Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
b39a2542e86a9ec01566fc23afe43386_mafia_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
b39a2542e86a9ec01566fc23afe43386_mafia_JC.exe
Resource
win10v2004-20230703-en
Target
b39a2542e86a9ec01566fc23afe43386_mafia_JC.exe
Size
228KB
MD5
b39a2542e86a9ec01566fc23afe43386
SHA1
26d5c0e93902f7d00c610da9d1262f9042d2344f
SHA256
e711a2d4da21d7b5012a608c79f2c4095a6b481447499a4de8054291c360cf56
SHA512
399232473563438c7bbe3d0a72be21c0b855309e5acf8debdcbd35f55c1debb38d4d3f2315339bcbc0e3b2ba5f86f27065f1948803a7ea490b1db13bc6a21002
SSDEEP
3072:nfTRyd4O/o081arItJO+4EYa3xJNv3LvPtENwHhBAXq+V77TWpa2qo7D7:nLRY5o00kIvhEahJNLvPtE6Byq4qpnz7
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetTempPathW
DeleteFileW
ResumeThread
FindFirstFileW
FindNextFileW
RemoveDirectoryW
FindClose
CreateDirectoryW
CopyFileW
CreateProcessW
GetCurrentProcessId
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
OpenProcess
WaitForSingleObject
TerminateProcess
LoadLibraryW
GetProcAddress
FreeLibrary
GetUserDefaultUILanguage
ReadFile
GetProcessHeap
GetLastError
SetFilePointer
FlushFileBuffers
GetConsoleMode
GetConsoleCP
SetStdHandle
CreateFileW
HeapReAlloc
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetLocaleInfoW
GetUserDefaultLCID
IsValidCodePage
GetOEMCP
GetACP
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
CreateSemaphoreW
CloseHandle
ReleaseSemaphore
LocalFree
SetEndOfFile
GetCommandLineW
GetModuleFileNameW
GetStdHandle
WriteFile
InitializeCriticalSectionAndSpinCount
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
InterlockedCompareExchange
InterlockedExchange
MultiByteToWideChar
GetStringTypeW
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
HeapFree
ExitThread
GetCurrentThreadId
CreateThread
GetLocalTime
HeapSetInformation
GetStartupInfoW
RtlUnwind
HeapAlloc
LCMapStringW
GetCPInfo
RaiseException
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
HeapCreate
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
SetLastError
HeapSize
ExitProcess
WriteConsoleW
PostMessageW
EndDialog
PostQuitMessage
EndPaint
BeginPaint
DestroyWindow
DialogBoxParamW
SetWindowTextW
SendMessageW
SetWindowLongW
DefWindowProcW
GetDlgItem
UpdateWindow
ShowWindow
CreateDialogParamW
CreateWindowExW
RegisterClassExW
LoadCursorW
LoadIconW
DispatchMessageW
TranslateMessage
TranslateAcceleratorW
GetMessageW
LoadAcceleratorsW
LoadStringW
GetWindowLongW
RegSetValueExW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegDeleteValueW
CommandLineToArgvW
GetModuleFileNameExW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ