Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-28_1db92e52abffb5c7209609fa1defb5e8_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-28_1db92e52abffb5c7209609fa1defb5e8_mafia.exe
Resource
win10v2004-20231215-en
Target
2024-01-28_1db92e52abffb5c7209609fa1defb5e8_mafia
Size
653KB
MD5
1db92e52abffb5c7209609fa1defb5e8
SHA1
0d314e1ef247108c84254eb76db24ceeba577792
SHA256
32fed7059b6e6f19778a91dc7cc72e41f1cefc03f65b0e5bd686caa9a550d3c0
SHA512
38f91004d45de3b197534767bc82faeafe6f9bfd27dfe2508296525ec115b57c13dfdf81969a6852764efc14bf99db243a29b75247ba7b158b66277da9cd42e0
SSDEEP
12288:cij0isJD+m3srW+5tEZG1QRw7rZ0n9sLXxGkgXYhfu0tF:5IiG+m8rWwHfR0yXkkxVtF
resource | yara_rule |
---|---|
sample | nsis_installer_2 |
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageServerAuth
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
ExtKeyUsageNetscapeServerGatedCrypto
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\codes\VS2010\SogouDownLoad-NewUI\Src\MiniDownLoad\Release\MiniDownLoad.pdb
CloseHandle
GetCommandLineW
GetTempPathW
CompareStringW
GetTimeZoneInformation
GetProcessHeap
SetEndOfFile
lstrlenW
GetCurrentDirectoryW
PeekNamedPipe
GetFileInformationByHandle
GetFullPathNameW
FindFirstFileExW
GetDriveTypeW
FileTimeToLocalFileTime
FileTimeToSystemTime
CreateFileW
SizeofResource
WriteFile
GetModuleHandleW
InterlockedDecrement
InterlockedIncrement
LoadResource
FindResourceW
GetEnvironmentVariableW
CreateFileA
RaiseException
EnterCriticalSection
LeaveCriticalSection
GetLastError
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
HeapSetInformation
GetStartupInfoW
HeapFree
EncodePointer
DecodePointer
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
GetProcAddress
ExitProcess
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
IsProcessorFeaturePresent
HeapReAlloc
HeapSize
Sleep
SetFilePointer
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
MultiByteToWideChar
RtlUnwind
FreeLibrary
InterlockedExchange
LoadLibraryW
GetLocaleInfoW
SetStdHandle
WriteConsoleW
LCMapStringW
GetStringTypeW
FlushFileBuffers
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
CreateDirectoryW
CreateProcessW
WaitForSingleObject
CreateMutexW
ReleaseMutex
DebugBreak
OutputDebugStringW
lstrlenA
InitializeCriticalSection
GetVersionExW
lstrcpynW
lstrcpyW
GetFileSize
FindFirstFileW
CopyFileW
ReadFile
FindClose
DeleteFileW
DeviceIoControl
GetSystemDirectoryW
GetPrivateProfileStringW
lstrcmpW
SetEnvironmentVariableA
FindWindowW
LoadStringW
wvsprintfW
CharNextW
SendMessageTimeoutW
wsprintfW
ShellExecuteW
SHGetSpecialFolderPathW
ShellExecuteExW
InternetConnectW
HttpSendRequestW
InternetSetOptionW
InternetOpenW
InternetReadFile
InternetQueryDataAvailable
InternetCrackUrlW
HttpOpenRequestW
HttpQueryInfoW
InternetCloseHandle
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
Netbios
NetWkstaTransportEnum
NetApiBufferFree
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
CoInitialize
CoUninitialize
CoCreateGuid
SHGetValueW
PathAppendW
PathIsDirectoryW
PathFileExistsW
SHSetValueW
StrCpyW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ