Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-15_96f0c51d2ab318e78d5c3b2b17e4568a_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-15_96f0c51d2ab318e78d5c3b2b17e4568a_mafia.exe
Resource
win10v2004-20231215-en
Target
2024-03-15_96f0c51d2ab318e78d5c3b2b17e4568a_mafia
Size
2.2MB
MD5
96f0c51d2ab318e78d5c3b2b17e4568a
SHA1
3c2600af46efe71c35fe93ed8905746de067b762
SHA256
5157190276bd1a364336bb4dbc9dd58f10531a4ee8f7ff983789b5e57b19a392
SHA512
3bc97a57df6e4d78dac4e31534122aff0427b4ffaddd180e43659392ea1b18aa1dae92f6783b59cfe4c34f19f95bd32606fed023154e454594c9d909ef17a17f
SSDEEP
49152:3Y8pcfW+gYhufuqvZtABGD0UiDYogf2HK3JfJ:3Y8pMfgYh7BGD0Uf7
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
\\psf\Home\reactor\ModelExe\Release\MFCChat.pdb
PlaySoundA
inet_ntoa
ntohs
gethostbyname
htonl
htons
WSAGetLastError
recv
WSACleanup
inet_addr
WSAStartup
send
WSAEventSelect
connect
ioctlsocket
socket
closesocket
shutdown
WSAEnumNetworkEvents
ntohl
StrDupA
StrCmpNA
ord17
InternetOpenUrlA
InternetCrackUrlW
InternetReadFile
HttpQueryInfoA
InternetCloseHandle
InternetSetOptionA
InternetOpenA
WinHttpCloseHandle
WinHttpReadData
WinHttpQueryDataAvailable
WinHttpReceiveResponse
WinHttpSendRequest
WinHttpSetTimeouts
WinHttpOpenRequest
WinHttpConnect
WinHttpOpen
PeekNamedPipe
GetFileInformationByHandle
GetFullPathNameA
SetHandleCount
HeapSize
GetTimeZoneInformation
GetModuleFileNameW
GetStdHandle
ExitProcess
HeapDestroy
HeapCreate
IsValidCodePage
MultiByteToWideChar
RaiseException
EnterCriticalSection
LeaveCriticalSection
GetLastError
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
WideCharToMultiByte
lstrlenW
GetProcAddress
GetModuleHandleA
InterlockedIncrement
InterlockedDecrement
lstrlenA
lstrcmpiA
IsDBCSLeadByte
FlushInstructionCache
GetCurrentProcess
lstrcmpA
MulDiv
GetModuleFileNameA
GlobalUnlock
GlobalLock
GlobalAlloc
GetCurrentThreadId
SetLastError
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
OutputDebugStringA
LocalFree
FormatMessageA
DeleteFileA
CreateDirectoryA
WaitForSingleObject
CloseHandle
CreateThread
TerminateThread
SetEvent
LocalAlloc
GetCurrentDirectoryW
GetCurrentProcessId
InitializeCriticalSection
FindClose
FindNextFileA
GetSystemTimeAsFileTime
FindFirstFileA
LoadLibraryA
GlobalFree
FreeResource
LockResource
FindResourceW
FindResourceExW
lstrcpynA
WaitForMultipleObjects
Sleep
OpenEventA
CopyFileA
FileTimeToSystemTime
VirtualQuery
GetSystemInfo
GetModuleHandleW
VirtualAlloc
VirtualProtect
HeapAlloc
HeapFree
RtlUnwind
GetStringTypeW
GetLocaleInfoW
DecodePointer
EncodePointer
InterlockedExchange
InterlockedCompareExchange
GetFileType
CreateFileA
HeapReAlloc
WriteFile
GetConsoleCP
GetConsoleMode
SetStdHandle
SetFilePointer
SetEndOfFile
GetProcessHeap
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileExA
FlushFileBuffers
WriteConsoleW
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetUserDefaultLCID
GetCPInfo
GetLocaleInfoA
GetCommandLineA
HeapSetInformation
GetStartupInfoW
LCMapStringW
GetTimeFormatA
GetDateFormatA
CompareStringW
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetACP
GetOEMCP
EnumSystemLocalesA
IsValidLocale
LoadLibraryW
GetDriveTypeW
CreateFileW
SetEnvironmentVariableA
InterlockedPushEntrySList
VirtualFree
InterlockedPopEntrySList
CreateEventA
ReadFile
GetScrollInfo
SetScrollInfo
ScrollWindow
UnregisterClassA
GetWindowDC
MapVirtualKeyA
KillTimer
GetForegroundWindow
GetActiveWindow
LoadMenuA
SetForegroundWindow
GetWindowRect
DestroyMenu
GetDlgCtrlID
LoadImageA
LoadBitmapA
SetActiveWindow
IsIconic
LoadIconA
GetMessageA
TranslateMessage
ShowScrollBar
CheckRadioButton
DestroyIcon
IsDialogMessageA
DispatchMessageA
PostQuitMessage
RegisterWindowMessageA
GetWindowTextA
IsDlgButtonChecked
MessageBoxA
GetWindowTextLengthA
CreateAcceleratorTableA
RegisterClassExA
GetClassInfoExA
IsWindow
GetDesktopWindow
EnableWindow
GetWindow
DestroyAcceleratorTable
BeginPaint
EndPaint
CallWindowProcA
ReleaseCapture
GetClassNameA
GetParent
SetCapture
RedrawWindow
InvalidateRgn
InvalidateRect
ClientToScreen
MoveWindow
GetSysColor
CreateDialogParamA
UpdateWindow
ShowWindow
DialogBoxParamA
IsChild
DefWindowProcA
CharNextA
GetDlgItem
GetSystemMetrics
EndDialog
GetWindowLongA
SetWindowLongA
GetDC
ReleaseDC
SetFocus
SetCursor
LoadCursorA
SetTimer
CreateWindowExA
GetClientRect
SendMessageA
SetWindowTextA
GetCursorPos
ScreenToClient
PtInRect
PostMessageA
DestroyWindow
SetWindowPos
CharLowerBuffA
GetFocus
FillRect
SelectObject
GetTextMetricsA
SetBkMode
CreateFontA
CreatePen
SetBkColor
GetStockObject
GetObjectA
CreateSolidBrush
GetDeviceCaps
BitBlt
CreateCompatibleDC
TextOutA
CreateCompatibleBitmap
DeleteDC
DeleteObject
MoveToEx
LineTo
SetTextColor
RegOpenKeyExA
RegQueryValueExA
RegOpenKeyA
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegSetValueExA
RegQueryInfoKeyW
RegEnumKeyExA
SHGetFolderPathA
ShellExecuteA
CreateStreamOnHGlobal
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
OleLockRunning
StringFromGUID2
CoTaskMemFree
CoCreateInstance
StringFromCLSID
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
OleSetContainedObject
OleRun
CoInitialize
CoUninitialize
CoTaskMemAlloc
CoTaskMemRealloc
OleInitialize
OleUninitialize
SysFreeString
SysStringLen
SysAllocStringLen
SysAllocString
VarUI4FromStr
VariantInit
VariantClear
OleCreateFontIndirect
LoadRegTypeLi
LoadTypeLi
VarBstrCmp
DispCallFunc
SysAllocStringByteLen
SysStringByteLen
VariantChangeType
GetErrorInfo
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ