Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-25_03801c5921e096365e59321c6b372616_mafia.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-25_03801c5921e096365e59321c6b372616_mafia.exe
Resource
win10v2004-20231215-en
Target
2024-01-25_03801c5921e096365e59321c6b372616_mafia
Size
282KB
MD5
03801c5921e096365e59321c6b372616
SHA1
ed6a2cd9b656203b2819bca380306c7dd01bb0e6
SHA256
5f7f8a93da2dccd5ddde4159b3744c7d5de16cd7373cf4dbcb3a4c11024a59c5
SHA512
3e3ae91e6f39873044d73527cf4261495177ed653012478240c548e26887446c406e595c305b55fc3dd4e6a5e92f14d46e622236e3cb6ce414bd24e9d9dc969b
SSDEEP
6144:Z6/ZOcQQenUR7erRDZba2EGmiXnLlzup9f:ZoAQenNRNbaNiXnLw
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageServerAuth
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
ExtKeyUsageEmailProtection
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CreateFileW
MultiByteToWideChar
GetProcAddress
GlobalFree
DeviceIoControl
CloseHandle
GetVolumeInformationW
SetFilePointer
SystemTimeToFileTime
CreateDirectoryW
SetFileTime
WriteFile
WideCharToMultiByte
GetFileAttributesW
ReadFile
GetCurrentDirectoryW
LocalFileTimeToFileTime
GetTickCount
LoadLibraryW
FreeLibrary
GlobalAlloc
InterlockedDecrement
GetLastError
OutputDebugStringW
GetModuleFileNameW
DeleteFileW
GetFileSize
GetTempPathW
GetCommandLineW
GetExitCodeProcess
WaitForSingleObject
FindFirstFileA
RemoveDirectoryA
MoveFileExA
DeleteFileA
FindNextFileA
FindClose
SetEndOfFile
WriteConsoleW
GetModuleHandleW
GetCurrentProcess
InterlockedIncrement
GetSystemDefaultLangID
SetStdHandle
GetStringTypeW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
IsValidCodePage
GetOEMCP
GetACP
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetProcessHeap
FlushFileBuffers
EncodePointer
DecodePointer
Sleep
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
HeapAlloc
HeapReAlloc
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
LCMapStringW
GetCPInfo
CompareStringW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
HeapCreate
ExitProcess
GetStdHandle
HeapSize
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
GetLocaleInfoW
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetFileType
GetConsoleCP
GetConsoleMode
wsprintfW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
ShellExecuteExW
HttpQueryInfoW
HttpOpenRequestW
InternetConnectW
InternetOpenW
InternetCrackUrlW
InternetCloseHandle
InternetSetFilePointer
InternetReadFile
HttpSendRequestW
PathFileExistsW
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ