Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-04_fe1c1a9c38e259646b4e58214e96b84d_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-04_fe1c1a9c38e259646b4e58214e96b84d_mafia.exe
Resource
win10v2004-20240426-en
Target
2024-05-04_fe1c1a9c38e259646b4e58214e96b84d_mafia
Size
2.5MB
MD5
fe1c1a9c38e259646b4e58214e96b84d
SHA1
897e2e214590fd3af0820a4f0b7c9520e4e9b01d
SHA256
2d0a037aba48b7515553f5f622725d5548d29f707d216fa8362dca55bda6b352
SHA512
eacff36d3670b9b2c4fae9123d034151aae0834cdd14519711f56e2f7d385635365141c6a946bcd2f3e83e1fcf090e0f7a859736c1fbd743ba87d5fb7ddd1922
SSDEEP
49152:81o54Ku2g9XVGYgyEzjhxHXFAKJSRrvrcsgYAAuE8UIRMsZxbDT5l3G9:85BV9gyqjhx3FcRrjc5YAAuECMb
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Direct3DCreate9
GetProcAddress
LoadLibraryA
GetCurrentDirectoryA
FreeLibrary
CloseHandle
WaitForSingleObject
CreateProcessA
GetCommandLineA
QueryPerformanceCounter
GetLastError
QueryPerformanceFrequency
GetThreadTimes
GetCurrentThread
GetTimeFormatA
SetLastError
lstrcpyA
FindResourceA
LoadResource
SizeofResource
GlobalAlloc
LockResource
GlobalLock
FreeResource
GetFileAttributesA
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
SetEnvironmentVariableA
CreateFileW
GetTimeZoneInformation
GetDriveTypeW
WriteConsoleW
GetCurrentDirectoryW
PeekNamedPipe
GetFullPathNameA
FlushFileBuffers
GetConsoleMode
GetConsoleCP
IsValidLocale
GetCurrentProcessId
GetTickCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
ExitProcess
HeapSize
IsValidCodePage
GetOEMCP
GetACP
HeapDestroy
InitializeCriticalSection
DeleteCriticalSection
RaiseException
HeapAlloc
GetProcessHeap
HeapFree
HeapCreate
GetModuleFileNameW
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetModuleHandleW
TlsFree
TlsSetValue
TlsGetValue
GetCurrentProcess
FlushInstructionCache
GetDateFormatA
InterlockedExchange
TlsAlloc
IsProcessorFeaturePresent
FindFirstFileExA
GetDriveTypeA
FileTimeToLocalFileTime
FileTimeToSystemTime
SetStdHandle
InitializeCriticalSectionAndSpinCount
GetStdHandle
SetHandleCount
GetSystemTimeAsFileTime
GetStartupInfoW
HeapSetInformation
HeapReAlloc
EncodePointer
DecodePointer
RtlUnwind
InterlockedCompareExchange
GetStringTypeExA
GetUserDefaultLCID
CreateDirectoryA
MoveFileA
DeleteFileA
EnumResourceTypesA
EnumResourceNamesA
FindClose
GetLocalTime
LoadLibraryW
lstrcmpA
lstrlenA
GetModuleHandleA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
CreateFileA
GetFileType
InterlockedExchangeAdd
GetExitCodeProcess
Sleep
InterlockedIncrement
InterlockedDecrement
GetLocaleInfoA
EnumSystemLocalesA
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
LCMapStringW
CompareStringW
GetLocaleInfoW
LCMapStringA
GetCPInfo
GetFileInformationByHandle
GetFileSize
ReadFile
WriteFile
GetSystemInfo
SetFilePointer
SetEndOfFile
PostMessageA
ShowWindow
GetDlgItem
MessageBoxA
OpenClipboard
RegisterClassExA
wsprintfA
LoadCursorA
GetClassInfoExA
PostQuitMessage
DestroyIcon
EndDialog
DispatchMessageA
SendMessageA
ShowCursor
SetCursorPos
GetWindowRect
GetCursorPos
GetKeyState
EnumWindows
FindWindowA
EnumChildWindows
GetParent
GetClassNameA
GetWindow
GetTopWindow
GetWindowTextA
TranslateMessage
GetClientRect
CreateWindowExA
SetWindowLongA
GetMessageA
PeekMessageA
DefWindowProcA
LoadStringA
GetActiveWindow
LoadIconA
AdjustWindowRect
IsClipboardFormatAvailable
GetClipboardData
CloseClipboard
GetMonitorInfoA
BeginPaint
SetWindowTextA
RegisterWindowMessageA
EnableWindow
DestroyWindow
DialogBoxParamA
GetWindowLongA
CallWindowProcA
EndPaint
EnumDisplayDevicesA
GetOpenFileNameA
CommDlgExtendedError
RegSetValueExA
RegDeleteValueA
RegQueryValueExA
RegEnumValueA
RegEnumKeyA
RegCreateKeyExA
RegFlushKey
RegCloseKey
RegOpenKeyExA
RegQueryInfoKeyA
SHGetSpecialFolderPathA
ShellExecuteA
CoInitialize
CoUninitialize
CreateStreamOnHGlobal
CoCreateInstance
SysAllocStringLen
VariantClear
SysFreeString
OleLoadPicture
SysAllocString
InitCommonControlsEx
DirectInput8Create
D3DXMatrixMultiply
D3DXVec3Transform
D3DXMatrixTranspose
D3DXMatrixInverse
D3DXVec3Normalize
D3DXMatrixPerspectiveFovLH
D3DXCreateTextureFromFileInMemoryEx
D3DXSaveSurfaceToFileA
D3DXMatrixScaling
D3DXMatrixLookAtLH
D3DXMatrixRotationX
D3DXMatrixTranslation
D3DXMatrixRotationYawPitchRoll
D3DXMatrixRotationY
D3DXVec3TransformCoord
D3DXMatrixRotationAxis
D3DXGetFVFVertexSize
D3DXMatrixTransformation
D3DXCreateCubeTexture
D3DXLoadSurfaceFromFileInMemory
D3DXCompileShader
D3DXAssembleShader
D3DXVec3TransformNormal
timeGetDevCaps
timeBeginPeriod
timeEndPeriod
timeGetTime
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ