Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-11_542a5cad55fd49bc654ff5a8f9fac470_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-11_542a5cad55fd49bc654ff5a8f9fac470_mafia.exe
Resource
win10v2004-20231222-en
Target
2024-01-11_542a5cad55fd49bc654ff5a8f9fac470_mafia
Size
586KB
MD5
542a5cad55fd49bc654ff5a8f9fac470
SHA1
09d2c6dfaa4079aaa875490889a7d4733d2b2ce5
SHA256
46452d4c473b122fb7f13b05ecdcdba2c60ad91efc1bf7043abe3d879f826210
SHA512
5f9a0d9fa6b331f923595a12552ef28b8158790e1955bb18066ad2586832dee931c35050c962b39c65dd1ba3071ea8efe8adc94b4ae95bbcbf785e31e7b2b950
SSDEEP
6144:t8erPyhiiXiH33URZnRO5ZEoTuZJlzGj/Wh5sOXb0qtqSi:p5DURlA5Z5TuHVGUlXwq
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
InternetCloseHandle
InternetOpenA
HttpSendRequestA
HttpAddRequestHeadersA
InternetReadFileExW
InternetAttemptConnect
HttpOpenRequestA
InternetSetStatusCallbackW
InternetSetOptionW
InternetReadFile
InternetCrackUrlA
InternetConnectA
HttpQueryInfoA
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetCommandLineW
CreateFileA
CreateMutexW
FreeResource
FindResourceW
LoadResource
SystemTimeToTzSpecificLocalTime
SystemTimeToFileTime
WaitForSingleObject
SetEvent
GetModuleHandleW
WideCharToMultiByte
Sleep
SizeofResource
FileTimeToSystemTime
GetModuleFileNameW
GetEnvironmentVariableA
MultiByteToWideChar
CreateDirectoryA
GetLastError
GetLocalTime
GetStringTypeW
LockResource
CreateEventW
GetFileTime
OutputDebugStringA
ReleaseMutex
CloseHandle
DeleteFileA
IsValidCodePage
GetOEMCP
GetACP
FlushFileBuffers
GetConsoleMode
GetConsoleCP
SetFilePointer
ReadFile
GetLocaleInfoW
HeapSize
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
HeapReAlloc
LoadLibraryW
SetStdHandle
WriteConsoleW
CreateFileW
SetEndOfFile
GetProcessHeap
HeapCreate
GetCurrentThreadId
SetLastError
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapSetInformation
GetStartupInfoW
HeapFree
HeapAlloc
GetFileAttributesA
RaiseException
RtlUnwind
LCMapStringW
GetCPInfo
SetUnhandledExceptionFilter
GetProcAddress
ExitProcess
WriteFile
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
QueryPerformanceCounter
EndPaint
DestroyWindow
PostQuitMessage
DialogBoxParamW
LoadCursorW
BeginPaint
LoadAcceleratorsW
RegisterClassExW
LoadIconW
MessageBoxA
EndDialog
SetWindowPos
LoadStringW
ShowWindow
CreateWindowExW
UpdateWindow
DefWindowProcW
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
SHGetPathFromIDListA
SHGetSpecialFolderLocation
ShellExecuteExA
CommandLineToArgvW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ