Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2023-08-22_3bd879b0fbf295aa8230eb4ef26ecc7d_mafia_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-22_3bd879b0fbf295aa8230eb4ef26ecc7d_mafia_JC.exe
Resource
win10v2004-20230831-en
Target
2023-08-22_3bd879b0fbf295aa8230eb4ef26ecc7d_mafia_JC.exe
Size
459KB
MD5
3bd879b0fbf295aa8230eb4ef26ecc7d
SHA1
d78d6c1e2cd74e55a69820e2c21e151adb96e286
SHA256
22d504073467f96b97ccc3cb9e7f42dd71088f0c10eb006c2c53d942b0ffdfb6
SHA512
e940fe36f2c6b5e9355ad33eb98fdee95b029bc61ff350366be325b111cddfbfcda4bc192e88875c3935f0325dceec4bbf17cef26d408ce9a831b4fe2cff4863
SSDEEP
12288:IcZkOW/sZocof24rWhS8eAdpsA/1STTsFdYiYcZkOW/b:IcZkOW/uoco8dOAtSTTBiYcZkOW/b
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IIDFromString
StringFromGUID2
SHGetFolderPathA
SHGetFolderPathW
DispatchMessageW
DispatchMessageA
MsgWaitForMultipleObjectsEx
IsWindowUnicode
PeekMessageA
TranslateMessage
GetMessageW
GetMessageA
LocalFree
LoadLibraryExW
WaitForSingleObject
OpenMutexA
GetNativeSystemInfo
GetCurrentProcess
GetSystemDirectoryA
GetModuleFileNameA
GetTempPathA
CreateFileA
GetTickCount
GetFileAttributesA
RemoveDirectoryA
FindClose
CloseHandle
DeleteFileA
Sleep
FormatMessageW
GetLocalTime
GetCurrentThreadId
GetCurrentProcessId
PeekNamedPipe
SetHandleInformation
GetExitCodeProcess
CreateProcessA
TerminateProcess
ReadFile
CreatePipe
WideCharToMultiByte
FileTimeToSystemTime
GetModuleHandleExA
FindResourceA
LoadResource
SizeofResource
LockResource
FreeLibrary
GetModuleHandleExW
LoadLibraryW
GetProcAddress
InterlockedDecrement
CreateFileW
SetFilePointerEx
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
InterlockedIncrement
InterlockedExchange
GetStringTypeW
EncodePointer
DecodePointer
DeleteCriticalSection
GetLastError
SetDllDirectoryA
HeapSize
SetFilePointer
SetEndOfFile
GetProcessHeap
WriteConsoleW
GetACP
GetOEMCP
IsValidCodePage
GetLocaleInfoW
FindFirstFileExW
FlushFileBuffers
GetCurrentDirectoryW
GetFileInformationByHandle
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetTimeZoneInformation
CompareStringW
SetEnvironmentVariableA
GetDriveTypeW
FileTimeToLocalFileTime
GetFullPathNameW
CreateDirectoryW
QueryPerformanceCounter
GetStartupInfoW
SetHandleCount
SetStdHandle
InitializeCriticalSectionAndSpinCount
HeapAlloc
MultiByteToWideChar
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameW
GetStdHandle
ExitProcess
SetLastError
GetModuleHandleW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
HeapCreate
IsProcessorFeaturePresent
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
LCMapStringW
RtlUnwind
RaiseException
GetCPInfo
HeapFree
GetCommandLineA
HeapSetInformation
GetSystemTimeAsFileTime
GetFileType
WriteFile
GetConsoleCP
GetConsoleMode
HeapReAlloc
RegQueryValueExA
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
GetErrorInfo
SysFreeString
ord91
ord117
ord141
ord168
ord189
ord158
ord115
ord159
ord67
ord31
ord137
ord160
ord8
ord44
ord204
VerQueryValueW
GetFileVersionInfoA
GetFileVersionInfoSizeA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ