Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-24_b0bf1f143fd0e05cc29ae61374c8659d_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-24_b0bf1f143fd0e05cc29ae61374c8659d_mafia.exe
Resource
win10v2004-20231215-en
Target
2024-01-24_b0bf1f143fd0e05cc29ae61374c8659d_mafia
Size
1010KB
MD5
b0bf1f143fd0e05cc29ae61374c8659d
SHA1
2de9166ebcd328c94695b1e3fbe3f639c1aab964
SHA256
b8b1996e45b666a3e6960923073ae33d488f3c55147d96e2c512e12583f4806e
SHA512
2c5d3d534f33fb3f0f578eb74cadb8f4f491f5368e51016ae55318f8f69c20c2a03af3342713f8b398c02a817ff5829d3cd21a4e54de5d1c1f697109ee63e5c3
SSDEEP
24576:sm6OUmrTiUnc/WBGdGoLt33EUWWiIeYc+fo7DcdY+d4TQdgwO:smembnc/WMIoLtEUWWifYc+f2DeNd4Tx
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
LookupPrivilegeValueA
CreateProcessAsUserW
GetTokenInformation
LookupPrivilegeNameA
CryptGetHashParam
CreateProcessAsUserA
RegSetValueExW
RegEnumKeyA
RegOpenKeyA
RegOpenKeyExW
RegDeleteValueW
RegDeleteKeyA
RegQueryValueExW
RegDeleteValueA
RegCreateKeyExA
CryptHashData
CryptGetUserKey
CryptDestroyHash
ControlService
CryptDestroyKey
CryptGenKey
RegCloseKey
OpenProcessToken
RegOpenKeyExA
RevertToSelf
OpenSCManagerA
CryptCreateHash
CryptAcquireContextA
CryptReleaseContext
RegQueryValueExA
RegSetValueExA
CloseServiceHandle
OpenServiceA
LookupAccountSidA
CoUninitialize
CoInitializeEx
CoSetProxyBlanket
CoCreateInstance
WSACleanup
WSAGetLastError
WSAStartup
GetAdaptersInfo
CertDeleteCertificateFromStore
CryptMsgGetParam
CertEnumCertificatesInStore
PFXImportCertStore
CertGetNameStringA
CertCloseStore
CertFindCertificateInStore
CertAddCertificateContextToStore
CertFreeCertificateContext
PFXVerifyPassword
CertOpenStore
CryptStringToBinaryA
CryptQueryObject
CertNameToStrW
CertCreateCertificateContext
LoadUserProfileA
UnloadUserProfile
CreateEnvironmentBlock
DestroyEnvironmentBlock
WTSQuerySessionInformationA
WTSFreeMemory
WTSEnumerateSessionsA
WinHttpReadData
WinHttpSetCredentials
WinHttpAddRequestHeaders
WinHttpOpenRequest
WinHttpOpen
WinHttpQueryDataAvailable
WinHttpSetStatusCallback
WinHttpQueryHeaders
WinHttpCloseHandle
WinHttpConnect
WinHttpQueryOption
WinHttpReceiveResponse
WinHttpSetOption
WinHttpSendRequest
xmlTextReaderGetAttribute
xmlTextReaderAttributeCount
xmlTextReaderValue
xmlTextReaderDepth
xmlParseMemory
xmlTextReaderRead
xmlFreeTextReader
xmlStrcmp
xmlNewTextReaderFilename
xmlParseFile
xmlFreeDoc
xmlCleanupParser
xmlNodeListGetString
xmlTextReaderName
xmlFree
xmlDocGetRootElement
FindResourceExW
FindResourceW
LoadResource
CreateDirectoryW
WaitForSingleObject
WideCharToMultiByte
LoadLibraryW
SizeofResource
MultiByteToWideChar
GetLastError
GetProcAddress
LockResource
ReleaseMutex
CloseHandle
DeleteFileA
CreateFileA
GetFileSize
FindFirstFileW
GetLocaleInfoA
FreeLibrary
SystemTimeToTzSpecificLocalTime
SystemTimeToFileTime
GetCurrentProcess
Process32First
GetTickCount
WriteFile
OpenProcess
Sleep
GetExitCodeProcess
CreateProcessA
TerminateProcess
FileTimeToSystemTime
ReadFile
GetTimeZoneInformation
GetEnvironmentVariableA
GetFileSizeEx
FindFirstFileA
CopyFileA
FindClose
GetLocalTime
LoadLibraryA
Process32Next
GetSystemInfo
FindNextFileA
GetModuleHandleA
CreateMutexA
CreateToolhelp32Snapshot
GetVersionExA
GetSystemTime
CreateThread
CreateTimerQueue
CreateDirectoryA
CreateTimerQueueTimer
DeleteTimerQueue
lstrlenA
CopyFileW
LCMapStringW
lstrlenW
FlushFileBuffers
GetCurrentThreadId
lstrcmpA
GetCurrentProcessId
QueryPerformanceCounter
FormatMessageA
GlobalAlloc
FormatMessageW
GetComputerNameExW
GlobalFree
LocalFree
GetFullPathNameA
GetFileAttributesExA
SetFilePointer
InterlockedDecrement
GetSystemDirectoryA
GetCurrentDirectoryW
ProcessIdToSessionId
SetCurrentDirectoryW
GetNativeSystemInfo
lstrcmpiA
GetVersion
LocalAlloc
SuspendThread
ResumeThread
HeapAlloc
HeapDestroy
InitializeCriticalSectionAndSpinCount
RaiseException
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
SetEnvironmentVariableA
CompareStringW
GetDriveTypeW
VirtualQuery
WriteConsoleW
SetEndOfFile
CreatePipe
GetFileAttributesA
IsValidLocale
CreateMutexW
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
GetCommandLineW
HeapSetInformation
FileTimeToLocalFileTime
GetFileInformationByHandle
PeekNamedPipe
GetFileType
GetSystemTimeAsFileTime
DuplicateHandle
RtlUnwind
InitializeCriticalSection
InterlockedExchange
DecodePointer
EncodePointer
InterlockedIncrement
MoveFileExA
GetModuleFileNameA
LocalLock
LocalUnlock
GetDriveTypeA
FindFirstFileExA
ExitThread
EnumSystemLocalesA
GetLocaleInfoW
GetUserDefaultLCID
GetStringTypeW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleHandleW
GetConsoleMode
GetConsoleCP
SetStdHandle
DeleteFileW
ExitProcess
IsDebuggerPresent
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
IsProcessorFeaturePresent
HeapCreate
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStartupInfoW
CreateFileW
wsprintfW
MessageBoxA
SHGetSpecialFolderPathA
SHCreateDirectoryExA
SHCreateDirectoryExW
ord29
ord39
ord43
ord36
ord18
ord8
ord4
ord13
ord26
ord72
ord48
ord49
ord3
ord19
ord12
ord16
ord20
ord2
ord1
ord31
ord41
ord9
ord11
PathFindExtensionA
StrTrimA
StrStrIA
NetGetJoinInformation
DsGetDcNameA
NetApiBufferFree
SysAllocString
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayGetLBound
VariantInit
SysAllocStringByteLen
VariantClear
SysStringLen
SysFreeString
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ