Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
2023-08-25_cbc5f68900d6178c9c94e0f0c5f269e5_mafia_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-25_cbc5f68900d6178c9c94e0f0c5f269e5_mafia_JC.exe
Resource
win10v2004-20230915-en
Target
2023-08-25_cbc5f68900d6178c9c94e0f0c5f269e5_mafia_JC.exe
Size
1.2MB
MD5
cbc5f68900d6178c9c94e0f0c5f269e5
SHA1
bbd1bfd727f44bd1b216cc5bf32407c2b5a06c1a
SHA256
b571f7e2dd29a1f6bec6e92b817ac69ba34cb04ae44e4b65eb429bfd19830d9f
SHA512
717eefac8f7e83a9656042d0fa70bc20726af1abe0ad71a9fade4d2364bdeee13cff4c9f332bf1d07bb7900629ae5f6610af98f43f3b2d7e0d5b70e9ae47d7c0
SSDEEP
24576:CUBvP0OwvJy8/DO/Q33o2KvocXshDyaKXaR6nKp0KP+wEc:PMOwvJy8/DO/QI2KvoWshDNd6ne0KP7V
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PathRemoveFileSpecW
PathFileExistsW
GetModuleHandleW
GetExitCodeProcess
WaitForSingleObject
SizeofResource
LockResource
LoadResource
FindResourceW
GetFileTime
CreateFileW
GetSystemTimeAsFileTime
LocalFree
WTSGetActiveConsoleSessionId
VirtualFree
SetFilePointer
ReadFile
GetSystemInfo
FreeLibrary
VirtualAlloc
CreateEventW
ExpandEnvironmentStringsW
SetEnvironmentVariableW
GetUserDefaultLangID
SystemTimeToFileTime
QueryPerformanceCounter
TzSpecificLocalTimeToSystemTime
QueryPerformanceFrequency
CreateMutexW
GetTickCount
FormatMessageA
WriteFile
SetLastError
ReleaseMutex
GetCurrentProcessId
InterlockedExchange
WideCharToMultiByte
MultiByteToWideChar
GetNativeSystemInfo
GetVersionExW
lstrlenW
IsDebuggerPresent
SetEndOfFile
FlushFileBuffers
MapViewOfFile
UnmapViewOfFile
GetFileAttributesW
GetCurrentDirectoryW
GetLongPathNameW
CreateFileMappingW
QueryDosDeviceW
SetInformationJobObject
SetHandleInformation
VirtualQueryEx
DuplicateHandle
AssignProcessToJobObject
GetStdHandle
GetProcessId
HeapSetInformation
ResumeThread
GetLocaleInfoW
GetUserDefaultUILanguage
InterlockedExchangeAdd
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
RaiseException
GetCurrentThreadId
CreateThread
TlsGetValue
TlsSetValue
TlsAlloc
TlsFree
RtlCaptureStackBackTrace
GetSystemDirectoryW
GetWindowsDirectoryW
LocalAlloc
RegisterWaitForSingleObject
UnregisterWaitEx
GetQueuedCompletionStatus
PostQueuedCompletionStatus
CreateIoCompletionPort
InterlockedIncrement
SetEvent
ResetEvent
WaitForMultipleObjects
ReleaseSemaphore
VirtualQuery
RtlCaptureContext
InterlockedDecrement
CreateSemaphoreW
InitializeCriticalSection
WaitNamedPipeW
TransactNamedPipe
SetNamedPipeHandleState
TerminateJobObject
SignalObjectAndWait
GetProcessHandleCount
WriteProcessMemory
VirtualAllocEx
GetThreadContext
VirtualProtectEx
VirtualFreeEx
CreateJobObjectW
CreateNamedPipeW
OpenEventW
SearchPathW
DebugBreak
ReadProcessMemory
SuspendThread
GetThreadLocale
GetACP
LoadLibraryA
CreateFileA
GetTimeZoneInformation
GetStringTypeW
EncodePointer
DecodePointer
UnhandledExceptionFilter
HeapFree
ExitProcess
GetStartupInfoW
GetConsoleCP
GetConsoleMode
SetStdHandle
GetFileType
HeapReAlloc
HeapAlloc
GetProcessHeap
LCMapStringW
GetCPInfo
RtlUnwind
IsProcessorFeaturePresent
HeapCreate
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
HeapSize
GetOEMCP
IsValidCodePage
WriteConsoleW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
CompareStringW
GetModuleHandleA
SetCurrentDirectoryW
LoadLibraryExW
GetEnvironmentVariableA
SetEnvironmentVariableA
LoadLibraryW
GetProcAddress
GetModuleFileNameW
GetTempPathW
GetLastError
GetEnvironmentVariableW
GetCommandLineW
CreateProcessW
CloseHandle
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
InterlockedCompareExchange
Sleep
CreateRemoteThread
OpenProcess
GetThreadDesktop
GetUserObjectInformationW
SetProcessWindowStation
CharUpperW
CreateDesktopW
GetProcessWindowStation
CreateWindowStationW
CloseDesktop
MessageBoxW
CloseWindowStation
GetProfileType
CreateEnvironmentBlock
DestroyEnvironmentBlock
WTSQueryUserToken
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
timeGetTime
RegSetValueExW
ConvertStringSecurityDescriptorToSecurityDescriptorW
ConvertSecurityDescriptorToStringSecurityDescriptorW
GetFileSecurityW
RegCreateKeyExW
RegQueryValueExW
RegQueryInfoKeyW
RegDeleteValueW
RegOpenKeyExW
RegEnumKeyExW
RegCloseKey
OpenProcessToken
GetTokenInformation
ConvertSidToStringSidW
CreateProcessAsUserW
GetTraceEnableFlags
GetTraceLoggerHandle
TraceEvent
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
SetEntriesInAclW
GetSecurityInfo
CreateWellKnownSid
CopySid
LookupPrivilegeValueW
EqualSid
DuplicateToken
DuplicateTokenEx
CreateRestrictedToken
SetThreadToken
ConvertStringSidToSidW
GetLengthSid
SetTokenInformation
RevertToSelf
RegDisablePredefinedCache
RegisterTraceGuidsW
GetTraceEnableLevel
UnregisterTraceGuids
SetFileSecurityW
CrashForException
DumpProcess
DumpProcessWithoutCrash
InjectDumpProcessWithoutCrash
SetActiveURL
SetClientId
SetCommandLine2
SetExperimentList2
SetExtensionID
SetGpuInfo
SetNumberOfExtensions
SetNumberOfViews
SetPrinterInfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ