Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-22_0a0d3184db821cb3f3a35e8dc68ca3d7_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-22_0a0d3184db821cb3f3a35e8dc68ca3d7_mafia.exe
Resource
win10v2004-20240221-en
Target
2024-02-22_0a0d3184db821cb3f3a35e8dc68ca3d7_mafia
Size
3.3MB
MD5
0a0d3184db821cb3f3a35e8dc68ca3d7
SHA1
728654efd0373009d456c80b81052dd8bb36eba8
SHA256
5ba19e019d010ae85c6cdc9176ac4a7a2f14b8ddd236979b14ac777924630680
SHA512
e3b5efa055effb7325afacbd509a287033ebe12b8995686b69078ccd86448b4f33eeabdf736a8b5f7679acd98983bcd407229dc558bc782761c20513bceae7ca
SSDEEP
98304:uIslyXfoYohWeYbpLX8qBc19GflCFeKbDAbDq:TffdVMhwq
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\Users\build\jenkins\workspace\agent-win-54\bld\src\agent\bin\Win32\Release\KDeploy.pdb
WTSQuerySessionInformationA
WTSEnumerateSessionsA
WTSFreeMemory
WTSQuerySessionInformationW
NetUserGetInfo
NetGetDCName
WNetAddConnection2A
WNetCancelConnection2A
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
listen
accept
gethostbyname
select
__WSAFDIsSet
WSASetLastError
gethostname
recvfrom
sendto
send
connect
WSAGetLastError
htons
ntohs
getsockname
setsockopt
recv
bind
socket
getsockopt
closesocket
WSAStartup
WSACleanup
ioctlsocket
shutdown
CreateEnvironmentBlock
LoadUserProfileA
UnloadUserProfile
DestroyEnvironmentBlock
WaitForSingleObject
SetEvent
TerminateThread
CreateEventA
SetLastError
GetExitCodeThread
WaitForMultipleObjects
DuplicateHandle
CloseHandle
GetTickCount
FormatMessageA
FreeLibrary
GetProcAddress
LoadLibraryA
QueryPerformanceCounter
GetVersion
GetCurrentProcessId
GlobalMemoryStatus
GetVersionExA
GetCurrentThreadId
GetFileType
GetStdHandle
FlushConsoleInputBuffer
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
LocalFree
LocalAlloc
lstrlenA
ExpandEnvironmentStringsW
GetModuleFileNameA
GetFileAttributesA
GetTempFileNameA
GetTempPathA
GetExitCodeProcess
SetEnvironmentVariableA
CreatePipe
ReadFile
PeekNamedPipe
HeapFree
HeapAlloc
GetProcessHeap
OpenProcess
ProcessIdToSessionId
Process32Next
MultiByteToWideChar
TerminateProcess
Process32First
CreateToolhelp32Snapshot
SetCurrentDirectoryA
SearchPathA
CreateFileA
GlobalUnlock
GlobalFree
GlobalLock
GlobalAlloc
FileTimeToDosDateTime
FileTimeToLocalFileTime
GetCurrentProcess
GetComputerNameA
GetConsoleTitleA
SetConsoleTitleA
SetConsoleCtrlHandler
WriteFile
ReadConsoleA
WaitNamedPipeA
CopyFileA
WriteConsoleInputA
FindFirstFileW
FindNextFileW
CreateProcessW
CreateDirectoryW
CopyFileW
GetEnvironmentVariableW
lstrcpyA
SetFilePointer
CreateFileW
ConnectNamedPipe
CreateNamedPipeA
GetCurrentDirectoryA
GetFullPathNameA
DosDateTimeToFileTime
SetVolumeLabelA
GetLocaleInfoA
SetEndOfFile
SystemTimeToFileTime
SetFileTime
GetDriveTypeA
GetVolumeInformationA
FileTimeToSystemTime
SetFileAttributesA
GetLocalTime
GetFileTime
LocalFileTimeToFileTime
lstrcpynA
InterlockedExchange
lstrcmpiA
SetUnhandledExceptionFilter
LoadLibraryW
CreateSemaphoreW
ReleaseSemaphore
SetEnvironmentVariableW
ReadConsoleInputA
ExitThread
GetFileInformationByHandle
HeapSetInformation
GetCommandLineA
GetSystemTimeAsFileTime
ExitProcess
GetModuleHandleW
FindFirstFileExA
HeapReAlloc
DecodePointer
EncodePointer
InterlockedDecrement
InterlockedIncrement
SleepEx
GetModuleHandleA
FindNextFileA
FindClose
FindFirstFileA
GetSystemDirectoryA
ExpandEnvironmentStringsA
FindResourceA
ReleaseMutex
CreateMutexA
GetThreadLocale
CreateThread
Sleep
DeleteFileA
LockResource
SizeofResource
WideCharToMultiByte
LoadResource
FindResourceW
FindResourceExW
GetLastError
SetConsoleMode
GetConsoleMode
RaiseException
RtlUnwind
GetTimeFormatA
GetDateFormatA
MoveFileA
GetDriveTypeW
RemoveDirectoryA
ResumeThread
FindFirstFileExW
MoveFileW
GetFullPathNameW
HeapSize
GetCPInfo
SetStdHandle
InitializeCriticalSectionAndSpinCount
UnhandledExceptionFilter
IsDebuggerPresent
LCMapStringW
IsProcessorFeaturePresent
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetTimeZoneInformation
HeapCreate
HeapDestroy
SetHandleCount
GetStartupInfoW
GetModuleFileNameW
GetConsoleCP
FlushFileBuffers
GetCurrentDirectoryW
GetLocaleInfoW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
WriteConsoleW
CompareStringW
GetCommandLineW
OemToCharA
PostThreadMessageA
MapVirtualKeyA
OpenWindowStationA
SetProcessWindowStation
OpenDesktopA
CloseWindowStation
CloseDesktop
GetUserObjectSecurity
SetUserObjectSecurity
MessageBoxA
GetDesktopWindow
GetProcessWindowStation
GetUserObjectInformationW
CharToOemA
CreateDCA
CreateCompatibleDC
GetDeviceCaps
CreateCompatibleBitmap
SelectObject
GetObjectA
BitBlt
GetBitmapBits
DeleteObject
DeleteDC
GetSecurityDescriptorGroup
AdjustTokenPrivileges
IsValidSecurityDescriptor
GetSecurityDescriptorSacl
IsValidSid
GetSecurityDescriptorOwner
SetKernelObjectSecurity
GetSecurityDescriptorControl
GetKernelObjectSecurity
IsValidAcl
LookupAccountSidW
LookupAccountNameW
LogonUserW
CreateProcessWithLogonW
CreateProcessAsUserW
RegCreateKeyExW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
LogonUserA
OpenSCManagerA
OpenServiceA
CreateServiceA
CloseServiceHandle
StartServiceA
GetSidIdentifierAuthority
GetSidSubAuthorityCount
GetSidSubAuthority
AllocateAndInitializeSid
EqualSid
FreeSid
LookupPrivilegeValueA
AddAccessAllowedAce
InitializeSecurityDescriptor
GetSecurityDescriptorDacl
GetAclInformation
InitializeAcl
GetAce
AddAce
SetSecurityDescriptorDacl
GetLengthSid
CopySid
OpenProcessToken
DuplicateTokenEx
SetTokenInformation
GetNamedSecurityInfoA
SetEntriesInAclA
SetNamedSecurityInfoA
GetTokenInformation
ImpersonateLoggedOnUser
RevertToSelf
RegDeleteValueA
RegDeleteKeyA
RegCloseKey
GetUserNameA
RegQueryInfoKeyA
RegEnumKeyExA
RegEnumValueA
RegisterEventSourceA
ReportEventA
DeregisterEventSource
SHFileOperationA
SHGetMalloc
SHGetPathFromIDListW
SHGetSpecialFolderLocation
CommandLineToArgvW
StringFromGUID2
CoInitialize
CoCreateGuid
CoCreateInstance
GetAdaptersInfo
EnumProcesses
PathFindFileNameA
PathIsRootA
PathStripToRootA
PathIsURLA
PathUnquoteSpacesA
PathRemoveFileSpecA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ