Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-28_17ac7ea2d1e6608aa519cc76d1a46de8_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-28_17ac7ea2d1e6608aa519cc76d1a46de8_mafia.exe
Resource
win10v2004-20231215-en
Target
2024-01-28_17ac7ea2d1e6608aa519cc76d1a46de8_mafia
Size
11.3MB
MD5
17ac7ea2d1e6608aa519cc76d1a46de8
SHA1
c563d25ac2008747ae1f5322e3b72fa543f06825
SHA256
d71e2f423a9309a0f3cd06ffebae074d74fe6b660171e9d0ee9f64107727bfd3
SHA512
a0eaef38a0501151a98d76fd1de898cfe84a8f3b76693a5572ea9cc1f5fbec6d80a39128a84493893cc35f92e99d90e67edc1ce146afe812488721fe30c4a22a
SSDEEP
196608:vipYe5T4dQ359OYAIsX0bE+dXBD6p1PN9bhD:vipYJ45g0bE6RDs1PbhD
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D3DXOptimizeFaces
D3DXOptimizeVertices
D3DXAssembleShaderFromFileA
D3DXAssembleShaderFromResourceA
D3DXMatrixTransformation
D3DXCreateCubeTexture
D3DXLoadSurfaceFromFileInMemory
D3DXMatrixRotationX
D3DXMatrixScaling
D3DXMatrixLookAtLH
D3DXMatrixReflect
D3DXVec3TransformNormal
D3DXMatrixRotationYawPitchRoll
D3DXMatrixRotationAxis
D3DXSaveSurfaceToFileA
D3DXPlaneFromPoints
D3DXAssembleShader
D3DXGetFVFVertexSize
D3DXVec3Transform
D3DXVec3TransformCoord
D3DXMatrixRotationY
D3DXVec3Normalize
D3DXMatrixInverse
D3DXMatrixTranspose
D3DXCreateTextureFromResourceExA
D3DXCreateTextureFromFileExA
D3DXCreateTextureFromFileInMemoryEx
D3DXMatrixPerspectiveFovLH
D3DXMatrixTranslation
D3DXMatrixMultiply
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
GetFileSize
UnmapViewOfFile
GetProcAddress
MultiByteToWideChar
LoadLibraryW
FreeLibrary
CreateThread
CloseHandle
CreateMutexA
GetModuleHandleA
GetModuleFileNameA
OpenEventA
LockResource
GetLastError
GetSystemDirectoryA
CreateProcessA
CreateEventA
GetVolumeInformationA
GetCommandLineA
GetDateFormatA
GetWindowsDirectoryA
SetEvent
WaitForSingleObject
SetUnhandledExceptionFilter
LoadResource
SetErrorMode
FindResourceA
MapViewOfFile
CreateFileMappingA
SetEnvironmentVariableA
CompareStringW
CreateFileW
WriteConsoleW
IsValidLocale
EnumSystemLocalesA
GetProcessHeap
SetEndOfFile
SetStdHandle
GetDriveTypeW
GetStringTypeW
FlushFileBuffers
GetConsoleMode
GetConsoleCP
ReadFile
SetFilePointer
GetTickCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
InitializeCriticalSectionAndSpinCount
SetHandleCount
SetLastError
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
InterlockedDecrement
InterlockedIncrement
GetCPInfo
GetCurrentDirectoryW
GetFileType
PeekNamedPipe
GetFileInformationByHandle
GetFullPathNameA
HeapCreate
GetTimeZoneInformation
GetLocaleInfoW
GetModuleFileNameW
GetStdHandle
WriteFile
HeapSize
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
TerminateProcess
GetTimeFormatA
LocalAlloc
InterlockedExchangeAdd
InterlockedExchange
Sleep
SizeofResource
FreeResource
GetFileAttributesA
CreateDirectoryA
DeleteFileA
MoveFileA
GetVersionExA
GetSystemInfo
lstrcpyA
LoadLibraryA
lstrcmpA
lstrcatA
GetLocalTime
CreateFileA
SetSystemPowerState
GetDevicePowerState
QueryPerformanceCounter
QueryPerformanceFrequency
GetCurrentProcess
GetLocaleInfoA
WideCharToMultiByte
GetSystemTimeAsFileTime
FileTimeToLocalFileTime
FileTimeToDosDateTime
lstrlenA
GetCurrentThreadId
GetCurrentProcessId
FindFirstFileA
FindClose
EnumResourceNamesA
EnumResourceTypesA
lstrcpynA
ResumeThread
SuspendThread
TerminateThread
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetExitCodeProcess
LocalFree
LocalLock
LocalUnlock
GetUserDefaultLCID
GetStringTypeExA
LCMapStringA
LCMapStringW
InterlockedCompareExchange
EncodePointer
DecodePointer
HeapFree
FileTimeToSystemTime
GetDriveTypeA
FindFirstFileExA
GetModuleHandleW
ExitProcess
HeapSetInformation
GetStartupInfoW
HeapAlloc
RaiseException
RtlUnwind
HeapReAlloc
AppendMenuA
CreatePopupMenu
ShowWindow
GetCursorPos
GetDesktopWindow
PeekMessageA
CreateWindowExA
GetWindowTextA
GetForegroundWindow
PostMessageA
RegisterWindowMessageA
LoadImageA
GetKeyState
TrackPopupMenu
GetWindowRect
SetCursor
DestroyWindow
MessageBoxA
DispatchMessageA
GetSystemMetrics
TranslateMessage
DestroyMenu
LoadStringA
GetDC
GetIconInfo
DialogBoxParamA
EndDialog
SetWindowPos
wsprintfA
InvalidateRect
SetSysColors
GetSysColor
PrintWindow
SetForegroundWindow
GetWindowLongA
SendMessageA
GetClientRect
ScreenToClient
UpdateWindow
ValidateRect
GetParent
IsWindow
GetClassNameA
SystemParametersInfoA
LoadCursorA
EnumChildWindows
EnumWindows
LoadIconA
RegisterClassA
AdjustWindowRect
FindWindowExA
CloseWindow
EnumDisplayDevicesA
EnumDisplaySettingsA
MonitorFromRect
PostQuitMessage
DefWindowProcA
GetClassLongA
SetRect
FindWindowA
SetCursorPos
ShowCursor
SetTimer
GetWindowDC
ReleaseDC
RegOpenKeyExA
RegEnumKeyA
RegEnumValueA
RegQueryValueExA
RegQueryValueExW
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
RegCloseKey
RegFlushKey
RegCreateKeyExA
RegSetValueExA
FreeSid
CheckTokenMembership
AllocateAndInitializeSid
RegDeleteValueA
RegQueryInfoKeyA
SHGetSpecialFolderPathA
Shell_NotifyIconA
ShellExecuteA
TransparentBlt
Direct3DCreate9
mmioSetInfo
mmioAdvance
mmioSeek
mmioClose
mmioOpenA
mmioAscend
mmioDescend
mmioGetInfo
mmioRead
timeGetTime
DirectInput8Create
GetCurrentPowerPolicies
SetSuspendState
CallNtPowerInformation
ord11
ord2
GetDIBits
GetObjectA
SetDIBits
CreateDIBSection
DeleteObject
DeleteDC
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetStockObject
BitBlt
CoUninitialize
CoInitialize
CoCreateInstance
SysFreeString
VariantClear
SysAllocString
SysAllocStringLen
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ