Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-16_350be959599395a0a130e321ad2b85e3_karagany_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-16_350be959599395a0a130e321ad2b85e3_karagany_mafia.exe
Resource
win10v2004-20240412-en
Target
2024-04-16_350be959599395a0a130e321ad2b85e3_karagany_mafia
Size
484KB
MD5
350be959599395a0a130e321ad2b85e3
SHA1
0d9ad031cd7739f54747a343c5f264c3b8cfe537
SHA256
373c6a27e0715aa3a9b7f09194d44c14635c5a5a3993701108e96ff0a0b21314
SHA512
b412a5b8df4a95584b688062bfe6c0a3af83c809a6fbd839cefdc27f6f5b423931b652d314da6c355b309c272403ed9a2b2d9b9c5706b52c91e0669e0960134e
SSDEEP
6144:IJiPhfHFNfJAALdRywh9TIJhFRUywREw7hvnlpw:MilHThA4Vh9sJhnmREShv
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\Work\setup\ZWCADplusSetup\CHS\Setup.pdb
LoadLibraryExW
GetModuleFileNameW
GetPrivateProfileStringW
CreateThread
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetStringTypeW
LCMapStringW
WideCharToMultiByte
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
RtlUnwind
GetLocaleInfoW
LoadLibraryW
MultiByteToWideChar
SetConsoleCtrlHandler
FatalAppExitA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
FreeLibrary
lstrcmpiW
InterlockedDecrement
InterlockedIncrement
lstrlenW
GetModuleHandleW
GetProcAddress
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
CreateProcessW
WaitForSingleObject
CloseHandle
GetCurrentThread
GetLastError
GetCurrentProcess
LocalAlloc
LocalFree
GetCurrentThreadId
FindResourceExW
RaiseException
FindResourceW
LoadResource
LockResource
SizeofResource
LeaveCriticalSection
SetLastError
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStdHandle
WriteFile
HeapCreate
EnterCriticalSection
InterlockedExchange
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
EncodePointer
DecodePointer
GetCommandLineW
HeapSetInformation
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
Sleep
ExitProcess
IsProcessorFeaturePresent
IsValidLocale
SetDlgItemTextW
SendMessageW
IsDialogMessageW
GetWindowLongW
DestroyWindow
LoadImageW
DefWindowProcW
MessageBoxW
CharNextW
SetWindowPos
PostQuitMessage
GetSystemMetrics
GetParent
GetWindow
GetWindowRect
MonitorFromWindow
GetMonitorInfoW
GetClientRect
MapWindowPoints
RegDeleteKeyW
RevertToSelf
RegEnumKeyExW
RegQueryInfoKeyW
RegSetValueExW
RegDeleteValueW
RegCreateKeyExW
RegQueryValueExW
RegCloseKey
RegOpenKeyExW
ImpersonateSelf
OpenThreadToken
OpenProcessToken
AllocateAndInitializeSid
InitializeSecurityDescriptor
GetLengthSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
IsValidSecurityDescriptor
AccessCheck
FreeSid
ShellExecuteW
CoTaskMemAlloc
CoTaskMemRealloc
CoCreateInstance
CoTaskMemFree
CoUninitialize
CoInitialize
SysFreeString
VarUI4FromStr
InitCommonControlsEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE