Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2023-08-22_0770a89e2d8467e7382b496f93b712c9_mafia_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-22_0770a89e2d8467e7382b496f93b712c9_mafia_JC.exe
Resource
win10v2004-20230831-en
Target
2023-08-22_0770a89e2d8467e7382b496f93b712c9_mafia_JC.exe
Size
877KB
MD5
0770a89e2d8467e7382b496f93b712c9
SHA1
62b96e8d57784f6608c15c7b1137e7983ebde4a0
SHA256
79ad655ab8b501b4efc754fbdb16fd6939d9b21e2ee43cd5fb1ef155341db9af
SHA512
79e3ff69338c809341627fc6f3537a6f3dd2563a3a73782ed6e59a2afab3a51a2aee153d5a36ab6120e66ba00fe8549cd3e426a1eba363e7aa7dcaa2278ae3b0
SSDEEP
6144:mpiNLDGPDst/McSHQQiISOTDNb0v9I3lQ+:fN+PDqJSwQi32
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SetCurrentDirectoryA
LoadLibraryA
SetCurrentDirectoryW
FreeLibrary
GetCommandLineW
WaitForSingleObject
MapViewOfFile
UnmapViewOfFile
SetEvent
CreateEventA
OpenFileMappingA
CreateFileMappingA
CloseHandle
Sleep
GetCurrentProcessId
CreateProcessW
OpenProcess
CreateThread
GetProcessHeap
SetEndOfFile
GetCurrentDirectoryW
FlushFileBuffers
GetConsoleMode
GetConsoleCP
SetStdHandle
ReadFile
CreateFileW
HeapReAlloc
GetStringTypeW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
HeapSize
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetLocaleInfoW
LoadLibraryW
GetFileAttributesW
GetEnvironmentVariableW
GetCurrentProcess
GetModuleHandleW
GetProcAddress
ExpandEnvironmentStringsW
GetEnvironmentVariableA
GetModuleFileNameW
GetModuleFileNameA
GetFileAttributesA
SetFilePointer
WideCharToMultiByte
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
MultiByteToWideChar
HeapAlloc
GetLastError
HeapFree
ExitProcess
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
LCMapStringW
GetCPInfo
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetStdHandle
GetFileType
WriteFile
HeapCreate
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
WriteConsoleW
LoadImageW
DestroyWindow
BringWindowToTop
EnumWindows
DispatchMessageW
TranslateMessage
PeekMessageW
GetWindowInfo
GetWindowThreadProcessId
UpdateWindow
SetWindowLongW
CreateWindowExW
SystemParametersInfoW
RegisterClassExW
LoadCursorW
DefWindowProcW
EndPaint
BeginPaint
GetWindowLongW
MessageBoxW
MessageBoxA
LoadStringW
ShowWindow
GetStockObject
DeleteDC
BitBlt
GetObjectW
SelectObject
CreateCompatibleDC
DeleteObject
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
CommandLineToArgvW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ