Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-09_694e247bab828bc9a54d733820ce0608_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-09_694e247bab828bc9a54d733820ce0608_mafia.exe
Resource
win10v2004-20231215-en
Target
2024-04-09_694e247bab828bc9a54d733820ce0608_mafia
Size
8.5MB
MD5
694e247bab828bc9a54d733820ce0608
SHA1
2163acad94c618f03b0ead81d8edada095c7e069
SHA256
d76c8f037b2598912649a8089c258e5c123ae9259d98fb1e42666b322a7edf35
SHA512
634d1bf6e83ecc3b7837d85c8e45e8ad0e7e2e90e63b0f81f2c854206ee96044e550a208b0ad4964f328eeee025a67f69a9180cb36ce1e4bc0651ea46ecde67d
SSDEEP
196608:grRN/BhuJhfFK6/Qe1p4EQLLYKxgqYmMbtz3snrA8zWVK:grj5huJNFK6baEaavmMbQE1VK
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageOCSPSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\work\subvert_new\bin\release\InstallBase.pdb
GetExitCodeProcess
CreateProcessA
TerminateProcess
GetLastError
CloseHandle
CreateFileA
SetFilePointer
WriteFile
GetDriveTypeA
ReadFile
CreateDirectoryA
GetLogicalDriveStringsA
CopyFileA
GetModuleFileNameA
GetDiskFreeSpaceExA
DeleteFileA
GetCommandLineW
AllocConsole
CreateMutexA
GetVersionExA
CreateThread
HeapSize
GetFileAttributesA
FlushFileBuffers
GetConsoleMode
GetConsoleCP
LocalFree
GetProcessHeap
SetEndOfFile
SetEnvironmentVariableA
CompareStringW
CreateFileW
WriteConsoleW
SetStdHandle
LoadLibraryW
HeapReAlloc
GetStringTypeW
GetCommandLineA
WaitForSingleObject
WideCharToMultiByte
GetCurrentProcess
MultiByteToWideChar
InterlockedDecrement
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetFileType
InitializeCriticalSectionAndSpinCount
GetUserDefaultLCID
GetLocaleInfoW
GetSystemTimeAsFileTime
SetHandleCount
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
InterlockedIncrement
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
HeapAlloc
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
LCMapStringW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
HeapCreate
GetProcAddress
GetModuleHandleW
ExitProcess
GetStdHandle
GetModuleFileNameW
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
FreeEnvironmentStringsW
EndPaint
DestroyWindow
GetMessageA
PostQuitMessage
LoadIconA
SendMessageA
BeginPaint
TranslateMessage
RegisterClassExW
GetSysColor
ShowWindow
CreateWindowExW
DispatchMessageA
GetSystemMetrics
UpdateWindow
LoadCursorA
DefWindowProcW
MessageBoxW
FillRect
CreateFontIndirectW
SetBkMode
SelectObject
TextOutW
GetStockObject
CreateSolidBrush
CommandLineToArgvW
SHFileOperationA
SysFreeString
SysAllocString
VariantClear
PathFileExistsA
PathRemoveFileSpecA
StrStrIW
StrStrW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ