Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-13_c265cc2fb2bdf34847a0a043892cea10_mafia.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-02-13_c265cc2fb2bdf34847a0a043892cea10_mafia.exe
Resource
win10v2004-20231222-en
Target
2024-02-13_c265cc2fb2bdf34847a0a043892cea10_mafia
Size
1.7MB
MD5
c265cc2fb2bdf34847a0a043892cea10
SHA1
e735c9a21c2960fe10fc9c14b0e37cc7d3a72bbf
SHA256
41a4cfd3fe0ecab118a6124e2d69b88f8a6b4d05374836677051710ce672428c
SHA512
47393aa883e6dffcb32deb2a2f4eb6d69df3c8407170bd6219ba3ac6c3ee2f3fcad14d1ebeafb1476501a94faaba8a0b414f4b6cfaed193790690bf66e3dd732
SSDEEP
49152:Wsff9JXZc8aJWNId4bmjqzmq+IQqDTMhBmHQC4TutJmhRZ7caojavS:TcPWNVDTM3sFt+2
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GdipSetStringFormatTrimming
GdipAlloc
GdipDeleteBrush
GdipSetSolidFillColor
GdipCreatePen1
GdipDeletePen
GdipCreateStringFormat
GdipDeleteStringFormat
GdipDeleteGraphics
GdipCreateFontFamilyFromName
GdipGetGenericFontFamilySansSerif
GdipCloneImage
GdipCloneBrush
GdipDrawString
GdipFillPieI
GdipFillRectangleI
GdipDrawEllipseI
GdipDrawArcI
GdipScaleWorldTransform
GdipGetImageGraphicsContext
GdipFree
GdipSetPenColor
GdipCreateSolidFill
GdipGetImageEncoders
GdipGetImageEncodersSize
GdipCreateBitmapFromScan0
GdipSaveImageToFile
GdipDisposeImage
GdipDeleteFont
GdipCreateFont
GdipDeleteFontFamily
RegQueryInfoKeyA
RegEnumKeyExA
RegEnumValueA
RegQueryValueExA
RegSetValueExA
RegCreateKeyExA
CryptAcquireContextW
CryptCreateHash
CryptHashData
CryptDestroyHash
CryptReleaseContext
CryptGetHashParam
RegDeleteValueW
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
StartServiceCtrlDispatcherW
DeregisterEventSource
RegisterServiceCtrlHandlerExW
OpenServiceW
QueryServiceStatusEx
ControlService
DeleteService
OpenSCManagerW
CreateServiceW
CloseServiceHandle
ChangeServiceConfig2W
StartServiceW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegCloseKey
RegCreateKeyExW
SetServiceStatus
NetUseAdd
NetUseDel
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
GetOEMCP
IsValidCodePage
VirtualQuery
SetStdHandle
GetFileInformationByHandle
PeekNamedPipe
GetCurrentDirectoryW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
WriteConsoleW
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
SetEndOfFile
GetDriveTypeW
RaiseException
GetStartupInfoW
HeapDestroy
HeapReAlloc
HeapSize
WideCharToMultiByte
CloseHandle
WriteFile
lstrlenW
CreateFileW
HeapAlloc
GetProcessHeap
MultiByteToWideChar
lstrlenA
HeapFree
lstrcpyW
SystemTimeToTzSpecificLocalTime
GetSystemTime
SetFilePointer
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
InterlockedExchange
GetLastError
ReadFile
CreateNamedPipeW
InterlockedDecrement
FileTimeToSystemTime
SystemTimeToFileTime
lstrcmpW
GetVolumeInformationA
WaitForSingleObject
SetEvent
FreeLibrary
RemoveDirectoryW
DeleteFileW
Sleep
CopyFileW
SetFileAttributesW
CreateDirectoryW
GetTempPathW
GetFileSize
LocalFree
FormatMessageW
GetModuleFileNameW
MoveFileW
CreateEventW
GetCurrentThreadId
GetLocalTime
FlushFileBuffers
OutputDebugStringW
DisconnectNamedPipe
ConnectNamedPipe
LoadLibraryW
SetErrorMode
LocalAlloc
CreateMutexW
ResetEvent
GetTickCount
GetCurrentProcess
GetCurrentProcessId
GetProcAddress
GetLocaleInfoA
GetSystemDefaultLCID
ReleaseMutex
FileTimeToLocalFileTime
FindClose
FindFirstFileA
GetFileAttributesA
SetFileAttributesA
CreateFileA
FindNextFileA
DeleteFileA
RemoveDirectoryA
CopyFileA
GetVersionExW
lstrcatW
ExitProcess
VirtualAlloc
VirtualFree
InterlockedIncrement
SetLastError
FindNextFileW
FindFirstFileW
MoveFileExW
TerminateProcess
OpenProcess
GetModuleHandleW
VerLanguageNameW
GetFullPathNameA
lstrcpyA
lstrcatA
SetFileTime
CompareFileTime
InterlockedCompareExchange
CreateDirectoryA
WriteConsoleA
GetStdHandle
FormatMessageA
GetSystemTimeAsFileTime
SetEnvironmentVariableA
GetComputerNameA
GetTimeZoneInformation
InitializeCriticalSectionAndSpinCount
ExpandEnvironmentStringsA
GetFileType
SetHandleCount
HeapCreate
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsProcessorFeaturePresent
CompareStringW
GetDateFormatA
GetTimeFormatA
LCMapStringW
HeapSetInformation
GetCommandLineW
GetConsoleMode
GetConsoleCP
FindFirstFileExA
GetDriveTypeA
LocalFileTimeToFileTime
GetCPInfo
CreateThread
ExitThread
RtlUnwind
GetLocaleInfoW
DecodePointer
EncodePointer
GetStringTypeW
SendMessageTimeoutW
GetWindowThreadProcessId
FindWindowW
InSendMessage
PostMessageW
PeekMessageW
DispatchMessageW
TranslateMessage
IsDialogMessageW
SetForegroundWindow
IsIconic
ShowWindow
MessageBoxW
wsprintfW
DestroyIcon
SHCreateDirectoryExW
ExtractIconExW
SHGetFolderPathW
SHFileOperationW
ord165
SHGetSpecialFolderPathW
CreateStreamOnHGlobal
CoInitializeSecurity
StringFromGUID2
CLSIDFromString
CoCreateInstance
OleRun
CoInitializeEx
CoInitialize
CoUninitialize
CoCreateGuid
GetErrorInfo
SystemTimeToVariantTime
VariantTimeToSystemTime
SysAllocString
SysStringLen
SysFreeString
VariantInit
VariantClear
VariantChangeType
SysAllocStringLen
StrStrW
SHCreateStreamOnFileW
getsockopt
recv
socket
getpeername
ioctlsocket
getsockname
recvfrom
sendto
shutdown
listen
bind
accept
WSACleanup
WSAStartup
ntohl
connect
select
htons
inet_addr
gethostbyname
closesocket
WSAGetLastError
ntohs
send
gethostbyaddr
setsockopt
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
EnumProcessModules
EnumProcesses
GetModuleBaseNameW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ