Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-09_37b1dfc2ea71a7e911b010128200bfb2_mafia.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-05-09_37b1dfc2ea71a7e911b010128200bfb2_mafia.exe
Resource
win10v2004-20240508-en
Target
2024-05-09_37b1dfc2ea71a7e911b010128200bfb2_mafia
Size
256KB
MD5
37b1dfc2ea71a7e911b010128200bfb2
SHA1
c00a3e3d300043d7cf7885f07e782a5e502ad08b
SHA256
cb27439b927634623a03078e6a15772bc666d258e47118a4000c4a0bd71b2b44
SHA512
29a5b13f0a0fc74e3487865aa28c1c8690e036028370d4c252ec672594d9e8e4b631e8f2f957e53c88144a9630339f1c4377e463d96c1b4aaf85683b8b5e41b2
SSDEEP
6144:JIKpsQW9sjoecs32yBI5cf3Ca35AjTCrl+p6uQX:JIKpsQW9Koen2sI5cCa35Ajyl+pVQX
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GoogleCrashHandler_unsigned.pdb
GetSecurityDescriptorSacl
GetSecurityDescriptorDacl
GetSecurityDescriptorGroup
GetSecurityDescriptorOwner
GetSecurityDescriptorControl
GetLengthSid
CopySid
IsValidSid
GetSidSubAuthority
InitializeSid
GetSidLengthRequired
SetSecurityDescriptorDacl
AddAce
InitializeAcl
GetAclInformation
InitializeSecurityDescriptor
MakeAbsoluteSD
OpenProcessToken
GetTokenInformation
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
GetAce
MakeSelfRelativeSD
GetSecurityDescriptorLength
EqualSid
SetNamedSecurityInfoW
ConvertStringSidToSidW
OpenThreadToken
RegQueryValueExW
RegOpenKeyExW
RegDeleteKeyW
RegDeleteValueW
RegCloseKey
RegCreateKeyExW
RegSetValueExW
RegEnumKeyExW
RegQueryInfoKeyW
ConvertSidToStringSidW
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetTraceLoggerHandle
GetTraceEnableFlags
GetTraceEnableLevel
RegisterTraceGuidsW
UnregisterTraceGuids
TraceEvent
SetTokenInformation
InterlockedDecrement
GetCurrentThread
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
FreeLibrary
InterlockedExchange
LoadLibraryW
GetLocaleInfoW
UnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
Sleep
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RtlUnwind
WideCharToMultiByte
HeapSize
HeapAlloc
HeapReAlloc
IsProcessorFeaturePresent
LCMapStringW
MultiByteToWideChar
GetStringTypeW
RaiseException
lstrlenW
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
CloseHandle
LocalFree
CreateDirectoryW
DeleteFileW
RemoveDirectoryW
WaitForMultipleObjects
WaitForSingleObject
GetExitCodeProcess
DuplicateHandle
ReleaseMutex
GetEnvironmentVariableW
lstrcmpiW
InterlockedIncrement
GetTempPathW
GetLocalTime
OutputDebugStringA
GetPrivateProfileIntW
GetPrivateProfileStringW
OutputDebugStringW
CreateFileW
lstrcmpW
SetFilePointer
CreateMutexW
CreateEventW
InitializeCriticalSection
TryEnterCriticalSection
SetEvent
ResetEvent
InterlockedCompareExchange
GetFileAttributesExW
GetVersionExW
VerSetConditionMask
VerifyVersionInfoW
MoveFileExW
GetFileTime
GetCurrentThreadId
ReadFile
DeviceIoControl
SetProcessWorkingSetSize
OpenProcess
CreateProcessW
ReadProcessMemory
lstrcpynW
GetUserDefaultLCID
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
CreateThread
DebugActiveProcess
GetThreadContext
DebugActiveProcessStop
VirtualQueryEx
GetProcessId
GetSystemInfo
ContinueDebugEvent
WaitForDebugEvent
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
EncodePointer
DeleteCriticalSection
GetFileType
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
WaitNamedPipeW
TransactNamedPipe
SetNamedPipeHandleState
RtlCaptureContext
ReleaseSemaphore
CreateSemaphoreW
GetModuleFileNameW
GetStdHandle
WriteFile
DecodePointer
ExitProcess
GetModuleHandleW
GetProcAddress
SetUnhandledExceptionFilter
HeapFree
GetLastError
GetStartupInfoW
HeapSetInformation
FlushFileBuffers
SetLastError
GetUserDefaultLangID
GetSystemDefaultLangID
GetComputerNameExW
GetOverlappedResult
ConnectNamedPipe
CreateNamedPipeW
DisconnectNamedPipe
UnregisterWait
GetProcessTimes
UnregisterWaitEx
RegisterWaitForSingleObject
WriteConsoleW
SetStdHandle
GetConsoleMode
GetConsoleCP
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
VirtualAlloc
VirtualProtect
GetProcessHeap
GetCommandLineW
VirtualQuery
StringFromGUID2
CoCreateGuid
SHGetFolderPathW
SetProcessWindowStation
GetThreadDesktop
CloseWindowStation
EmptyClipboard
OpenClipboard
EnumWindows
IsWindowVisible
GetWindowThreadProcessId
MessageBoxW
CreateDesktopW
CloseDesktop
wsprintfW
CharUpperW
CharLowerW
wvsprintfW
DispatchMessageW
GetMessageW
CreateWindowStationW
SetThreadDesktop
PostThreadMessageW
PeekMessageW
CloseClipboard
GetProcessWindowStation
SetClipboardData
NetApiBufferFree
NetWkstaGetInfo
UuidCreate
PathRemoveExtensionW
PathRemoveFileSpecW
PathStripPathW
SHQueryValueExW
PathIsRelativeW
PathCanonicalizeW
PathAppendW
UnloadUserProfile
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ