Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-20_ba856cf6955ca4cd0bf558fc389f3fc9_mafia.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-02-20_ba856cf6955ca4cd0bf558fc389f3fc9_mafia.exe
Resource
win10v2004-20231215-en
Target
2024-02-20_ba856cf6955ca4cd0bf558fc389f3fc9_mafia
Size
882KB
MD5
ba856cf6955ca4cd0bf558fc389f3fc9
SHA1
d91f0d295a6429a640f8a8047ad2284709273eed
SHA256
185f2fab05665fb71e72cee374672eb6b2c47c0a8d27164bd1d607ddb8a4e268
SHA512
4aa00a53e4c1e64e244c9523174074d28f427c3ccb36261b655ff03905f962ce629a5d40a0fd1b0820d85a53a37afa58738f651cb704a2cd76e3d4ac6bc1c2e8
SSDEEP
12288:OKghkarNotnS6fIPFlDSUwZOxfcdly/tPE5vZxzn0bxxfjBSE1ocj+pR:EhNHDcDdly/NE5HzAxrBSjca3
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SHGetFolderPathW
PathIsRelativeW
PathIsUNCW
PathIsURLW
StrToIntW
PathCombineW
UrlCombineW
PathIsDirectoryW
PathIsDirectoryEmptyW
PathFileExistsW
PathCanonicalizeW
PathFindFileNameW
InternetCrackUrlW
HttpQueryInfoW
InternetCloseHandle
InternetConnectW
HttpSendRequestW
HttpOpenRequestW
InternetSetOptionW
InternetOpenW
InternetReadFile
InternetErrorDlg
ord96
ord281
ord141
ord171
ord115
ord94
ord8
ord34
ord145
ord70
ord90
ord246
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
SelectObject
GetTextMetricsW
DeleteDC
CreateDCW
GetObjectW
DeleteObject
CreateSolidBrush
SetBkColor
SetTextColor
GetDeviceCaps
CreateFontIndirectW
GetTextExtentPoint32W
GetStockObject
GetProcessImageFileNameW
EnumProcesses
GetWindowTextLengthW
CheckDlgButton
GetSystemMenu
EnableMenuItem
EnableWindow
IsWindow
FillRect
DestroyIcon
DrawTextW
EndPaint
DrawIcon
DrawIconEx
BeginPaint
GetIconInfo
MessageBeep
MessageBoxW
GetLastActivePopup
GetActiveWindow
SetRect
SetCursor
SetCapture
InvalidateRect
ReleaseCapture
GetClientRect
DrawFocusRect
RemovePropW
CallWindowProcW
GetPropW
SetPropW
GetParent
IsWindowVisible
ShutdownBlockReasonCreate
SetDlgItemTextW
EndDialog
GetSysColor
SendMessageW
LoadImageW
GetWindowTextW
ShutdownBlockReasonDestroy
DialogBoxParamW
UpdateWindow
ShowWindow
ScreenToClient
GetDlgItem
IsDialogMessageW
MoveWindow
SendDlgItemMessageW
SystemParametersInfoW
GetWindowRect
CreateDialogParamW
LoadCursorW
GetClassNameW
DispatchMessageW
TranslateMessage
TranslateAcceleratorW
GetMessageW
LoadAcceleratorsW
ReleaseDC
GetDC
EnumWindows
LoadStringW
WaitForInputIdle
GetSystemMetrics
PostMessageW
DefWindowProcW
GetWindowLongW
SetWindowLongW
CreateWindowExW
RegisterClassExW
DestroyWindow
SendNotifyMessageW
KillTimer
SetTimer
WaitMessage
SetFocus
SetWindowPos
SetForegroundWindow
WinHelpW
RedrawWindow
GetDialogBaseUnits
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
GetAsyncKeyState
GetWindow
CreateDialogIndirectParamW
PostQuitMessage
PeekMessageW
SetWindowTextW
CoUninitialize
CoSetProxyBlanket
CoCreateInstance
CoInitializeEx
SafeArrayLock
SafeArrayUnlock
SafeArrayRedim
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayDestroy
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayCreate
SysAllocStringLen
SysStringLen
VariantInit
VariantClear
SysAllocString
SysFreeString
RtlUnwind
GetCPInfo
GetStartupInfoW
HeapSetInformation
DecodePointer
EncodePointer
GetStringTypeW
InterlockedIncrement
InterlockedCompareExchange
LCMapStringW
SetUnhandledExceptionFilter
ExitProcess
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
HeapCreate
QueryPerformanceCounter
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
GetACP
GetOEMCP
IsValidCodePage
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
WriteConsoleW
SetStdHandle
InterlockedExchangeAdd
RaiseException
HeapSize
HeapReAlloc
HeapDestroy
lstrlenA
LocalUnlock
LocalLock
GlobalUnlock
GlobalLock
VirtualFree
VirtualAlloc
MulDiv
ConnectNamedPipe
SetNamedPipeHandleState
WaitNamedPipeW
CreateNamedPipeW
GetCurrentThread
InitializeCriticalSectionAndSpinCount
GetCurrentThreadId
ReleaseMutex
SetFilePointer
lstrcpyW
DeleteAtom
CompareStringW
LoadLibraryA
GetModuleHandleW
LoadLibraryW
GetSystemDirectoryW
LocalAlloc
GetCurrentProcess
GetVersionExW
GetSystemTime
SetProcessShutdownParameters
GetUserDefaultLCID
GetCommandLineW
QueueUserWorkItem
WideCharToMultiByte
FreeLibrary
GetProcAddress
SearchPathW
WriteFile
ReadFile
GetFileSize
CreateFileW
GetLocalTime
MultiByteToWideChar
RemoveDirectoryW
FindNextFileW
FindClose
FindFirstFileW
SetLastError
CreateDirectoryW
GetFileAttributesW
HeapFree
GetProcessHeap
HeapAlloc
InterlockedDecrement
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
lstrcmpiW
OpenProcess
ProcessIdToSessionId
GlobalDeleteAtom
GlobalAddAtomW
GlobalFindAtomW
lstrlenW
CallNamedPipeW
GetSystemWow64DirectoryW
GetCurrentProcessId
GlobalAlloc
GetLastError
Sleep
GlobalFree
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
SetEndOfFile
WaitForSingleObject
CloseHandle
FormatMessageW
LocalFree
CreateThread
GetTickCount
WaitForMultipleObjects
TerminateThread
CreateEventW
GetModuleFileNameW
SetEvent
InterlockedExchange
CopyFileExW
DeleteFileW
MoveFileW
SetFileAttributesW
GetLocaleInfoW
GetFullPathNameW
CreateProcessW
GetExitCodeProcess
CloseServiceHandle
RegCloseKey
RegOpenKeyExW
RegCreateKeyExW
RegQueryValueExW
RegSetValueExW
RegDeleteValueW
RegEnumKeyExW
RegEnumValueW
RegQueryInfoKeyW
InitializeAcl
CreateWellKnownSid
AbortSystemShutdownW
OpenProcessToken
GetTokenInformation
GetSidSubAuthority
DuplicateToken
CheckTokenMembership
GetLengthSid
CopySid
FreeSid
ConvertStringSidToSidW
SetEntriesInAclW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
OpenThreadToken
ConvertStringSecurityDescriptorToSecurityDescriptorW
AllocateAndInitializeSid
AddAccessAllowedAce
OpenSCManagerW
CreateServiceW
ChangeServiceConfig2W
SetNamedSecurityInfoW
OpenServiceW
ControlService
QueryServiceStatus
DeleteService
StartServiceW
ShellExecuteW
ShellExecuteExW
ObtainUserAgentString
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ