Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-22_3b004b330e07584c3b69efa42dd93097_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-22_3b004b330e07584c3b69efa42dd93097_mafia.exe
Resource
win10v2004-20240412-en
Target
2024-04-22_3b004b330e07584c3b69efa42dd93097_mafia
Size
1.5MB
MD5
3b004b330e07584c3b69efa42dd93097
SHA1
cbed81d0142b5b0ac9820872e5eaae0f29709139
SHA256
201815d1e403ebaabc327c72864d435251485db747291a6cde359c97ad192c09
SHA512
4b6c42d26efbaaa9a9289467779418f0f1139114ff00237fb43715c7f3f199458aef97e44c1604b75edf01f94308918ffc2b905583d743f93981255fcbc65e8f
SSDEEP
49152:h38ov8qgciy55nKAm5qMCbSE8ej6UpcjTPTCNYutVxUkLaPJ1x58u:heqgciy5505bPE8ejppcnu58
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CoTaskMemAlloc
OleLockRunning
IIDFromString
CoCreateGuid
CoInitialize
CoUninitialize
OleRun
OleSetContainedObject
CoCreateInstance
CoGetClassObject
CoTaskMemFree
OleUninitialize
OleInitialize
StringFromGUID2
CreateStreamOnHGlobal
CLSIDFromString
CLSIDFromProgID
CoTaskMemRealloc
SHGetPathFromIDListA
CommandLineToArgvW
SHGetFolderPathW
FindExecutableA
SHGetFolderPathA
SHGetFolderLocation
SHBrowseForFolderA
InternetCrackUrlA
HttpQueryInfoA
InternetConnectA
InternetReadFile
HttpOpenRequestA
InternetGetConnectedState
InternetErrorDlg
HttpSendRequestA
InternetOpenA
InternetCloseHandle
GetWindowThreadProcessId
GetMessageA
PostQuitMessage
TranslateMessage
GetAncestor
DispatchMessageA
GetSystemMenu
GetClassInfoExW
RegisterClassExW
GetWindowLongW
EnableMenuItem
SetWindowLongW
ShowWindow
CreateWindowExW
AdjustWindowRectEx
SetWindowTextW
DefWindowProcW
SetTimer
SetRect
KillTimer
PostMessageA
SetCursor
GetWindowRect
MapDialogRect
SetForegroundWindow
PtInRect
DispatchMessageW
EndDialog
GetCursorPos
EnableWindow
GetDlgCtrlID
EndPaint
ClientToScreen
DestroyWindow
GetClassNameA
DestroyAcceleratorTable
ScreenToClient
RegisterClassExA
FillRect
MapWindowPoints
GetWindowTextW
EnumWindows
GetTopWindow
DrawTextW
IsChild
GetClassInfoExA
SetCapture
LoadStringA
GetFocus
GetParent
InvalidateRgn
wsprintfA
CharNextA
GetClientRect
SetFocus
GetWindowTextLengthA
SendMessageA
RegisterWindowMessageA
BeginPaint
GetDC
GetWindowTextA
SetWindowLongA
MessageBoxA
MsgWaitForMultipleObjectsEx
IsWindowUnicode
PeekMessageA
GetMessageW
SetWindowContextHelpId
MoveWindow
GetWindow
LoadCursorA
DialogBoxIndirectParamA
CallWindowProcA
SetWindowTextA
ReleaseCapture
IsWindow
GetActiveWindow
SetWindowPos
GetSysColor
GetDesktopWindow
RedrawWindow
DefWindowProcA
GetDlgItem
ReleaseDC
UnregisterClassA
InvalidateRect
CreateAcceleratorTableA
GetWindowLongA
CreateWindowExA
IsValidURL
InitCommonControlsEx
WinVerifyTrust
GetStartupInfoW
HeapSetInformation
VirtualQuery
GetSystemInfo
GetSystemTimeAsFileTime
GetModuleHandleW
DecodePointer
EncodePointer
GetStringTypeW
WriteConsoleW
GetFileType
GetStdHandle
GetModuleFileNameW
GetCPInfo
GetConsoleCP
GetConsoleMode
ExitThread
CreateThread
CreateDirectoryW
GetFullPathNameW
FileTimeToLocalFileTime
GetDriveTypeW
FindFirstFileExW
SetStdHandle
HeapReAlloc
VirtualProtect
GetProcessHeap
HeapFree
InterlockedPushEntrySList
InterlockedCompareExchange
InitializeCriticalSection
SetFilePointerEx
CreateFileW
ReleaseMutex
CreateMutexA
LoadLibraryW
GetModuleHandleExW
OpenFileMappingA
CreateFileMappingA
LCMapStringW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetLocaleInfoW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
HeapCreate
HeapSize
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetACP
GetOEMCP
IsValidCodePage
SetFilePointer
FlushFileBuffers
SetEndOfFile
GetCurrentDirectoryW
GetFileInformationByHandle
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetTimeZoneInformation
CompareStringW
SetEnvironmentVariableA
GetSystemWow64DirectoryA
InterlockedPopEntrySList
HeapAlloc
RtlUnwind
VirtualAlloc
VirtualFree
GetCommandLineW
FindResourceA
lstrcmpA
lstrlenA
GetModuleHandleExA
lstrcpynA
FreeLibrary
LoadResource
InterlockedIncrement
InterlockedDecrement
GetCurrentProcess
GlobalLock
GetCommandLineA
GlobalAlloc
WideCharToMultiByte
InitializeCriticalSectionAndSpinCount
SizeofResource
LeaveCriticalSection
SetDllDirectoryA
MulDiv
IsDBCSLeadByte
MultiByteToWideChar
lstrlenW
GlobalUnlock
FlushInstructionCache
RaiseException
GetLastError
SetLastError
lstrcmpiA
GetProcAddress
EnterCriticalSection
GlobalFree
LockResource
GlobalHandle
GetModuleFileNameA
GetModuleHandleA
LoadLibraryExA
DeleteCriticalSection
GetCurrentThreadId
lstrcpyA
GetTickCount
CreateEventA
lstrcatA
GetVersionExA
GetCurrentProcessId
GetTempPathA
DeleteFileA
CreateFileA
ReadFile
CloseHandle
GetDiskFreeSpaceA
GetDiskFreeSpaceExA
FindResourceW
Process32First
WriteFile
GetSystemDirectoryA
CreateDirectoryA
Process32Next
MoveFileA
CreateToolhelp32Snapshot
LocalFree
SetEvent
FileTimeToSystemTime
FormatMessageA
InterlockedExchange
InterlockedExchangeAdd
LocalAlloc
Sleep
LoadLibraryExW
WaitForSingleObject
GetNativeSystemInfo
GetWindowsDirectoryA
FlushViewOfFile
GetLogicalProcessorInformation
ExitProcess
GetLocaleInfoA
OpenProcess
TerminateProcess
FindFirstFileA
FindClose
LoadLibraryA
MoveFileExA
GetFileAttributesA
RemoveDirectoryA
FindNextFileA
FormatMessageW
GetLocalTime
GetSystemDefaultUILanguage
GetThreadLocale
GetUserDefaultUILanguage
QueryPerformanceCounter
QueryPerformanceFrequency
OpenThread
GetExitCodeThread
PeekNamedPipe
SetHandleInformation
GetExitCodeProcess
CreateProcessA
CreatePipe
MapViewOfFile
UnmapViewOfFile
IsProcessorFeaturePresent
RegSetValueExA
ConvertSidToStringSidW
RegQueryInfoKeyW
RegDeleteKeyA
RegEnumKeyExA
RegCreateKeyExA
RegOpenKeyExA
RegDeleteValueA
RegCloseKey
RegQueryValueExA
RegOpenCurrentUser
RegOpenKeyA
RegEnumKeyA
CryptGetHashParam
CryptReleaseContext
CryptAcquireContextA
CryptCreateHash
CryptDestroyHash
CryptHashData
OpenProcessToken
GetTokenInformation
CopySid
GetWindowsAccountDomainSid
CreateWellKnownSid
ConvertStringSecurityDescriptorToSecurityDescriptorW
SysAllocString
SysStringLen
VariantClear
LoadTypeLi
VariantInit
SysAllocStringLen
OleCreateFontIndirect
VarUI4FromStr
SysFreeString
LoadRegTypeLi
VariantCopy
VariantChangeType
GetErrorInfo
SysStringByteLen
PathAppendA
ord12
SelectObject
DeleteObject
GetDeviceCaps
DeleteDC
CreateCompatibleDC
SetBkMode
SetTextColor
CreateFontIndirectA
CreateCompatibleBitmap
GetObjectA
GetStockObject
BitBlt
CreateSolidBrush
CryptStringToBinaryA
CryptUnprotectData
CryptProtectData
CryptBinaryToStringA
ord168
ord160
ord158
ord115
ord159
ord87
ord8
ord204
ord117
ord91
ord189
ord67
ord31
ord137
ord44
ord141
GetFileVersionInfoA
VerQueryValueW
GetFileVersionInfoSizeA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ