Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-19_0b1d22462caa42856b6016a60d300657_floxif_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-19_0b1d22462caa42856b6016a60d300657_floxif_mafia.exe
Resource
win10v2004-20240226-en
Target
2024-03-19_0b1d22462caa42856b6016a60d300657_floxif_mafia
Size
562KB
MD5
0b1d22462caa42856b6016a60d300657
SHA1
d5759ca8d407630126ba43e9324b21172522d4e6
SHA256
4bcaf47437ffb346aca6136b84a87a9cb92786793dfe48a140d0b614682c9dd5
SHA512
045c45a27a75f14d9cddafdf221797429ac69793dc8952c1e3d2b0e63c94cd35c0aac7b1296d50003bbda828a93266fe8c90ee75f7f19a5b54167e159dbc1b25
SSDEEP
12288:y+HmoDoW4ofETXdyDuSlvdMOBjvrEH7Ue:5H3DoW4osE6ivdbrEH7Z
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
E:\newdrfone\ModuleUpgrade\SharpUpgrade\Release\InstallAssistService.pdb
MultiByteToWideChar
WideCharToMultiByte
GetModuleFileNameW
Sleep
WTSGetActiveConsoleSessionId
OpenProcess
GetCurrentThread
GetCurrentProcess
CloseHandle
QueueUserWorkItem
CreateEventW
GetLastError
SetEvent
WaitForSingleObject
CompareStringW
GetProcessHeap
SetEndOfFile
CreateFileW
CreateFileA
WriteConsoleW
SetStdHandle
LoadLibraryW
HeapReAlloc
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
HeapSize
GetLocaleInfoW
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetTimeZoneInformation
FlushFileBuffers
GetConsoleMode
GetConsoleCP
WriteFile
SetFilePointer
ReadFile
InterlockedIncrement
InterlockedDecrement
InterlockedCompareExchange
InterlockedExchange
GetStringTypeW
EncodePointer
DecodePointer
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
HeapAlloc
GetFileAttributesA
CreateDirectoryA
GetTimeFormatA
GetDateFormatA
GetSystemTimeAsFileTime
GetCommandLineW
HeapSetInformation
RaiseException
GetCPInfo
RtlUnwind
LCMapStringW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
SetLastError
GetCurrentThreadId
GetProcAddress
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
HeapCreate
ExitProcess
SetEnvironmentVariableA
GetTokenInformation
ControlService
QueryServiceStatus
StartServiceW
ChangeServiceConfig2W
OpenServiceW
OpenSCManagerW
DeleteService
CloseServiceHandle
CreateServiceW
ReportEventW
RegisterServiceCtrlHandlerW
SetServiceStatus
DeregisterEventSource
StartServiceCtrlDispatcherW
RegisterEventSourceW
FreeSid
AllocateAndInitializeSid
OpenProcessToken
OpenThreadToken
EqualSid
CreateProcessAsUserW
SetTokenInformation
DuplicateTokenEx
CoUninitialize
CoCreateInstance
CoInitialize
VariantClear
VariantInit
SysFreeString
SysAllocString
WTSEnumerateSessionsW
CreateEnvironmentBlock
DestroyEnvironmentBlock
sendto
bind
socket
closesocket
setsockopt
getsockname
ntohs
WSAStartup
recvfrom
htons
htonl
inet_addr
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ