Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-26_c73fda28827047691cffc99da08c5000_mafia.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-04-26_c73fda28827047691cffc99da08c5000_mafia.exe
Resource
win10v2004-20240419-en
Target
2024-04-26_c73fda28827047691cffc99da08c5000_mafia
Size
634KB
MD5
c73fda28827047691cffc99da08c5000
SHA1
dbbb24ff8bb62a4d0bccc20ce7d0be31a611fceb
SHA256
2181c0e332a1abcb93eefcc5d055aeed28342a88f57ed951b0c085cddf639610
SHA512
eec3d4976cd147724ff761e233843a0eb0e90790e8ae94bb0a387daa59bf655b360d97df1cba903c8b12302c35ddf40fc08a2d498b6de4ab0e0b04aed543ec7b
SSDEEP
12288:xrAimWIujeGlwD0pputTJdeTuki2WZ6VgT0/MDxfDqNECVg9TwWx1YK583rn0:x4aTaUtVgT0/MxqNZK9Tw+5u0
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
E:\6.0.1\B5TClient\bin\Release\B5TAssist.pdb
WinHttpReadData
WinHttpQueryDataAvailable
WinHttpQueryHeaders
WinHttpGetProxyForUrl
WinHttpOpen
WinHttpReceiveResponse
WinHttpSendRequest
WinHttpAddRequestHeaders
WinHttpSetOption
WinHttpCloseHandle
WinHttpOpenRequest
WinHttpConnect
WinHttpCrackUrl
WinHttpSetTimeouts
WinHttpSetStatusCallback
WinHttpGetIEProxyConfigForCurrentUser
WinHttpWriteData
lstrcpyA
GetLocalTime
lstrcatA
VirtualQuery
lstrlenA
GetCurrentProcess
GetCurrentThread
Sleep
CreateMutexW
GetLastError
WaitForSingleObject
ReleaseMutex
CloseHandle
CreateThread
GetTickCount
CreateDirectoryW
GetTempPathW
GetTempFileNameW
MoveFileW
CreateProcessW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GlobalFree
WaitForMultipleObjects
WriteFile
ReadFile
SetFilePointerEx
SetEndOfFile
CreateFileW
OpenProcess
TerminateProcess
WTSGetActiveConsoleSessionId
GetModuleFileNameW
LocalFree
OutputDebugStringW
GetProcAddress
GetModuleHandleW
GetCurrentProcessId
GetFileSize
LoadLibraryW
WideCharToMultiByte
MultiByteToWideChar
DeleteFileA
lstrlenW
CreateFileA
OutputDebugStringA
SetFilePointer
FindClose
SetUnhandledExceptionFilter
GetDriveTypeW
GetVersionExW
FreeLibrary
DeviceIoControl
SetPriorityClass
InterlockedDecrement
EnumSystemLocalesA
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
SetErrorMode
GetModuleFileNameA
GetStdHandle
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
GetLocaleInfoW
HeapSize
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
FlushFileBuffers
GetTimeZoneInformation
GetUserDefaultLCID
ExitProcess
HeapCreate
GetConsoleMode
GetConsoleCP
InitializeCriticalSectionAndSpinCount
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
GetCPInfo
LCMapStringW
RaiseException
RtlUnwind
GetStartupInfoW
HeapSetInformation
GetCommandLineW
GetSystemTimeAsFileTime
HeapReAlloc
HeapAlloc
SetEnvironmentVariableA
CompareStringW
GetProcessHeap
SetStdHandle
WriteConsoleW
HeapFree
DecodePointer
EncodePointer
GetStringTypeW
InterlockedExchange
InterlockedCompareExchange
InterlockedIncrement
IsValidLocale
GetLocaleInfoA
FindFirstFileW
wsprintfW
MessageBoxA
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
OpenProcessToken
GetTokenInformation
LookupAccountSidW
ord680
ord155
SHGetPathFromIDListW
SHGetFolderLocation
ShellExecuteW
CoInitialize
CoInitializeSecurity
CoCreateInstance
CoSetProxyBlanket
CoTaskMemFree
CoUninitialize
VariantClear
SysAllocString
SysFreeString
VariantInit
SymCleanup
SymGetSymFromAddr
SymFunctionTableAccess
SymGetModuleBase
StackWalk
SymInitialize
UrlUnescapeW
PathFileExistsW
WTSQueryUserToken
GetModuleFileNameExW
EnumProcessModules
EnumProcesses
GetAdaptersInfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ