Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-13_f49773749c83b6e030ef50f13c0b5fcb_mafia.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-05-13_f49773749c83b6e030ef50f13c0b5fcb_mafia.exe
Resource
win10v2004-20240508-en
Target
2024-05-13_f49773749c83b6e030ef50f13c0b5fcb_mafia
Size
239KB
MD5
f49773749c83b6e030ef50f13c0b5fcb
SHA1
07207502089a07f3ec9f518d40a2fc3e4c7b83bb
SHA256
ad79bac1d7082d73429f2748fb27597d27b867b1a746e0dea3b2821769d63ad0
SHA512
16eb19dc346d64aadafc61a5bf9bc51891f99f075ca7b963b9f72bdb96b77a5909658c27f6eeadc30d37cf0ec3f545c99260d969e28cd1200dad7f363e046cd5
SSDEEP
6144:/CV7ojS7CYvzzXZ1G4RHPaFti9xwIuXcl:/ZjS7C2bZ1JHPaFMTBl
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\workspace\KakaoUpdate Deploy Build\build\KakaoUpdate.pdb
GetTempPathW
DeleteFileW
ResumeThread
FindFirstFileW
FindNextFileW
RemoveDirectoryW
FindClose
CreateDirectoryW
CopyFileW
CreateProcessW
GetCurrentProcessId
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
OpenProcess
WaitForSingleObject
TerminateProcess
SetLastError
LoadLibraryW
GetProcAddress
FreeLibrary
GetUserDefaultUILanguage
ReadFile
GetLastError
SetEndOfFile
SetFilePointer
FlushFileBuffers
GetConsoleMode
GetConsoleCP
SetStdHandle
CreateFileW
HeapReAlloc
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetLocaleInfoW
GetUserDefaultLCID
IsValidCodePage
GetOEMCP
GetACP
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
CreateSemaphoreW
CloseHandle
ReleaseSemaphore
LocalFree
GetProcessHeap
GetCommandLineW
GetModuleFileNameW
GetStdHandle
WriteFile
InitializeCriticalSectionAndSpinCount
ExitProcess
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
InterlockedCompareExchange
InterlockedExchange
MultiByteToWideChar
GetStringTypeW
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
HeapFree
ExitThread
GetCurrentThreadId
CreateThread
GetLocalTime
HeapSetInformation
GetStartupInfoW
RtlUnwind
HeapAlloc
LCMapStringW
GetCPInfo
RaiseException
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
HeapCreate
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
HeapSize
WriteConsoleW
PostMessageW
EndDialog
PostQuitMessage
EndPaint
DefWindowProcW
DestroyWindow
DialogBoxParamW
SetWindowTextW
SendMessageW
BeginPaint
GetWindowLongW
GetDlgItem
UpdateWindow
ShowWindow
CreateDialogParamW
CreateWindowExW
RegisterClassExW
LoadCursorW
LoadIconW
DispatchMessageW
TranslateMessage
TranslateAcceleratorW
GetMessageW
LoadAcceleratorsW
LoadStringW
SetWindowLongW
RegSetValueExW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegDeleteValueW
ShellExecuteW
CommandLineToArgvW
GetModuleFileNameExW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ