Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-09_b89ea5acf08723dc2750d9b058d1bb9e_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-09_b89ea5acf08723dc2750d9b058d1bb9e_mafia.exe
Resource
win10v2004-20231215-en
Target
2024-01-09_b89ea5acf08723dc2750d9b058d1bb9e_mafia
Size
1.1MB
MD5
b89ea5acf08723dc2750d9b058d1bb9e
SHA1
d78af2711d351064ae148b09b3149b64f1c837d0
SHA256
f0ac49f37bf5cd6dc0fb078faaa40aa6563025fb0afbbb3506711930107a3f63
SHA512
a821ae5875d6ab807f2c00f7fde6176ffe3f50e46bf4295e390ee8e8b80c44f050b96179e587cefee435bcf3be685075259897edebf67ad4b0c955be3994bcaa
SSDEEP
24576:bfiOQqA21Bkh3t2iBfeSYwXhXy4Eom2NDHQUaBd0ihU92DkvYy1QS9HakPJ3yzTj:rfAgBWRHQUaB892Dkwy1QS9HaQ3yv3r3
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CoInitializeEx
StringFromGUID2
CLSIDFromString
OleCreate
OleSetContainedObject
OleInitialize
OleUninitialize
CoInitializeSecurity
CoSetProxyBlanket
CoInitialize
CoCreateInstance
CoUninitialize
CoCreateGuid
SHDeleteValueA
PathFileExistsA
UrlUnescapeA
UrlEscapeA
SHDeleteKeyA
InternetGetConnectedState
HttpQueryInfoA
InternetCanonicalizeUrlA
InternetCloseHandle
InternetOpenUrlA
InternetReadFile
InternetGetLastResponseInfoA
HttpAddRequestHeadersA
InternetCrackUrlA
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
InternetSetOptionA
InternetOpenA
CharPrevA
CharNextA
CharLowerA
CharUpperA
CreateDialogParamA
MoveWindow
PostMessageA
EnumWindows
SendDlgItemMessageA
PeekMessageA
GetSysColor
KillTimer
EnableWindow
RedrawWindow
GetClassInfoExA
LoadCursorA
MessageBoxA
GetSystemMetrics
CreateWindowExA
UpdateWindow
SetTimer
GetMessageA
TranslateMessage
DispatchMessageA
DialogBoxParamA
SetWindowRgn
DestroyWindow
ClientToScreen
GetFocus
DefWindowProcA
GetForegroundWindow
GetCursorPos
PtInRect
InvalidateRect
RegisterClassExA
GetWindowThreadProcessId
GetShellWindow
SetWindowPos
BeginPaint
EndPaint
SetWindowTextA
LoadIconA
SendMessageA
GetSystemMenu
EnableMenuItem
SetDlgItemTextA
GetDlgItem
IsWindowVisible
GetClassNameA
GetWindowTextA
LoadStringA
SetFocus
ShowWindow
GetWindowRect
ScreenToClient
EndDialog
GetDC
ReleaseDC
DrawTextW
SetWindowLongA
GetClientRect
GetWindowLongA
GetAsyncKeyState
SetActiveWindow
SetForegroundWindow
VariantClear
VariantInit
SysStringByteLen
SysFreeString
SysStringLen
SysAllocString
SysAllocStringLen
BitBlt
StretchBlt
SetBkMode
GetObjectA
CreateCompatibleDC
SelectObject
DeleteDC
CreateBitmap
GetDeviceCaps
CreatePatternBrush
CombineRgn
GetPixel
CreateRectRgn
SetPixel
SetTextColor
GetTextExtentPointW
CreateFontW
DeleteObject
CreateSolidBrush
LookupAccountSidW
ConvertSidToStringSidW
RegEnumValueA
RegOpenKeyExW
RegQueryValueExW
RegEnumKeyExA
RegOpenKeyA
ConvertSidToStringSidA
InitializeAcl
IsValidSid
AddAccessDeniedAce
AddAccessAllowedAce
GetLengthSid
DuplicateTokenEx
RegCreateKeyExA
RegSetValueExA
RegQueryValueA
InitializeSecurityDescriptor
RegQueryValueExA
OpenProcessToken
GetTokenInformation
EqualSid
RegEnumKeyA
RegCloseKey
RegOpenKeyExA
RegDeleteValueA
FreeSid
GetUserNameA
SetSecurityDescriptorOwner
SetSecurityDescriptorDacl
LookupAccountNameA
AllocateAndInitializeSid
ConvertStringSidToSidW
SHGetFolderPathW
ShellExecuteA
ShellExecuteExA
SHGetSpecialFolderPathA
SHGetPathFromIDListA
SHBrowseForFolderA
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
TransparentBlt
GetUserNameExW
ord93
ord71
ord8
ord141
ord87
ord168
ord136
HeapDestroy
DecodePointer
EncodePointer
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetCurrentDirectoryA
GetVersion
GetWindowsDirectoryA
HeapReAlloc
GetFileAttributesA
GetTempPathA
GetTempFileNameA
InterlockedDecrement
InterlockedIncrement
LoadLibraryW
GetModuleFileNameW
RaiseException
GetComputerNameExA
IsWow64Process
GetNativeSystemInfo
GetSystemInfo
GetSystemTime
SetLastError
AttachConsole
GetStdHandle
AllocConsole
GetConsoleScreenBufferInfo
SetConsoleWindowInfo
GetComputerNameW
GetDriveTypeA
GetFileSizeEx
GetFileInformationByHandle
SetFilePointer
HeapSize
InitializeCriticalSectionAndSpinCount
RtlUnwind
FileTimeToLocalFileTime
FindFirstFileExA
GetConsoleCP
GetConsoleMode
GetModuleHandleW
ExitProcess
VirtualProtect
VirtualAlloc
VirtualQuery
SetStdHandle
GetFileType
GetLocalTime
GetCommandLineA
HeapSetInformation
GetCPInfo
GetStartupInfoW
GetACP
GetOEMCP
IsValidCodePage
SetEnvironmentVariableA
SetCurrentDirectoryA
GetDriveTypeW
GetFullPathNameA
GetCurrentDirectoryW
SetCurrentDirectoryW
SetEndOfFile
LCMapStringW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetTimeZoneInformation
IsProcessorFeaturePresent
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
SetHandleCount
HeapCreate
GetLocaleInfoW
CreateFileW
WriteConsoleW
FlushFileBuffers
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
CompareStringW
ReadConsoleInputA
SetConsoleMode
MoveFileA
lstrcpyA
FindResourceA
FreeResource
GetNamedPipeHandleStateA
GetCommandLineW
GetLocaleInfoA
SetErrorMode
FileTimeToSystemTime
GetSystemTimeAsFileTime
CreateThread
GetProcessHeap
HeapAlloc
HeapFree
WaitForSingleObject
GetExitCodeProcess
TerminateProcess
GetTimeFormatA
GetDateFormatA
LocalAlloc
DosDateTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
SetFileAttributesA
GetTickCount
SystemTimeToFileTime
GetLastError
lstrlenA
CloseHandle
CreateMutexA
OpenMutexA
CreateProcessA
GetVersionExA
Process32Next
OpenProcess
Process32First
CreateToolhelp32Snapshot
FreeLibrary
GetProcAddress
LoadLibraryA
WideCharToMultiByte
RemoveDirectoryA
FindClose
DeleteFileA
FindNextFileA
MoveFileExA
FindFirstFileA
GetModuleFileNameA
GetDiskFreeSpaceA
GetDiskFreeSpaceExA
GetCurrentProcess
GetModuleHandleA
LocalFree
FormatMessageA
ReadFile
Sleep
CreateFileA
ExpandEnvironmentStringsA
MultiByteToWideChar
CopyFileA
GetFileSize
WriteFile
PeekNamedPipe
ConnectNamedPipe
CreateNamedPipeA
GetPrivateProfileStringA
WritePrivateProfileStringA
CreateDirectoryA
GlobalFree
GlobalAlloc
lstrcmpA
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
lstrlenW
RpcStringFreeA
UuidToStringA
WinVerifyTrust
CertCloseStore
CertFreeCertificateContext
CertGetNameStringW
CertFindCertificateInStore
CryptMsgGetParam
CryptQueryObject
CryptDecodeObject
CryptMsgClose
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ