Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-04_6a23df68d5d7a43058c466b40b5f1ba1_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-04_6a23df68d5d7a43058c466b40b5f1ba1_mafia.exe
Resource
win10v2004-20231215-en
Target
2024-02-04_6a23df68d5d7a43058c466b40b5f1ba1_mafia
Size
321KB
MD5
6a23df68d5d7a43058c466b40b5f1ba1
SHA1
2fe80501f156515f813ffb7dc095c3643a23aa4b
SHA256
8ddb5401d5bd0198914f4620af009fa8cbc25d811a6d94092655f7ce5ffc8f33
SHA512
68deed2b8b56565575be65c689c4d7633368c254cc854d73afeb8dafdd2738fcd5fb130072c56e675e07db49c4f15bd11604fab862469950a7ae7b9c4ee40d16
SSDEEP
6144:06xOq5eANqR9/IJUiePVr0IUOsKZ7XwmmgLwmUkOAbQl8n:06T514R9/7ie9wBOV9Xv0mtQl8n
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CloseHandle
SetFilePointer
ReadFile
WriteFile
CreateDirectoryW
SetCurrentDirectoryW
CopyFileW
DeleteFileW
MoveFileExW
FindFirstFileW
FindClose
FindNextFileW
GetLogicalDriveStringsW
QueryDosDeviceW
GetLastError
GetModuleFileNameW
GetTempPathW
GetTempFileNameW
FindResourceW
SizeofResource
LoadResource
LockResource
GetVersionExW
WaitForSingleObject
CreateEventW
OpenEventW
SetEvent
GetFileSize
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
CreateMutexW
OpenMutexW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
CreateThread
OpenProcess
TerminateProcess
GetExitCodeProcess
CreateProcessW
GetCurrentProcessId
WideCharToMultiByte
lstrcmpA
lstrcmpiA
HeapDestroy
HeapReAlloc
HeapSize
CompareStringW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
CreateFileW
GetFileAttributesW
CompareFileTime
SystemTimeToFileTime
GetSystemTime
HeapFree
MultiByteToWideChar
lstrlenA
GetProcessHeap
HeapAlloc
GetCommandLineW
lstrlenW
LocalFree
ResetEvent
FormatMessageW
LCMapStringW
GetStringTypeW
RtlUnwind
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
SetEnvironmentVariableA
LoadLibraryW
InterlockedExchange
FreeLibrary
SetConsoleCtrlHandler
FatalAppExitA
GetLocaleInfoW
Sleep
GetTimeZoneInformation
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
GetCurrentProcess
GetTickCount
QueryPerformanceCounter
HeapCreate
GetCurrentThread
InterlockedDecrement
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetFileType
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStdHandle
ExitProcess
GetModuleHandleW
GetProcAddress
SetUnhandledExceptionFilter
RaiseException
EncodePointer
DecodePointer
GetCurrentThreadId
ExitThread
HeapSetInformation
GetStartupInfoW
GetSystemTimeAsFileTime
CharLowerBuffW
CharLowerBuffA
wsprintfW
wvsprintfW
RegQueryValueExW
RegOpenKeyExW
RegEnumValueW
RegEnumKeyExW
RegDeleteKeyW
RegCreateKeyExW
RegOpenCurrentUser
CryptReleaseContext
CryptDestroyHash
CryptGetHashParam
CryptHashData
CryptCreateHash
CryptAcquireContextW
RegSetValueExW
CoUninitialize
CoInitialize
CoCreateInstance
SHGetFolderPathW
SHFileOperationW
CommandLineToArgvW
ShellExecuteExW
ShellExecuteW
SysAllocStringByteLen
SysAllocStringLen
SysStringLen
SysFreeString
VariantClear
VariantCopy
VariantInit
SysAllocString
SysStringByteLen
StrToIntExW
StrCmpIW
StrCmpW
StrToIntExA
PathFileExistsW
StrStrIW
WinHttpReceiveResponse
WinHttpQueryDataAvailable
WinHttpCrackUrl
WinHttpSendRequest
WinHttpCloseHandle
WinHttpQueryHeaders
WinHttpOpenRequest
WinHttpConnect
WinHttpSetTimeouts
WinHttpSetOption
WinHttpOpen
WinHttpReadData
UuidCreate
UuidEqual
UuidToStringW
RpcStringFreeW
UuidCreateSequential
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ