Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-16_b1690a9089c6bff1260eef6a3a4539b7_mafia.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-04-16_b1690a9089c6bff1260eef6a3a4539b7_mafia.exe
Resource
win10v2004-20240226-en
Target
2024-04-16_b1690a9089c6bff1260eef6a3a4539b7_mafia
Size
779KB
MD5
b1690a9089c6bff1260eef6a3a4539b7
SHA1
42dd1043c50af917ea658a0c95cfe49cfd8234be
SHA256
f522586170f142512109fa0c425b92eb376abec8bb5d26c61fdaf899fb638a2a
SHA512
3dcee8fb61c70f791775674c3203525cc75e98e5c8ec5e14c55a4011cb0c73587ea37a3b9d0fe9a84c9a39074fc616962eb942a4beec2f74fa71e31c2ecd98e8
SSDEEP
24576:J8hU3gxpxA6RF/hXAFe+SEcIBacSj4B3M:JZspxAuFpXAFe+SEceacJ2
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
E:\rc_v11_per_101_20201021\Build\Release\WPSOffice\wtoolex\updateself.pdb
GetCurrentProcess
GetCurrentThread
CloseHandle
GetLastError
GetVersionExW
SetLastError
InterlockedDecrement
LocalFree
GetSystemDirectoryW
GetSystemWow64DirectoryW
GetProcAddress
LoadLibraryW
GetDateFormatW
GetTimeFormatW
GetVersion
FreeLibrary
LoadLibraryA
MultiByteToWideChar
WideCharToMultiByte
GetPrivateProfileIntW
GetPrivateProfileStringW
lstrlenW
OpenProcess
GetEnvironmentVariableW
SetEnvironmentVariableW
GetCommandLineW
GetFileAttributesW
GetUserDefaultLCID
IsWow64Process
lstrlenA
Sleep
ExpandEnvironmentStringsW
DeleteFileW
FindClose
GetModuleHandleW
GetModuleFileNameW
RemoveDirectoryW
FindNextFileW
MoveFileExW
FindFirstFileW
GetCurrentDirectoryW
CreateDirectoryW
GlobalFree
GetOverlappedResult
CancelIo
WaitForSingleObject
WriteFile
WaitNamedPipeW
CreateFileW
GetModuleHandleA
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
ProcessIdToSessionId
GetCurrentProcessId
GetExitCodeProcess
CopyFileW
CreateEventW
ResetEvent
SetEvent
ResumeThread
InterlockedExchange
SetFilePointer
GetTickCount
ReadFile
MoveFileW
GetExitCodeThread
CreateThread
GetFileAttributesExW
ReleaseMutex
OutputDebugStringW
GetCurrentThreadId
GetFileSize
CreateMutexW
SetFileAttributesW
GetPrivateProfileSectionW
LocalAlloc
RaiseException
GetUserDefaultUILanguage
DeviceIoControl
CreateFileA
CreateProcessA
GetStartupInfoA
CreatePipe
GetVersionExA
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
VerifyVersionInfoA
VerSetConditionMask
GetSystemDirectoryA
SleepEx
QueryPerformanceCounter
PeekNamedPipe
WaitForMultipleObjects
GetFileType
GetStdHandle
FormatMessageA
MoveFileExA
GetSystemTime
InterlockedIncrement
GetStringTypeW
InterlockedCompareExchange
EncodePointer
DecodePointer
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
InitializeCriticalSectionAndSpinCount
HeapSetInformation
GetStartupInfoW
RtlUnwind
GetSystemTimeAsFileTime
FileTimeToSystemTime
FileTimeToLocalFileTime
FindFirstFileExA
FindFirstFileExW
ExitThread
GetFileInformationByHandle
GetDriveTypeA
GetFileAttributesA
LCMapStringW
GetCPInfo
SetUnhandledExceptionFilter
ExitProcess
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
HeapCreate
UnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
IsProcessorFeaturePresent
GetLocaleInfoW
GetACP
GetOEMCP
IsValidCodePage
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
SetStdHandle
FlushFileBuffers
GetFullPathNameA
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
WriteConsoleW
GetDriveTypeW
SetEndOfFile
CompareStringW
SetEnvironmentVariableA
DeleteFileA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ