Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-12_14c57e670df919704ae69689a5c8c913_mafia.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-05-12_14c57e670df919704ae69689a5c8c913_mafia.exe
Resource
win10v2004-20240508-en
Target
2024-05-12_14c57e670df919704ae69689a5c8c913_mafia
Size
708KB
MD5
14c57e670df919704ae69689a5c8c913
SHA1
5646c8749d1fda2e6ecb21dbca1bde4bbb109c78
SHA256
e5dc9a1cb2aee94f7263dec30f2c36a193fd8e5864c52ca720b5bb76fbf636cc
SHA512
9b2e84f951ec680716047860417d782392a0d21d547d9b55f2ba1df87046ee51aef40db5e691d983640eb2d49821336c5d69b30776df991164217ca58eac95bc
SSDEEP
6144:P3ISmmVupqUtTLMNEiYBkpS7aToMgokVoN4jFz5IMVZt8uQ1UUUUUUUUUUUUUUUZ:P3ISm0UW2SS7avgoMoN4jFz5s8Mi
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\buildRel3.0.6\Funshion\Rel\bin\Release\FunshionWeb.pdb
CoInternetSetFeatureEnabled
UrlMkGetSessionOption
UrlMkSetSessionOption
GetCurrentThreadId
FindResourceW
FreeLibrary
LoadResource
LoadLibraryExW
GetCurrentProcess
GlobalLock
GlobalAlloc
InitializeCriticalSectionAndSpinCount
SizeofResource
LeaveCriticalSection
MulDiv
lstrcmpW
MultiByteToWideChar
lstrlenW
GlobalUnlock
FlushInstructionCache
RaiseException
SetLastError
GetProcAddress
EnterCriticalSection
lstrcmpiW
DeleteCriticalSection
lstrlenA
WideCharToMultiByte
OutputDebugStringW
MoveFileExW
InitializeCriticalSection
DeleteFileW
TerminateThread
OutputDebugStringA
Sleep
LoadLibraryW
TerminateProcess
CreateDirectoryW
GetPrivateProfileStringW
WritePrivateProfileStringW
GetThreadContext
SetThreadContext
VirtualQuery
VirtualFree
VirtualAlloc
InterlockedCompareExchange
SuspendThread
ResumeThread
LoadLibraryExA
InterlockedPopEntrySList
GetProcessHeap
InterlockedPushEntrySList
FlushFileBuffers
SetEnvironmentVariableA
CompareStringW
WriteConsoleW
SetStdHandle
GetConsoleMode
GetConsoleCP
SetFilePointer
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetCurrentProcessId
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
HeapReAlloc
HeapSize
HeapCreate
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
GetLocaleInfoW
GetStdHandle
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
LCMapStringW
RtlUnwind
GetCPInfo
GetDateFormatA
GetTimeFormatA
GetStartupInfoW
HeapSetInformation
GetCommandLineW
HeapAlloc
GetSystemTimeAsFileTime
GetTimeZoneInformation
HeapFree
LocalFree
DecodePointer
EncodePointer
GetStringTypeW
InterlockedExchange
GetLocalTime
SetUnhandledExceptionFilter
ExitProcess
GetTickCount
GetLastError
InterlockedDecrement
CreateFileW
ReadFile
WriteFile
WaitForSingleObject
InterlockedIncrement
CreateThread
CloseHandle
GetModuleFileNameW
GetPrivateProfileIntW
GetCurrentThread
GetModuleHandleW
VirtualProtect
GetDC
BeginPaint
GetClientRect
RegisterClassExW
IsIconic
SetActiveWindow
GetWindowRect
UpdateLayeredWindow
GetWindowLongW
ReleaseDC
SetWindowLongW
CreateWindowExW
EqualRect
DefWindowProcW
PostMessageW
wsprintfW
IsWindow
LoadCursorW
SetCursor
EndPaint
PostQuitMessage
DestroyWindow
RegisterClassW
ShowWindow
GetParent
GetFocus
IsChild
DispatchMessageW
PostThreadMessageW
TranslateMessage
GetMessageW
MoveWindow
GetWindow
CallWindowProcW
SetWindowTextW
SendMessageW
ReleaseCapture
SetWindowPos
GetSysColor
GetDesktopWindow
RedrawWindow
GetDlgItem
GetClassNameW
GetWindowTextW
InvalidateRect
GetClassInfoExW
SetFocus
CreateAcceleratorTableW
InvalidateRgn
KillTimer
SetCapture
UnregisterClassA
FillRect
RegisterWindowMessageW
ClientToScreen
GetWindowTextLengthW
DestroyAcceleratorTable
SetTimer
ScreenToClient
CharNextW
SetBkColor
BitBlt
ExtTextOutW
GetObjectW
GetStockObject
DeleteDC
CreateDIBSection
GetDeviceCaps
DeleteObject
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
CreateSolidBrush
RegSetValueExW
RegCloseKey
RegEnumKeyExW
RegOpenKeyExW
RegDeleteValueW
RegDeleteKeyW
RegQueryInfoKeyW
RegCreateKeyExW
SHGetSpecialFolderPathW
OleSetContainedObject
OleCreate
OleDraw
OleInitialize
StgCreateDocfile
CoCreateInstance
OleLockRunning
CoTaskMemRealloc
CLSIDFromProgID
CoTaskMemAlloc
CoGetClassObject
CoTaskMemFree
OleUninitialize
StringFromGUID2
CreateStreamOnHGlobal
CLSIDFromString
GetErrorInfo
LoadRegTypeLi
VarUI4FromStr
OleCreateFontIndirect
SysAllocStringLen
VariantInit
LoadTypeLi
VariantClear
SysStringLen
SysFreeString
SysAllocString
PathFindExtensionW
PathRemoveFileSpecW
PathAppendW
PathFileExistsW
WinHttpQueryDataAvailable
WinHttpSetTimeouts
WinHttpSendRequest
WinHttpConnect
WinHttpCloseHandle
WinHttpQueryHeaders
WinHttpOpen
WinHttpOpenRequest
WinHttpCrackUrl
WinHttpReadData
WinHttpReceiveResponse
WSACleanup
connect
htons
socket
gethostbyname
inet_addr
WSAStartup
closesocket
getsockname
InternetGetCookieExW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ