Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2023-08-22_565dad54f182a7dd131c911e16fa1587_mafia_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-22_565dad54f182a7dd131c911e16fa1587_mafia_JC.exe
Resource
win10v2004-20230831-en
Target
2023-08-22_565dad54f182a7dd131c911e16fa1587_mafia_JC.exe
Size
308KB
MD5
565dad54f182a7dd131c911e16fa1587
SHA1
0f0c91b2f054b3cc94fd415fa055f6e5a2d336ae
SHA256
7cc44636a81a482aaee62e8cbbc972864065be91d3b1eb46e41a5834b453aae8
SHA512
1532298964bc3d8b7203090b1a3f35d2bfe5b66bded3bc08762304ebf73fec0f7731fa1bf42557e2bb9da6929c9fd05c07ab151d2038b18766259029fcdb4da6
SSDEEP
6144:DqEGLYSXdqse2B2AUe5T+4nmIi0pvTk0TBIJ/B+P909:+EnKrUe5T+umutTk0T2J/i09
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
FtpPutFileA
FtpSetCurrentDirectoryA
InternetOpenA
InternetCloseHandle
InternetOpenUrlW
InternetSetOptionA
InternetGetConnectedState
InternetConnectA
InterlockedIncrement
InterlockedDecrement
GetCurrentProcess
GetModuleHandleW
GetPrivateProfileStringW
GetPrivateProfileIntA
InitializeCriticalSectionAndSpinCount
SizeofResource
Sleep
LeaveCriticalSection
GetModuleFileNameW
MultiByteToWideChar
lstrlenW
WritePrivateProfileStringW
FlushInstructionCache
RaiseException
SetThreadLocale
GetLastError
SetLastError
GetThreadLocale
GetProcAddress
EnterCriticalSection
lstrcmpiW
DeleteCriticalSection
GetCurrentThreadId
CloseHandle
DeleteFileA
ReadFile
LoadLibraryW
GetPrivateProfileStringA
LoadLibraryExW
GetModuleFileNameA
ExpandEnvironmentStringsW
GetOEMCP
GetACP
GetCPInfo
FlushFileBuffers
SetFilePointer
GetConsoleMode
GetConsoleCP
GetCurrentProcessId
GetTickCount
GetFileSize
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
HeapReAlloc
HeapSize
IsProcessorFeaturePresent
GetCurrentThread
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetLocaleInfoW
InterlockedExchange
RtlUnwind
FatalAppExitA
GetFileType
SetHandleCount
LoadResource
FreeLibrary
GetSystemTime
FindResourceW
CreateFileA
EnumSystemLocalesA
IsValidCodePage
IsValidLocale
InterlockedCompareExchange
InterlockedPushEntrySList
VirtualFree
VirtualAlloc
InterlockedPopEntrySList
GetStdHandle
WriteFile
HeapDestroy
HeapCreate
SetConsoleCtrlHandler
IsDebuggerPresent
SetUnhandledExceptionFilter
GetLocaleInfoA
GetUserDefaultLCID
CreateFileW
GetProcessHeap
SetEndOfFile
GetStringTypeW
LCMapStringW
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetStartupInfoW
HeapSetInformation
GetCommandLineA
EncodePointer
DecodePointer
ExitProcess
HeapAlloc
HeapFree
InitializeCriticalSection
QueryPerformanceCounter
WriteConsoleW
SetStdHandle
DestroyWindow
GetWindowRect
GetMessageW
PostQuitMessage
UnregisterClassA
LoadImageW
GetParent
GetClientRect
TranslateMessage
IsDialogMessageW
LoadIconW
GetWindowLongW
PeekMessageW
MonitorFromWindow
GetDlgItem
SetWindowLongW
SetWindowPos
ShowWindow
CreateDialogParamW
GetSystemMetrics
SendMessageW
MapWindowPoints
GetMonitorInfoW
DefWindowProcW
GetWindow
DispatchMessageW
CharNextW
CreateFontW
GetStockObject
DeleteObject
RegDeleteKeyW
RegQueryInfoKeyW
RegSetValueExW
RegCloseKey
RegEnumKeyExW
RegOpenKeyExW
RegDeleteValueW
RegCreateKeyExW
SHGetFolderPathW
ShellExecuteW
SHGetSpecialFolderPathA
SHGetSpecialFolderPathW
ord51
ShellExecuteA
CoCreateInstance
CoUninitialize
CoTaskMemRealloc
CoInitialize
CoTaskMemFree
CoTaskMemAlloc
SysFreeString
VarUI4FromStr
PathFindFileNameA
PathIsRelativeW
PathRemoveFileSpecW
PathRemoveFileSpecA
PathAppendW
PathRemoveBackslashW
PathFileExistsW
InitCommonControlsEx
UrlMkGetSessionOption
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ