Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-27_98ce0f6e9e39ef1e9938176d5ef17f3f_mafia.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-04-27_98ce0f6e9e39ef1e9938176d5ef17f3f_mafia.exe
Resource
win10v2004-20240419-en
Target
2024-04-27_98ce0f6e9e39ef1e9938176d5ef17f3f_mafia
Size
309KB
MD5
98ce0f6e9e39ef1e9938176d5ef17f3f
SHA1
a977c36974af6dbeebe64d6b6e9dea1c7f6ffa46
SHA256
03b5d8c19e02a24f606b757d4201b01df4179dea90a6dc90133ea5226b14c25c
SHA512
c70450b36fb236f13ed6d55ed5bbe2fa8abe6cb6f4c8eec46e60c480cd3dc9a3467301cd9f4736c15710f08097a400458d2b4b6f0d5807837a029eeeeea3cd4e
SSDEEP
6144:/J7aBi/ZwbIevcIingp42R+phgvakfear9vXglx:/lLwUbIQgp42R+phjkh4lx
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\CCNET\2.6.5.0\TIRD_Client\CoreLauncher\Client\Release\TIClientCoreLauncher.pdb
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
GetModuleFileNameExW
EnumProcessModules
GetModuleBaseNameA
EnumProcesses
PathFileExistsW
SHGetValueA
SHSetValueA
SHDeleteValueA
GetCurrentProcessId
ExitProcess
SetEvent
CreateEventA
ResetEvent
SetProcessShutdownParameters
CreateDirectoryW
WaitForSingleObject
OpenProcess
Sleep
CopyFileW
GetTempPathW
OpenEventA
GetProcessShutdownParameters
MapViewOfFile
UnmapViewOfFile
CreateFileMappingA
HeapReAlloc
HeapAlloc
HeapFree
GetProcessHeap
ProcessIdToSessionId
OpenFileMappingA
InterlockedIncrement
GetEnvironmentVariableW
Process32First
GetPrivateProfileStringW
WaitNamedPipeW
CloseHandle
GetVersionExW
GetFileAttributesW
ReadFile
WritePrivateProfileStringW
Process32Next
CreateToolhelp32Snapshot
GetWindowsDirectoryW
DeleteFileW
SetFileAttributesW
CreateFileA
SetNamedPipeHandleState
IsProcessorFeaturePresent
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
HeapCreate
GetStdHandle
LCMapStringW
TlsFree
IsValidCodePage
MultiByteToWideChar
CreateFileW
WriteFile
SetFilePointer
GetFileSize
GetVersionExA
lstrcpyW
WriteConsoleW
LocalFree
LocalAlloc
GetCurrentProcess
GetModuleFileNameW
GetModuleHandleW
GetCurrentThreadId
DeleteCriticalSection
GetModuleHandleA
GetModuleFileNameA
LoadLibraryA
GetLocalTime
EnterCriticalSection
GetProcAddress
SetLastError
GetLastError
LeaveCriticalSection
InitializeCriticalSection
GetTickCount
FreeLibrary
GetConsoleCP
GetConsoleMode
LoadLibraryW
GetStringTypeW
SetStdHandle
FlushFileBuffers
GetOEMCP
GetACP
InterlockedDecrement
GetCPInfo
RtlUnwind
IsBadWritePtr
IsBadReadPtr
IsBadStringPtrW
IsBadStringPtrA
ResumeThread
TlsGetValue
TlsAlloc
TlsSetValue
RaiseException
WideCharToMultiByte
FormatMessageA
GetCommandLineA
HeapSetInformation
GetStartupInfoW
ExitThread
CreateThread
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapSize
InitializeCriticalSectionAndSpinCount
SendMessageA
SetThreadDesktop
PostMessageA
GetSystemMetrics
GetThreadDesktop
OpenDesktopA
IsWindow
OpenWindowStationA
SetProcessWindowStation
GetUserObjectInformationA
GetForegroundWindow
ExitWindowsEx
CloseDesktop
RegCreateKeyExW
RegOpenKeyExA
LsaFreeMemory
LsaRetrievePrivateData
LsaNtStatusToWinError
LsaStorePrivateData
LsaClose
LsaOpenPolicy
AdjustTokenPrivileges
GetSecurityDescriptorSacl
SetSecurityInfo
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegDeleteValueW
RegCreateKeyExA
LookupPrivilegeValueA
RegDeleteKeyA
LogonUserW
OpenProcessToken
SetKernelObjectSecurity
SetServiceStatus
RegisterServiceCtrlHandlerExA
StartServiceCtrlDispatcherA
RegSetValueExW
RegCloseKey
RegOpenKeyExW
RegDeleteValueA
RegQueryValueExW
RegQueryValueExA
RegSetValueExA
FreeSid
AllocateAndInitializeSid
SetNamedSecurityInfoW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetEntriesInAclA
ShellExecuteExW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ