Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-10_779617125b6e84042d3ecf71ade4eede_floxif_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-10_779617125b6e84042d3ecf71ade4eede_floxif_mafia.exe
Resource
win10v2004-20240226-en
Target
2024-03-10_779617125b6e84042d3ecf71ade4eede_floxif_mafia
Size
659KB
MD5
779617125b6e84042d3ecf71ade4eede
SHA1
c4eec7ba5c8ef9c2e592a182ba4ee42715638447
SHA256
46476d2fd2f12680b5cedc73f8885266f9c5bfb7da9771921380a051d64b71ba
SHA512
def76d7a393debcbcd6b1edd4f6256d2ed278706d65fadc5bd0529fb0ad75874f21418ee1b17c362dd09cc02a8d8f0bafec178a8a3ed6df30e4177fff79c6c80
SSDEEP
12288:rdouVLpyqZtrh+acjbzEFXiuHS9db0ZVT5mTsazhjMsafnIXwWYJNBjvrEH7V:rJLpyqZLMjMRi57eF0TXzhIjPIXwWEDo
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IIDFromString
StringFromGUID2
CLSIDFromString
CoTaskMemAlloc
CoTaskMemFree
CoInitialize
CoTaskMemRealloc
CoUninitialize
CoCreateInstance
SHGetFolderPathW
SHGetFolderPathA
ShellExecuteA
Shell_NotifyIconA
InternetCrackUrlA
InternetTimeFromSystemTime
InternetCloseHandle
HttpQueryInfoA
InternetTimeToSystemTime
InternetReadFile
HttpOpenRequestA
InternetErrorDlg
HttpSendRequestA
InternetOpenA
InternetConnectA
CharNextA
LoadStringW
GetDesktopWindow
wsprintfA
DispatchMessageW
RegisterClassA
LoadImageA
GetSystemMetrics
DispatchMessageA
PostMessageA
AppendMenuA
CreatePopupMenu
ShowWindow
MsgWaitForMultipleObjectsEx
GetCursorPos
DefWindowProcA
IsWindowUnicode
PeekMessageA
CreateWindowExA
GetWindowLongA
SetWindowLongA
MessageBoxA
DestroyWindow
GetMessageA
GetMessageW
PostQuitMessage
TrackPopupMenu
SetForegroundWindow
LoadStringA
TranslateMessage
GetFileVersionInfoA
VerQueryValueW
GetFileVersionInfoSizeA
GetCPInfo
LCMapStringW
RtlUnwind
HeapReAlloc
SetStdHandle
FindFirstFileExW
GetDriveTypeW
FileTimeToLocalFileTime
GetFullPathNameW
CreateDirectoryW
GetConsoleMode
GetConsoleCP
GetFileType
GetStartupInfoW
HeapSetInformation
GetSystemTimeAsFileTime
VirtualQuery
GetSystemInfo
GetModuleHandleW
VirtualAlloc
VirtualProtect
HeapAlloc
HeapFree
DecodePointer
EncodePointer
GetStringTypeW
InterlockedExchange
InterlockedCompareExchange
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
GetTimeZoneInformation
HeapCreate
FindResourceA
lstrcmpA
lstrlenA
FreeLibrary
LoadResource
SystemTimeToTzSpecificLocalTime
InterlockedIncrement
InterlockedDecrement
WaitForSingleObject
GetCommandLineA
WideCharToMultiByte
InitializeCriticalSectionAndSpinCount
SizeofResource
CreateEventA
IsDBCSLeadByte
lstrcatA
MultiByteToWideChar
lstrlenW
RaiseException
GetLastError
lstrcmpiA
GetProcAddress
WaitForMultipleObjects
GetModuleFileNameA
GetStdHandle
LoadLibraryExA
CreateMutexA
DeleteCriticalSection
CloseHandle
SetEvent
ResetEvent
CreateThread
lstrcpyA
lstrcpynA
CreateFileA
WriteFile
Sleep
ReadFile
OpenEventA
GetCurrentProcess
GetTickCount
GetVersionExA
GetCurrentProcessId
GetTempPathA
LocalFree
DeleteFileA
FileTimeToSystemTime
ExitProcess
GetLocaleInfoA
OpenProcess
SetDllDirectoryA
TerminateProcess
GetSystemDirectoryA
FindClose
LoadLibraryA
LockResource
FormatMessageW
GetLocalTime
GetCurrentThreadId
PeekNamedPipe
SetHandleInformation
GetExitCodeProcess
CreateProcessA
CreatePipe
GetNativeSystemInfo
GetSystemDefaultUILanguage
GetThreadLocale
GetUserDefaultUILanguage
GetFileAttributesA
GetModuleFileNameW
LoadLibraryExW
GetModuleHandleExA
GetModuleHandleExW
LoadLibraryW
CreateFileW
SetFilePointerEx
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapSize
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetLocaleInfoW
SetHandleCount
SetFilePointer
FlushFileBuffers
GetACP
GetOEMCP
IsValidCodePage
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
SetEndOfFile
GetProcessHeap
WriteConsoleW
GetCurrentDirectoryW
GetFileInformationByHandle
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
CompareStringW
SetEnvironmentVariableA
GetModuleHandleA
CreateWellKnownSid
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegSetValueExA
ConvertSidToStringSidW
GetWindowsAccountDomainSid
CopySid
GetTokenInformation
OpenProcessToken
RegEnumKeyA
CryptHashData
CryptDestroyHash
CryptCreateHash
CryptAcquireContextA
CryptReleaseContext
RegQueryValueExA
CryptGetHashParam
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegCloseKey
RegNotifyChangeKeyValue
RegDeleteValueA
RegOpenKeyExA
RegCreateKeyExA
RegEnumKeyExA
RegDeleteKeyA
RegQueryInfoKeyW
VarUI4FromStr
SysFreeString
GetErrorInfo
GetStockObject
CryptStringToBinaryA
CryptUnprotectData
CryptProtectData
CryptBinaryToStringA
ord189
ord91
ord117
ord141
ord168
ord67
ord160
ord158
ord115
ord159
ord8
ord44
ord31
ord204
ord137
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ