Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-22_e83e1a7c2b3ffd6ab4938b9908685632_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-22_e83e1a7c2b3ffd6ab4938b9908685632_mafia.exe
Resource
win10v2004-20231215-en
Target
2024-01-22_e83e1a7c2b3ffd6ab4938b9908685632_mafia
Size
1.0MB
MD5
e83e1a7c2b3ffd6ab4938b9908685632
SHA1
2d43f0606fbb67a7cd3c92a9719a03eadd9575e5
SHA256
158e76e13dba80978a01cb1d8d6e35d3012ac0404b84bd27f2c7d2922bcf3c79
SHA512
957159372eb9dd69c1c88fc4723f89775366eea3a38d50c9e599384b8ab5adfc0407e722b7eaf070d44ec91e7ff43d0fc2e2b6f37b08a41e6d799f57a2ef50ef
SSDEEP
12288:WRbdUdJkYRPolJzhh97IihJ3MUHfqCgovWJJ3MUHfqCgovWSy:WMdKSPolrX7IiP59A59C
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sleep
TerminateProcess
GetVersionExW
GetSystemDirectoryW
lstrlenW
FindFirstFileW
FindClose
GetCurrentProcessId
GetCurrentProcess
LocalFree
lstrlenA
GetLastError
GetCommandLineW
IsBadReadPtr
WaitForSingleObject
TerminateThread
GetSystemTime
GetComputerNameW
FindNextFileW
InterlockedDecrement
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
MultiByteToWideChar
WideCharToMultiByte
CloseHandle
ReadFile
CreateFileW
FreeLibrary
GetProcAddress
LoadLibraryW
GetModuleHandleW
SetFilePointer
GetModuleFileNameW
GetStdHandle
WriteFile
InitializeCriticalSection
SetEnvironmentVariableA
CompareStringW
SetEndOfFile
WriteConsoleW
IsValidLocale
EnumSystemLocalesA
HeapCreate
GetStringTypeW
LCMapStringW
GetLocaleInfoA
GetUserDefaultLCID
FlushFileBuffers
SetStdHandle
GetTickCount
SetLastError
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetTimeZoneInformation
InterlockedExchange
GetLocaleInfoW
GetConsoleMode
GetConsoleCP
GetFileType
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
DecodePointer
EncodePointer
ExitProcess
ExitThread
GetCurrentThreadId
CreateThread
GetSystemTimeAsFileTime
HeapSetInformation
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
IsProcessorFeaturePresent
GetCPInfo
InterlockedIncrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetHandleCount
RegSetValueExW
RegEnumValueW
RegEnumKeyW
ConvertSidToStringSidW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
GetTokenInformation
OpenProcessToken
GetUserNameW
RegCreateKeyExW
CommandLineToArgvW
CoCreateInstance
CoInitializeEx
CLSIDFromString
StringFromGUID2
CoCreateGuid
CoUninitialize
CoSetProxyBlanket
VariantClear
SysFreeString
SysAllocString
PathFindFileNameW
URLDownloadToCacheFileW
InternetAttemptConnect
InternetConnectW
HttpOpenRequestW
InternetOpenW
DeleteUrlCacheEntryW
HttpSendRequestW
InternetQueryDataAvailable
InternetReadFile
HttpQueryInfoW
InternetCloseHandle
InternetSetOptionW
InternetGetConnectedState
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ