Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-19_3031d0203c64923adb1d4d2ebb03e1e7_mafia.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-04-19_3031d0203c64923adb1d4d2ebb03e1e7_mafia.exe
Resource
win10v2004-20240412-en
Target
2024-04-19_3031d0203c64923adb1d4d2ebb03e1e7_mafia
Size
404KB
MD5
3031d0203c64923adb1d4d2ebb03e1e7
SHA1
9560611810899afc22dbeb9fbddfe53e3329adae
SHA256
61a684ebc5ee31dd63d83cbc542edfef2d48f643305d075f7adcb14f4dbeeb1e
SHA512
e725efab6dbbc774d9758148f3954cbbcd4d5360b63ca7321954910cfaba55f57fcbdd05ab126b4fe807aeb119a4e711619a6d183939857a943556753e173e66
SSDEEP
12288:tby1kAEcTpIR3Th3rYcfFu1XBbm5vm1IH7x2r1f7hjfx2j7:kkAEcTpORxNm1IH7x2r/fxk7
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
E:\5.2.3\B5TClient\bin\Release\B5TLoader.pdb
CreateMutexW
WaitForMultipleObjects
MoveFileW
CreateFileW
GetVersionExW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetTickCount
CreateDirectoryW
CreateFileA
lstrlenW
DeleteFileA
OutputDebugStringA
CreateThread
GetTempFileNameW
Sleep
GlobalFree
WriteFile
ReadFile
SetFilePointerEx
SetEndOfFile
WTSGetActiveConsoleSessionId
TerminateProcess
GetStdHandle
FindClose
InterlockedDecrement
InterlockedCompareExchange
InterlockedExchange
LocalFree
GetLocalTime
GetTempPathW
GetStringTypeW
EncodePointer
DecodePointer
GetCommandLineW
HeapSetInformation
CreateProcessW
GetLastError
SetPriorityClass
DeviceIoControl
GetEnvironmentVariableW
SetEnvironmentVariableA
CompareStringW
GetProcessHeap
SetStdHandle
HeapReAlloc
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetTimeZoneInformation
GetLocaleInfoW
SetFilePointer
FlushFileBuffers
IsValidCodePage
GetOEMCP
MultiByteToWideChar
WideCharToMultiByte
CloseHandle
GetCurrentProcessId
GetCurrentProcess
GetModuleHandleExW
GetModuleHandleA
GetModuleFileNameA
OutputDebugStringW
GetCurrentThreadId
FreeLibrary
GetModuleFileNameW
GetModuleHandleW
GetProcAddress
LoadLibraryW
lstrlenA
GetACP
GetConsoleMode
GetConsoleCP
QueryPerformanceCounter
HeapCreate
GetStartupInfoW
SetLastError
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
ExitProcess
HeapSize
IsProcessorFeaturePresent
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
LCMapStringW
GetCPInfo
RtlUnwind
RaiseException
GetFileType
WriteConsoleW
HeapAlloc
HeapFree
FindFirstFileExW
FindFirstFileExA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetSystemTimeAsFileTime
InterlockedIncrement
LoadStringW
GetMessageW
DispatchMessageW
TranslateMessage
wsprintfW
LoadAcceleratorsW
MessageBoxA
TranslateAcceleratorW
BeginPaint
EndPaint
PostQuitMessage
EndDialog
PostThreadMessageW
LoadIconW
LoadCursorW
RegisterClassExW
CreateWindowExW
ShowWindow
UpdateWindow
DialogBoxParamW
DestroyWindow
DefWindowProcW
GetUserNameW
ord680
ord155
SHGetPathFromIDListW
SHGetFolderLocation
ShellExecuteW
CoInitializeSecurity
CoUninitialize
CoInitialize
CoCreateInstance
CoSetProxyBlanket
CoTaskMemFree
UrlUnescapeW
SHRegGetValueW
WTSQuerySessionInformationW
WTSQueryUserToken
WTSFreeMemory
GetModuleBaseNameA
WinHttpQueryHeaders
WinHttpGetIEProxyConfigForCurrentUser
WinHttpReceiveResponse
WinHttpWriteData
WinHttpSetStatusCallback
WinHttpQueryDataAvailable
WinHttpGetProxyForUrl
WinHttpSendRequest
WinHttpAddRequestHeaders
WinHttpSetOption
WinHttpOpenRequest
WinHttpConnect
WinHttpCrackUrl
WinHttpSetTimeouts
WinHttpOpen
WinHttpCloseHandle
WinHttpReadData
SysAllocString
SysFreeString
VariantInit
VariantClear
GetAdaptersInfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ