Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-07_bbada727ba7012c1a48809a65cd35504_mafia.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-03-07_bbada727ba7012c1a48809a65cd35504_mafia.exe
Resource
win10v2004-20240226-en
Target
2024-03-07_bbada727ba7012c1a48809a65cd35504_mafia
Size
1.4MB
MD5
bbada727ba7012c1a48809a65cd35504
SHA1
8bd57b484ffc7ff2811c33dfa5a2f20b25060418
SHA256
3e78b950dc8bcc09604edb9129f7d20c3d4ccf4f0f21af91106069f818b25941
SHA512
0f31d3c5ae21850416ebeba54f7b5de19e36af2177dd8833c99fecb05c17f5fffa8788b37a616fccb0f89a9748eead12774723f531e8d0b552a2ec8b198ef295
SSDEEP
24576:EDgzAIQbAoueNO0OFys9jiOQsmSROR+0QuTg:ED61yNjAr9+OESIR+0y
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\rc_v11_professional_20181130\Build\Release\WPSOffice\office6\KUninstall.pdb
FlushInstructionCache
GetCurrentThreadId
GetVersion
SetLastError
FreeResource
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GetPrivateProfileIntW
WritePrivateProfileStringW
SetCurrentDirectoryW
GetCurrentThread
InterlockedDecrement
GetModuleHandleA
Process32NextW
Process32FirstW
GetCurrentProcessId
CreateToolhelp32Snapshot
ReadProcessMemory
GetModuleFileNameW
GetLongPathNameW
QueryDosDeviceW
ProcessIdToSessionId
FileTimeToSystemTime
FileTimeToLocalFileTime
CreateThread
GetLocalTime
IsWow64Process
OutputDebugStringW
InitializeCriticalSectionAndSpinCount
MapViewOfFileEx
InterlockedIncrement
lstrcmpiW
TerminateThread
GetLocaleInfoW
GetUserDefaultUILanguage
ResumeThread
SetNamedPipeHandleState
WaitNamedPipeW
RaiseException
lstrcmpW
InterlockedPopEntrySList
InterlockedPushEntrySList
SetEnvironmentVariableA
CompareStringW
GetProcessHeap
OpenProcess
FlushFileBuffers
SetStdHandle
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
InterlockedExchange
GetStringTypeW
GetConsoleMode
GetConsoleCP
HeapSize
LCMapStringW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
HeapDestroy
HeapCreate
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetUnhandledExceptionFilter
GetTimeZoneInformation
ExitProcess
GetSystemTimeAsFileTime
HeapReAlloc
RtlUnwind
EncodePointer
DecodePointer
ExitThread
HeapFree
HeapAlloc
GetStartupInfoW
HeapSetInformation
GetCommandLineW
WaitNamedPipeA
SetCommTimeouts
CreateFileA
DeviceIoControl
LoadLibraryA
InterlockedCompareExchange
TerminateProcess
GetFileAttributesExW
LoadLibraryW
ExpandEnvironmentStringsW
Sleep
GetExitCodeProcess
LocalFree
CreateProcessW
CreateMutexW
OpenMutexW
QueryPerformanceCounter
LoadLibraryExW
FreeLibrary
GetPrivateProfileStringW
GetCurrentProcess
lstrlenA
GetModuleHandleW
GetProcAddress
GetSystemInfo
GetTempFileNameW
GetTempPathW
GetCurrentDirectoryW
GetWindowsDirectoryW
MoveFileW
RemoveDirectoryW
SetFileAttributesW
WideCharToMultiByte
MultiByteToWideChar
WaitForMultipleObjects
GetStdHandle
ReadFile
CreateDirectoryW
GetTickCount
DeleteFileW
MoveFileExW
VirtualAlloc
CopyFileW
GetSystemDirectoryW
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
WriteFile
SetFilePointerEx
SetEndOfFile
SetFilePointer
GetFileSize
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
lstrlenW
FindNextFileW
GetFileAttributesW
FindFirstFileW
FindClose
CreateFileW
InitializeCriticalSection
ReleaseSemaphore
CreateSemaphoreW
ResetEvent
SetEvent
CreateEventW
WaitForSingleObject
CloseHandle
GetLastError
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetVersionExW
VirtualFree
WriteConsoleW
PostMessageW
GetWindowTextW
SetWindowTextW
IsWindowVisible
CharNextW
SetTimer
LoadBitmapW
LoadIconW
GetWindowDC
RemoveMenu
ReleaseCapture
EndPaint
BeginPaint
GetDC
ReleaseDC
GetNextDlgTabItem
SetFocus
KillTimer
CallNextHookEx
GetKeyNameTextW
SetWindowsHookExW
GetSystemMetrics
SetCursor
FindWindowW
DrawIconEx
EqualRect
DestroyIcon
DrawTextW
OffsetRect
ClientToScreen
IsWindowEnabled
SetWindowRgn
LoadImageW
UpdateLayeredWindow
DrawFrameControl
CharUpperW
CharLowerW
GetDlgCtrlID
InflateRect
PostQuitMessage
UnregisterClassA
wsprintfW
MessageBoxW
SendMessageW
CopyRect
SetRect
SetRectEmpty
SetWindowLongW
CreateWindowExW
DestroyWindow
GetWindowLongW
GetSystemMenu
MoveWindow
SetWindowPos
GetWindowRect
GetClientRect
InvalidateRect
IsChild
IsWindow
MapWindowPoints
GetMonitorInfoW
MonitorFromWindow
GetWindow
GetParent
CallWindowProcW
GetClassInfoExW
LoadCursorW
GetDlgItem
PostThreadMessageW
DefWindowProcW
IsDialogMessageW
GetFocus
ShowWindow
DispatchMessageW
TranslateMessage
GetMessageW
PeekMessageW
RegisterClassExW
SetCapture
GetActiveWindow
GetDesktopWindow
GetScrollPos
WindowFromPoint
EnableWindow
GetForegroundWindow
GetWindowThreadProcessId
SystemParametersInfoW
AttachThreadInput
SetForegroundWindow
SetActiveWindow
GetKeyState
PtInRect
CreateFontIndirectW
CombineRgn
DeleteObject
CreateRectRgnIndirect
SelectObject
SetBkColor
SetBkMode
SetTextColor
ExtTextOutW
DeleteDC
SelectClipRgn
RoundRect
CreatePen
GetClipRgn
GetObjectW
LineTo
SaveDC
RestoreDC
TextOutW
GetTextExtentPoint32W
CreateRoundRectRgn
BitBlt
CreateDIBSection
StretchBlt
CreateBitmap
CreateCompatibleBitmap
Rectangle
CreateSolidBrush
SetStretchBltMode
GetStockObject
MoveToEx
CreateCompatibleDC
CreateRectRgn
CreateFontW
RectInRegion
ord680
SHGetSpecialFolderPathW
SHGetFolderPathW
CommandLineToArgvW
ShellExecuteW
ShellExecuteExW
CoSetProxyBlanket
CoCreateGuid
StringFromGUID2
CoInitializeEx
CoUninitialize
CoCreateInstance
CoTaskMemFree
CoInitialize
CreateStreamOnHGlobal
CoTaskMemAlloc
CoTaskMemRealloc
CoInitializeSecurity
VariantInit
VarUI4FromStr
SysAllocString
SysFreeString
VariantClear
VariantCopy
RegOpenKeyExW
RegDeleteKeyW
RegCloseKey
RegQueryValueExW
RegSetValueExW
ImpersonateLoggedOnUser
OpenProcessToken
RevertToSelf
RegEnumKeyExW
RegCreateKeyExW
RegOpenKeyW
FreeSid
CloseServiceHandle
CheckTokenMembership
AllocateAndInitializeSid
RegDeleteValueW
QueryServiceStatus
OpenServiceW
OpenSCManagerW
RegEnumValueW
ControlService
RegEnumKeyExA
RegQueryValueExA
RegOpenCurrentUser
RegQueryInfoKeyW
RegEnumKeyW
GetSidLengthRequired
InitializeSid
GetSidSubAuthority
EqualSid
GetNamedSecurityInfoW
GetAclInformation
GetAce
GetTokenInformation
CopySid
IsValidSid
GetLengthSid
SetNamedSecurityInfoW
OpenThreadToken
InitializeAcl
RegOpenKeyExA
AddAce
RegUnLoadKeyW
RegLoadKeyW
LookupPrivilegeValueW
AdjustTokenPrivileges
PathAddBackslashW
ord176
SHGetValueW
StrToIntA
StrToIntW
PathFileExistsW
PathAppendW
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
GetModuleFileNameExW
EnumProcessModules
URLDownloadToFileW
GdipCreateBitmapFromFileICM
GdipCreateBitmapFromFile
GdiplusStartup
GdiplusShutdown
GdipCreateHBITMAPFromBitmap
GdipCreateBitmapFromStream
GdipCloneBrush
GdipDrawImageRectI
GdipFillRectangleI
GdipCreatePathGradientFromPath
GdipAddPathEllipseI
GdipCreateLineBrushI
GdipLoadImageFromFileICM
GdipLoadImageFromFile
GdipTranslatePathGradientTransform
GdipSetPathGradientCenterPointI
GdipSetPathGradientSurroundColorsWithCount
GdipGetPathGradientPointCount
GdipSetPathGradientCenterColor
GdipDeletePath
GdipCreatePath
GdipDeleteBrush
GdipDrawImageRectRectI
GdipCreateFromHDC
GdipGetImageHeight
GdipGetImageWidth
GdipDeleteGraphics
GdipCloneImage
GdipDisposeImage
GdipLoadImageFromStreamICM
GdipFree
GdipAlloc
GdipLoadImageFromStream
_TrackMouseEvent
InitCommonControlsEx
InternetCloseHandle
HttpQueryInfoW
HttpAddRequestHeadersW
HttpOpenRequestW
InternetConnectW
InternetSetOptionExW
InternetOpenW
InternetAttemptConnect
InternetCrackUrlW
InternetReadFile
HttpSendRequestW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE