Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-03_ca71b66b31634058f79ce676fcaf0b54_mafia.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-05-03_ca71b66b31634058f79ce676fcaf0b54_mafia.exe
Resource
win10v2004-20240419-en
Target
2024-05-03_ca71b66b31634058f79ce676fcaf0b54_mafia
Size
639KB
MD5
ca71b66b31634058f79ce676fcaf0b54
SHA1
b0d3ed69f94ac4dec4dcca84ad0b34c821cc8305
SHA256
83253ce2cca3094961f7241a4b9f49f4777f0397d7f4119f6ceadca303246835
SHA512
71daf1f2e977065d3c2d434e53a433e17cf39665ee0bc398c5609a692d26845fcac1624e1586e696b4c6f22fa2d152f8adbf95277d014fe4569f6486bca97041
SSDEEP
12288:RlV0XiN9V6I/a1ZPNCY6KOoWf6sVB7NM+JIRpwQ7YA9TpWx1YK5dF0:rPBINqSm7NM+JzQ7V9Tp+5n0
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
E:\6.0.1\B5TClient\bin\Release\B5TAssist.pdb
WinHttpReadData
WinHttpQueryDataAvailable
WinHttpQueryHeaders
WinHttpGetProxyForUrl
WinHttpOpen
WinHttpReceiveResponse
WinHttpSendRequest
WinHttpAddRequestHeaders
WinHttpSetOption
WinHttpCloseHandle
WinHttpOpenRequest
WinHttpConnect
WinHttpCrackUrl
WinHttpSetTimeouts
WinHttpSetStatusCallback
WinHttpGetIEProxyConfigForCurrentUser
WinHttpWriteData
lstrcpyA
GetLocalTime
lstrcatA
VirtualQuery
lstrlenA
GetCurrentProcess
GetCurrentThread
Sleep
CreateMutexW
GetLastError
WaitForSingleObject
ReleaseMutex
CloseHandle
CreateThread
GetTickCount
CreateDirectoryW
GetTempPathW
GetTempFileNameW
MoveFileW
CreateProcessW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GlobalFree
WaitForMultipleObjects
WriteFile
ReadFile
SetFilePointerEx
SetEndOfFile
CreateFileW
OpenProcess
TerminateProcess
WTSGetActiveConsoleSessionId
GetModuleFileNameW
LocalFree
OutputDebugStringW
GetProcAddress
GetModuleHandleW
GetCurrentProcessId
GetFileSize
LoadLibraryW
WideCharToMultiByte
MultiByteToWideChar
DeleteFileA
lstrlenW
CreateFileA
OutputDebugStringA
SetFilePointer
FindClose
SetUnhandledExceptionFilter
GetDriveTypeW
GetVersionExW
FreeLibrary
DeviceIoControl
SetPriorityClass
InterlockedDecrement
EnumSystemLocalesA
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
SetErrorMode
GetModuleFileNameA
GetStdHandle
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
GetLocaleInfoW
HeapSize
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
FlushFileBuffers
GetTimeZoneInformation
GetUserDefaultLCID
ExitProcess
HeapCreate
GetConsoleMode
GetConsoleCP
InitializeCriticalSectionAndSpinCount
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
GetCPInfo
LCMapStringW
RaiseException
RtlUnwind
GetStartupInfoW
HeapSetInformation
GetCommandLineW
GetSystemTimeAsFileTime
HeapReAlloc
HeapAlloc
SetEnvironmentVariableA
CompareStringW
GetProcessHeap
SetStdHandle
WriteConsoleW
HeapFree
DecodePointer
EncodePointer
GetStringTypeW
InterlockedExchange
InterlockedCompareExchange
InterlockedIncrement
IsValidLocale
GetLocaleInfoA
FindFirstFileW
wsprintfW
MessageBoxA
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
OpenProcessToken
GetTokenInformation
LookupAccountSidW
ord680
ord155
SHGetPathFromIDListW
SHGetFolderLocation
ShellExecuteW
CoInitialize
CoInitializeSecurity
CoCreateInstance
CoSetProxyBlanket
CoTaskMemFree
CoUninitialize
VariantClear
SysAllocString
SysFreeString
VariantInit
SymCleanup
SymGetSymFromAddr
SymFunctionTableAccess
SymGetModuleBase
StackWalk
SymInitialize
UrlUnescapeW
PathFileExistsW
WTSQueryUserToken
GetModuleFileNameExW
EnumProcessModules
EnumProcesses
GetAdaptersInfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ