Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-11_e9a8e843570eba5577828afdade17277_mafia.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-05-11_e9a8e843570eba5577828afdade17277_mafia.exe
Resource
win10v2004-20240426-en
Target
2024-05-11_e9a8e843570eba5577828afdade17277_mafia
Size
451KB
MD5
e9a8e843570eba5577828afdade17277
SHA1
8c40865ec1057f70214916a73f8bd7ef0f7ce995
SHA256
6166ce93475db3c13536d213a21aab8e183cdf989bba5042e55a61fb7884f956
SHA512
922730b33943317773088f7a4f7a9c36173dc48040c2e01117e8eddc3c4125792461e050c112cc6dc0223cfcc3d93128b889ec29862c384ee63b38bb05b95773
SSDEEP
12288:TirNCYvlqjP4nz74M88TTyi+vKHuTazuM0R5PemxvxY3uLh01T:iC1PqzkgTZunvxzhgT
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\gzixzdkzb.pdb
GetUserNameA
CopySid
GetLengthSid
EqualSid
RegCloseKey
RegEnumKeyA
RegOpenKeyA
AllocateAndInitializeSid
SetSecurityDescriptorDacl
SetSecurityDescriptorOwner
InitializeSecurityDescriptor
GetSaveFileNameA
GetOpenFileNameA
GetStockObject
Shell_NotifyIconA
ShellExecuteA
RemoveMenu
InsertMenuItemA
GetWindowLongA
SetWindowLongA
GetDlgItem
DestroyWindow
EnableWindow
SetActiveWindow
RegisterWindowMessageA
GetCursorPos
PostMessageA
GetMenuDefaultItem
TrackPopupMenu
SendMessageA
CreateDialogParamA
GetMenuItemInfoA
PostQuitMessage
DefWindowProcA
DestroyIcon
GetDesktopWindow
GetWindowRect
MoveWindow
SetForegroundWindow
FindWindowA
SetDlgItemTextA
EndDialog
MessageBeep
DialogBoxParamA
LoadIconA
LoadCursorA
RegisterClassA
CreateWindowExA
CreatePopupMenu
CreateMenu
AppendMenuA
GetMenuItemCount
SetMenuDefaultItem
ShowWindow
GetMessageA
IsWindow
IsDialogMessageA
TranslateMessage
DispatchMessageA
DestroyMenu
SendDlgItemMessageA
MessageBoxA
WinHelpA
MessageBoxIndirectA
GetDlgItemTextA
SetWindowPos
GetProcessHeap
SetEndOfFile
SetEnvironmentVariableA
CompareStringW
WriteConsoleW
CreateFileA
FlushFileBuffers
SetStdHandle
HeapSize
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
Sleep
GetStringTypeW
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetConsoleMode
GetConsoleCP
SetFilePointer
ReadFile
RtlUnwind
GetLocaleInfoW
LoadLibraryW
InterlockedExchange
SetConsoleCtrlHandler
FatalAppExitA
MultiByteToWideChar
LCMapStringW
WideCharToMultiByte
HeapDestroy
HeapCreate
GetModuleFileNameW
WriteFile
DeleteCriticalSection
GetFileType
InitializeCriticalSectionAndSpinCount
GetStdHandle
SetHandleCount
LeaveCriticalSection
EnterCriticalSection
TerminateProcess
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentThread
SetLastError
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
FreeLibrary
GetProcAddress
GetModuleFileNameA
GetVersionExA
LoadLibraryA
GetSystemDirectoryA
GetLastError
FormatMessageA
LocalFree
CloseHandle
OpenProcess
GetCurrentProcessId
VirtualAlloc
GetModuleHandleA
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
CreateFileMappingA
LocalAlloc
GetCurrentThreadId
GetCurrentProcess
SetCurrentDirectoryA
GetCurrentDirectoryA
HeapAlloc
HeapReAlloc
HeapFree
GetModuleHandleW
ExitProcess
DecodePointer
GetCommandLineA
HeapSetInformation
GetStartupInfoW
IsProcessorFeaturePresent
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
EncodePointer
CreateFileW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ