Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-09_81fede5327d11865e66cfe8a306e429c_mafia.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-03-09_81fede5327d11865e66cfe8a306e429c_mafia.exe
Resource
win10v2004-20240226-en
Target
2024-03-09_81fede5327d11865e66cfe8a306e429c_mafia
Size
4.6MB
MD5
81fede5327d11865e66cfe8a306e429c
SHA1
a28164d4392a1900459a0e14b370142fcea4c141
SHA256
038512733c70ea2cdc14177fb3fe45a65f3e73351d1b402c6326a6f112d2302e
SHA512
71926a44bc71a2557d5f853dd30d2b8e3fd6e9a308744f8b9561601e9fdbd166e9930c19da92a6ebf31425785eac1975311370aa73e31976c8b6d1bf04b03e33
SSDEEP
98304:oB4uYGgn9HPCFVAlY4V0Bkne9v/oXjdOn/k:oth6pCFVuPaIeoXjS/k
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\iPumper\iPumper\Installer\Build\Release\TinyInstaller.pdb
NetApiBufferFree
NetUserGetLocalGroups
NetUserGetGroups
SymInitialize
SymFromAddr
SetFilePointer
QueryDosDeviceW
GetLogicalDriveStringsW
FindNextFileW
GetLastError
GetModuleFileNameW
GetTempPathW
GetTempFileNameW
LockResource
LoadResource
SizeofResource
FindResourceW
GetVersionExW
WaitForSingleObject
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
CreateEventW
OpenEventW
SetEvent
ResetEvent
CreateMutexW
OpenMutexW
CreateThread
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
OpenProcess
TerminateProcess
GetExitCodeProcess
CreateProcessW
GetCurrentProcessId
lstrcmpiA
lstrcmpA
WideCharToMultiByte
FlushFileBuffers
FindResourceExW
FlushInstructionCache
GetCurrentProcess
InterlockedDecrement
FreeLibrary
LoadLibraryExW
lstrcpynW
GetCurrentThreadId
SetLastError
GetModuleHandleW
InterlockedIncrement
LoadLibraryW
RemoveDirectoryW
GetProcAddress
OutputDebugStringW
Sleep
GetTickCount
ReadFile
InitializeCriticalSectionAndSpinCount
TerminateThread
lstrcmpiW
GetNativeSystemInfo
RtlCaptureStackBackTrace
GetConsoleMode
GetConsoleCP
SetStdHandle
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
LCMapStringW
FatalAppExitA
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStringTypeW
GetTimeZoneInformation
GetLocaleInfoW
GetStdHandle
ExitProcess
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentThread
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
HeapCreate
GetStartupInfoW
HeapSetInformation
GetSystemTimeAsFileTime
EncodePointer
DecodePointer
ExitThread
RtlUnwind
InterlockedPopEntrySList
VirtualAlloc
FindFirstFileW
FindClose
MoveFileExW
CopyFileW
LoadLibraryA
SetCurrentDirectoryW
CreateDirectoryW
CreateFileW
GetFileSize
GetFileAttributesW
WriteFile
CloseHandle
CompareFileTime
SystemTimeToFileTime
GetSystemTime
GetProcessHeap
HeapAlloc
lstrlenA
HeapFree
GetCommandLineW
LocalAlloc
FormatMessageW
LocalFree
lstrlenW
DeleteFileW
MultiByteToWideChar
RaiseException
SetConsoleCtrlHandler
InterlockedExchange
WriteConsoleW
SetEndOfFile
CompareStringW
VirtualFree
IsProcessorFeaturePresent
InterlockedPushEntrySList
InterlockedCompareExchange
HeapSize
HeapReAlloc
HeapDestroy
SetEnvironmentVariableA
GetSystemDirectoryW
PostMessageW
MoveWindow
GetWindowRect
GetWindowLongW
ScreenToClient
GetParent
SendMessageW
UnregisterClassA
wsprintfW
CharLowerBuffA
SetWindowLongW
DestroyWindow
PostQuitMessage
wvsprintfW
GetClientRect
DefWindowProcW
GetSystemMetrics
MessageBoxW
CharNextW
PeekMessageW
GetMessageW
TranslateMessage
DispatchMessageW
ShowWindow
GetDesktopWindow
LoadIconW
RegisterClassExW
IsWindow
SetCursorPos
CreateWindowExW
CallWindowProcW
SystemParametersInfoW
LoadStringW
LoadCursorW
GetClassInfoExW
GetWindow
MonitorFromWindow
GetMonitorInfoW
MapWindowPoints
SetWindowPos
CharLowerBuffW
AllocateAndInitializeSid
SetSecurityDescriptorDacl
GetCurrentHwProfileW
GetUserNameW
RegQueryInfoKeyW
RegDeleteValueW
OpenSCManagerW
OpenServiceW
QueryServiceConfigW
ChangeServiceConfigW
QueryServiceStatusEx
StartServiceW
CloseServiceHandle
RegCloseKey
RegEnumValueW
RegEnumKeyExW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegDeleteKeyW
RegCreateKeyExW
RegOpenCurrentUser
CryptAcquireContextW
CryptCreateHash
CryptHashData
CryptGetHashParam
CryptDestroyHash
CryptReleaseContext
SetEntriesInAclW
InitializeSecurityDescriptor
FreeSid
ShellExecuteExW
ShellExecuteW
SHFileOperationW
CommandLineToArgvW
SHGetFolderPathW
CoTaskMemRealloc
CoCreateInstance
CoInitialize
CoUninitialize
CoTaskMemAlloc
CoTaskMemFree
SysFreeString
VarBstrCat
SysStringLen
SysAllocStringLen
SysAllocString
VariantClear
VariantCopy
VariantInit
SysAllocStringByteLen
SysStringByteLen
VarUI4FromStr
StrStrIW
StrCmpW
StrToIntExW
StrToIntExA
StrCmpIW
InitCommonControlsEx
WinHttpOpen
WinHttpCloseHandle
WinHttpSetTimeouts
WinHttpCrackUrl
WinHttpConnect
WinHttpOpenRequest
WinHttpReadData
WinHttpQueryDataAvailable
WinHttpReceiveResponse
WinHttpQueryHeaders
WinHttpSendRequest
WinHttpSetOption
GetUserNameExW
UuidCreate
UuidCreateSequential
UuidEqual
UuidToStringW
RpcStringFreeW
GetProcessImageFileNameW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ