Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-04_a4fa7638df1764affa998e91d65fa786_karagany_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-04_a4fa7638df1764affa998e91d65fa786_karagany_mafia.exe
Resource
win10v2004-20231222-en
Target
2024-02-04_a4fa7638df1764affa998e91d65fa786_karagany_mafia
Size
428KB
MD5
a4fa7638df1764affa998e91d65fa786
SHA1
6822279d46b02c9b10c8a1fbb1ce0b3f9509f3e4
SHA256
6d662c7d03513196c1024eec22e31ff9c70b2001eb1c0f1e1567c25e34486a47
SHA512
aca90fcf329443e0dce9bc1ae82295f343d982e287f1c2bb537b5e4ae21af646f27a7f1a3777b2dcd36d6afa81b55fef838ed7c9dbadc098a585cf119768fb30
SSDEEP
3072:vaiQO1NvXvHuHfRSUh5lqCEkkafV3n/aQ8IfgWskbLYoawBphqdxX3oiTO8vgtNx:vap2NvXfu/UUV3EbADDBCdxX4kO8YtNx
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\Users\Administrator\Desktop\大灰狼\Release\Payload.pdb
VirtualFree
GetProcessHeap
IsBadReadPtr
SetLastError
GetProcAddress
VirtualAlloc
LoadLibraryA
VirtualProtect
ExitProcess
HeapFree
CreateDirectoryW
GetConsoleTitleA
GetFileAttributesW
GetModuleFileNameW
CopyFileA
GetModuleFileNameA
SetEndOfFile
CreateFileW
CreateFileA
HeapAlloc
FreeLibrary
GetCurrentProcess
WriteConsoleW
SetStdHandle
LoadLibraryW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetLocaleInfoW
GetUserDefaultLCID
GetStringTypeW
MultiByteToWideChar
LCMapStringW
GetLastError
WideCharToMultiByte
HeapReAlloc
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
GetCommandLineA
HeapSetInformation
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
GetCurrentThreadId
HeapCreate
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
DeleteCriticalSection
IsProcessorFeaturePresent
Sleep
WriteFile
ReadFile
SetFilePointer
GetConsoleCP
GetConsoleMode
FlushFileBuffers
HeapSize
RtlUnwind
CloseHandle
RaiseException
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeCriticalSection
FindWindowA
ShowWindow
GetTokenInformation
OpenProcessToken
ConvertSidToStringSidW
SHGetSpecialFolderPathA
ShellExecuteA
NdrClientCall2
NdrServerCall2
RpcBindingSetAuthInfoExA
RpcStringFreeW
RpcStringBindingComposeW
RpcBindingFromStringBindingW
PathFindFileNameW
PathRemoveExtensionW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ