibrary
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
GetModuleHandleW
CloseHandle
WaitForSingleObject
Sleep
EnterCriticalSection
CreateEventW
GetCurrentThreadId
SetEvent
GetCommandLineW
LCMapStringW
LCMapStringA
GetStringTypeW
InterlockedDecrement
InterlockedIncrement
lstrcmpiW
GetLastError
DeleteCriticalSection
InitializeCriticalSection
RaiseException
CreateThread
lstrlenW
GetStringTypeA
WideCharToMultiByte
IsValidCodePage
GetOEMCP
LoadLibraryA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetStartupInfoA
GetFileType
SetHandleCount
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
GetCPInfo
FreeEnvironmentStringsA
HeapSize
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetModuleFileNameA
GetStdHandle
WriteFile
ExitProcess
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
HeapAlloc
HeapFree
RtlUnwind
HeapReAlloc
GetProcessHeap
GetStartupInfoW
VirtualFree
VirtualAlloc
HeapDestroy
HeapCreate
GetProcAddress
GetModuleHandleA
UnregisterClassA
TranslateMessage
DispatchMessageW
GetMessageW
PostThreadMessageW
CharUpperW
CharNextW
RegQueryInfoKeyW
RegSetValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
RegEnumKeyExW
CoTaskMemFree
CoTaskMemAlloc
CoCreateInstance
CoInitialize
CoUninitialize
CoRevokeClassObject
CoRegisterClassObject
StringFromGUID2
CoTaskMemRealloc
SysFreeString
SysStringLen
LoadRegTypeLi
LoadTypeLi
SysAllocString
UnRegisterTypeLi
RegisterTypeLi
VarUI4FromStr
CStdStubBuffer_DebugServerRelease
NdrCStdStubBuffer2_Release
NdrCStdStubBuffer_Release
CStdStubBuffer_DebugServerQueryInterface
IUnknown_QueryInterface_Proxy
IUnknown_Release_Proxy
NdrOleAllocate
NdrOleFree
NdrStubForwardingFunction
CStdStubBuffer_CountRefs
CStdStubBuffer_IsIIDSupported
CStdStubBuffer_Invoke
CStdStubBuffer_Disconnect
CStdStubBuffer_Connect
CStdStubBuffer_AddRef
CStdStubBuffer_QueryInterface
IUnknown_AddRef_Proxy
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ