Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-10_8072d0f4e30dc813b055275920539633_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-10_8072d0f4e30dc813b055275920539633_mafia.exe
Resource
win10v2004-20231222-en
Target
2024-01-10_8072d0f4e30dc813b055275920539633_mafia
Size
586KB
MD5
8072d0f4e30dc813b055275920539633
SHA1
a125e13cded76d6901503f7cc08a96c35dbc6e49
SHA256
7fafb4e9cdd060ed876abd4db4b461cf06005c4b76071ced5bda44da1c1d7a9f
SHA512
9d3bb213186af89b6afdf44db803e996ec37be5ea6fb1af050925f04c84d962e18c51fc94f5eb14e4cb0ec2db9ab72b466a655f67e52132970e1055b6a54e334
SSDEEP
6144:G8erPyhiiXiH33URZnRO5ZEoTgZglyGj/Wh5sOXb0qxqSi:+5DURlA5Z1TgC0GUlXwq
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
InternetCloseHandle
InternetOpenA
HttpSendRequestA
HttpAddRequestHeadersA
InternetReadFileExW
InternetAttemptConnect
HttpOpenRequestA
InternetSetStatusCallbackW
InternetSetOptionW
InternetReadFile
InternetCrackUrlA
InternetConnectA
HttpQueryInfoA
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetCommandLineW
CreateFileA
CreateMutexW
FreeResource
FindResourceW
LoadResource
SystemTimeToTzSpecificLocalTime
SystemTimeToFileTime
WaitForSingleObject
SetEvent
GetModuleHandleW
WideCharToMultiByte
Sleep
SizeofResource
FileTimeToSystemTime
GetModuleFileNameW
GetEnvironmentVariableA
MultiByteToWideChar
CreateDirectoryA
GetLastError
GetLocalTime
GetStringTypeW
LockResource
CreateEventW
GetFileTime
OutputDebugStringA
ReleaseMutex
CloseHandle
DeleteFileA
IsValidCodePage
GetOEMCP
GetACP
FlushFileBuffers
GetConsoleMode
GetConsoleCP
SetFilePointer
ReadFile
GetLocaleInfoW
HeapSize
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
HeapReAlloc
LoadLibraryW
SetStdHandle
WriteConsoleW
CreateFileW
SetEndOfFile
GetProcessHeap
HeapCreate
GetCurrentThreadId
SetLastError
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapSetInformation
GetStartupInfoW
HeapFree
HeapAlloc
GetFileAttributesA
RaiseException
RtlUnwind
LCMapStringW
GetCPInfo
SetUnhandledExceptionFilter
GetProcAddress
ExitProcess
WriteFile
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
QueryPerformanceCounter
EndPaint
DestroyWindow
PostQuitMessage
DialogBoxParamW
LoadCursorW
BeginPaint
LoadAcceleratorsW
RegisterClassExW
LoadIconW
MessageBoxA
EndDialog
SetWindowPos
LoadStringW
ShowWindow
CreateWindowExW
UpdateWindow
DefWindowProcW
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
SHGetPathFromIDListA
SHGetSpecialFolderLocation
ShellExecuteExA
CommandLineToArgvW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ