Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2023-08-27_78f395c1aac794c3ab8cb010af9b9332_floxif_mafia_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-27_78f395c1aac794c3ab8cb010af9b9332_floxif_mafia_JC.exe
Resource
win10v2004-20230915-en
Target
2023-08-27_78f395c1aac794c3ab8cb010af9b9332_floxif_mafia_JC.exe
Size
1.8MB
MD5
78f395c1aac794c3ab8cb010af9b9332
SHA1
d7db08e73e2275745fc516c3c6f61caecafdd128
SHA256
a51a30936920146fab1ccf43f7da71a9b4c8b66ed63d03d4c30edebc6e693921
SHA512
a507263d1748914fee99db93a89bcf2346300496b0f42fd8d9bafc04762f9e6fc1ae22eadab019c69470ee0090a4cc25937bddcdd322e4a4a004117c0a4fd975
SSDEEP
24576:iOIhMBy4wKvC9a11yKFJyIq7zCdQjCBq2r3AUA/JpEN1rEH7k:l/LvC9a1EK+Iq7zcv82r3AUA/J4P
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
gethostname
inet_ntoa
shutdown
send
getpeername
WSAIoctl
select
WSAGetLastError
getsockname
gethostbyname
setsockopt
WSACleanup
bind
__WSAFDIsSet
getsockopt
listen
accept
connect
WSAStartup
inet_addr
htonl
htons
recv
socket
closesocket
timeGetTime
PlaySoundA
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
CreateEnvironmentBlock
DestroyEnvironmentBlock
ExpandEnvironmentStringsForUserA
GetSystemDirectoryW
LoadLibraryW
CreateEventA
GetExitCodeProcess
ReadFile
CreateFileW
Process32Next
OpenEventA
WaitForMultipleObjects
lstrcatW
CreateToolhelp32Snapshot
OutputDebugStringA
GetVersionExA
GetCurrentProcessId
GetEnvironmentVariableA
SetCurrentDirectoryA
SetFileAttributesA
ResumeThread
TryEnterCriticalSection
ResetEvent
CreateFileA
GetFileSize
CompareFileTime
GetFileTime
SetFilePointer
MoveFileExA
SetEndOfFile
SetErrorMode
SystemTimeToFileTime
SetFileTime
GetDriveTypeA
GetFileAttributesA
FileTimeToSystemTime
FlushFileBuffers
CreateDirectoryA
GetLogicalDriveStringsA
MoveFileA
GetSystemTime
GetCurrentThread
VirtualFreeEx
ReadProcessMemory
TerminateProcess
SetThreadPriority
VirtualAllocEx
TerminateThread
FindResourceA
LoadResource
SetEvent
LockResource
AllocConsole
WriteFile
GetStdHandle
WriteConsoleA
GlobalDeleteAtom
GlobalGetAtomNameA
GlobalAddAtomA
SetProcessShutdownParameters
GetCurrentDirectoryA
SetEnvironmentVariableA
RtlUnwind
GetCPInfo
GetTimeZoneInformation
HeapReAlloc
GetConsoleMode
GetConsoleCP
InterlockedIncrement
InterlockedDecrement
GetStartupInfoW
HeapSetInformation
GetCommandLineA
InitializeCriticalSectionAndSpinCount
SetStdHandle
ExitProcess
GetModuleHandleW
FindFirstFileExA
EncodePointer
DecodePointer
TlsFree
TlsAlloc
DuplicateHandle
ReleaseSemaphore
CreateSemaphoreA
TlsSetValue
TlsGetValue
GetFileType
lstrcatA
lstrcmpiA
InterlockedExchange
GetProcessHeap
HeapFree
HeapAlloc
lstrcpynA
LocalFileTimeToFileTime
FileTimeToLocalFileTime
GetLocalTime
GetVolumeInformationA
GetLocaleInfoA
SetVolumeLabelA
DosDateTimeToFileTime
GetFullPathNameA
lstrcpyA
FormatMessageA
WaitNamedPipeW
RaiseException
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
Process32First
SetLastError
OpenFileMappingA
ReleaseMutex
CreateMutexA
CreateFileMappingA
WaitForSingleObject
UnmapViewOfFile
MapViewOfFile
GetPrivateProfileStructA
ExitThread
WritePrivateProfileStringA
GetPrivateProfileStringA
GetPrivateProfileIntA
OpenProcess
WritePrivateProfileSectionA
WritePrivateProfileStructA
WinExec
GetLastError
GetComputerNameA
GetVersion
GetSystemInfo
lstrlenA
DeleteFileA
GetTempPathA
FindNextFileA
FindClose
FindFirstFileA
FreeLibrary
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetProcessTimes
InitializeCriticalSection
GetSystemTimeAsFileTime
GetTickCount
GetCurrentProcess
CreateThread
CloseHandle
Sleep
GetCurrentThreadId
GetModuleHandleA
GetModuleFileNameA
LoadLibraryA
GetProcAddress
GlobalFree
GlobalUnlock
MultiByteToWideChar
WideCharToMultiByte
GlobalAlloc
GlobalLock
GlobalSize
IsProcessorFeaturePresent
GetModuleFileNameW
GetLocaleInfoW
HeapSize
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
GetStringTypeW
HeapCreate
GetCurrentDirectoryW
SetHandleCount
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
WriteConsoleW
SetEnvironmentVariableW
CompareStringW
GetDriveTypeW
GetFileInformationByHandle
PeekNamedPipe
SizeofResource
RemoveDirectoryA
TrackPopupMenu
GetMenuItemID
GetSubMenu
LoadMenuA
EnableMenuItem
RemoveMenu
SetMenuDefaultItem
DestroyMenu
EnableWindow
ToAscii
GetAsyncKeyState
MapVirtualKeyA
VkKeyScanA
IsIconic
DestroyWindow
PostThreadMessageA
SendNotifyMessageA
WaitMessage
PeekMessageA
ChangeClipboardChain
SetClipboardViewer
GetClipboardOwner
EnumDesktopWindows
GetClassNameA
OpenDesktopA
FillRect
DrawTextA
FindWindowExA
WindowFromPoint
RegisterWindowMessageA
EnumWindows
GetIconInfo
GetWindowTextA
IsDlgButtonChecked
IsWindow
IsWindowVisible
EndPaint
DrawIconEx
BeginPaint
GetUpdateRect
IntersectRect
DestroyIcon
PtInRect
GetKeyboardState
SetActiveWindow
MessageBeep
FlashWindow
ChangeDisplaySettingsExA
keybd_event
GetKeyState
EnumDisplaySettingsA
ScreenToClient
GetWindowRect
SendDlgItemMessageA
SetForegroundWindow
LoadStringA
GetClientRect
SetFocus
GetScrollInfo
InvalidateRect
GetDlgItem
EndDialog
GetCursorPos
SetWindowTextA
CheckDlgButton
SetDlgItemInt
GetDlgItemInt
GetProcessWindowStation
SetRect
GetDlgItemTextA
DialogBoxParamA
SetDlgItemTextA
MoveWindow
ExitWindowsEx
GetDesktopWindow
wsprintfA
GetWindowThreadProcessId
SystemParametersInfoA
GetForegroundWindow
MessageBoxA
SendMessageA
PostMessageA
FindWindowA
mouse_event
GetMessageA
GetUserObjectInformationA
SetTimer
RegisterClassExA
PostQuitMessage
GetThreadDesktop
KillTimer
LoadIconA
OpenInputDesktop
CloseDesktop
TranslateMessage
SetWindowLongA
GetWindowLongA
CreateWindowExA
DefWindowProcA
SetWindowPos
ShowWindow
SetThreadDesktop
DispatchMessageA
GetSystemMetrics
LoadImageA
AdjustWindowRect
LoadCursorA
IsRectEmpty
GetDC
ReleaseDC
CloseClipboard
IsClipboardFormatAvailable
RegisterClipboardFormatA
GetClipboardData
EmptyClipboard
OpenClipboard
SetClipboardData
OemToCharA
CharToOemA
wvsprintfA
GetBitmapBits
SetTextColor
SetBkColor
GdiFlush
CreatePalette
RealizePalette
SelectPalette
CreateFontIndirectA
GetObjectA
ExtEscape
GetSystemPaletteEntries
GetRgnBox
GetRegionData
SetRectRgn
PtInRegion
CombineRgn
OffsetRgn
CreateRectRgn
PatBlt
StretchBlt
CreateDCA
SetBkMode
GetClipBox
GetStockObject
CreateSolidBrush
BitBlt
DeleteDC
CreateDIBSection
GetDeviceCaps
GetDIBits
DeleteObject
GetPixel
CreateCompatibleBitmap
SetDIBColorTable
SelectObject
CreateCompatibleDC
GetSecurityDescriptorLength
GetSecurityDescriptorDacl
GetSecurityDescriptorGroup
IsValidSecurityDescriptor
IsValidSid
GetSecurityDescriptorOwner
SetKernelObjectSecurity
GetSecurityDescriptorControl
GetKernelObjectSecurity
IsValidAcl
RegCreateKeyA
SetSecurityDescriptorSacl
ConvertStringSecurityDescriptorToSecurityDescriptorA
GetSecurityDescriptorSacl
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetServiceStatus
RegDeleteValueA
QueryServiceStatus
RegCreateKeyExA
RegDeleteKeyA
CreateServiceA
RegisterServiceCtrlHandlerA
DeleteService
StartServiceCtrlDispatcherA
AdjustTokenPrivileges
DuplicateTokenEx
LookupPrivilegeValueA
SetTokenInformation
FreeSid
RevertToSelf
AllocateAndInitializeSid
ImpersonateLoggedOnUser
EqualSid
GetTokenInformation
OpenProcessToken
CreateProcessAsUserA
RegSetValueExA
QueryServiceConfigA
OpenSCManagerA
EnumServicesStatusA
CloseServiceHandle
LookupAccountSidA
OpenServiceA
GetUserNameA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
SHAppBarMessage
SHGetPathFromIDListA
SHGetMalloc
SHGetSpecialFolderLocation
SHFileOperationA
ShellExecuteExA
ShellExecuteA
Shell_NotifyIconA
CoUninitialize
CoInitialize
CoCreateInstance
ImmGetDefaultIMEWnd
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ