Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-29_541af502f92fbdca5d8b7a07dfd24c83_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-29_541af502f92fbdca5d8b7a07dfd24c83_mafia.exe
Resource
win10v2004-20231215-en
Target
2024-01-29_541af502f92fbdca5d8b7a07dfd24c83_mafia
Size
316KB
MD5
541af502f92fbdca5d8b7a07dfd24c83
SHA1
f8e8047e918bdd815ed6470823a64e5c6af0830b
SHA256
c5b099096e46c7f4a1329034bdb8842c005f5252739deccd280a06ac756ddd3a
SHA512
73aad3756724cc4d9a826caa9882a42b40c0032c1c6507fd402746fad4a69a329e2b743471df242549e1d737c1d604a259066bc99cfd7e82bb8c953f0babb110
SSDEEP
6144:1AUCfXHdl9t0yZ6tMUFfKCpBKwU9eOS9IszmlLpkIliHMBuTtpntSO:1AUCfXoS9Kf1pU9etGlLiIMsYYO
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
E:\Work\Rtd2.v213\Release\RtdSetupHelperW.pdb
LocalAlloc
FormatMessageA
lstrlenA
CreateFileW
SetStdHandle
WriteConsoleW
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
SetFilePointer
HeapSize
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetStringTypeW
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
InterlockedDecrement
GetBinaryTypeA
GetCurrentProcess
ExpandEnvironmentStringsA
GetCommandLineA
OpenProcess
GetConsoleWindow
CreateProcessA
CopyFileA
CloseHandle
FreeLibrary
GetProcAddress
LoadLibraryA
IsWow64Process
CreateFileA
GetLocaleInfoA
InterlockedIncrement
GetTickCount
WriteFile
InitializeCriticalSection
WideCharToMultiByte
LoadLibraryW
Sleep
LeaveCriticalSection
GetFileAttributesA
ReadFile
GetModuleFileNameW
CreateDirectoryA
InterlockedExchange
FindFirstFileA
GetLastError
SetLastError
lstrcmpiA
EnterCriticalSection
FindClose
GetModuleFileNameA
FindNextFileA
DeleteCriticalSection
GetCurrentThreadId
OutputDebugStringA
GetCurrentProcessId
GetTempPathA
LocalFree
DeleteFileA
MultiByteToWideChar
EncodePointer
DecodePointer
HeapFree
GetModuleHandleW
ExitProcess
HeapSetInformation
GetStartupInfoW
HeapAlloc
HeapReAlloc
GetSystemTimeAsFileTime
RaiseException
GetCPInfo
RtlUnwind
LCMapStringW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
IsProcessorFeaturePresent
HeapCreate
GetStdHandle
GetLocaleInfoW
InitializeCriticalSectionAndSpinCount
CoUninitialize
CoInitialize
PathCanonicalizeA
PathFindFileNameA
PathCombineA
EnumProcessModules
GetModuleBaseNameA
EnumProcesses
EnumWindows
wsprintfA
GetClassNameA
GetWindowTextA
SendMessageA
ControlService
RegOpenKeyExA
RegCloseKey
OpenProcessToken
RegEnumValueA
RegDeleteValueA
RegCreateKeyExA
RegEnumKeyExA
RegDeleteKeyA
RegSetValueExA
RegQueryValueExA
OpenSCManagerA
QueryServiceStatus
StartServiceA
CreateServiceA
DeleteService
CloseServiceHandle
OpenServiceA
GetTokenInformation
ShellExecuteA
SHGetFolderPathA
VariantClear
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ