Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-15_93608bd06891d0ce033a2998a242d735_mafia.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-15_93608bd06891d0ce033a2998a242d735_mafia.exe
Resource
win10v2004-20240426-en
Target
2024-05-15_93608bd06891d0ce033a2998a242d735_mafia
Size
258KB
MD5
93608bd06891d0ce033a2998a242d735
SHA1
deb60e5998c8ff84c6181ff141d90e0f11800032
SHA256
a4462583a042c97d5a3309ae93d332128c08721d6336d27a5136dbcef7a30739
SHA512
0a7dfce4d472c3a21617c726c317a47dc73d9541d3666c91a4c997f06f27e2a22e0484068bef95bfc97ac6cb1b258a86784cf7d64931084978d629d25c196dc2
SSDEEP
6144:fxRcPOATwVGvZAoGgGWs2XhIQaSL0ucsP1HQvtlk:J9ATwVGvZCos2XhIQaSLvc8Qvtlk
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
Close
SetCallBack
SelectRepoNonChained
SelectRepo
RebootInRP
IsTheMostRecentRepo
GetRepoInformation
GetNumberRepos
DeleteContext
CreateContext
GetProcessImageFileNameW
GetLocaleInfoA
GetUserDefaultLCID
HeapReAlloc
RtlUnwind
LoadLibraryW
InterlockedExchange
SetFilePointer
GetConsoleMode
GetModuleFileNameW
OpenMutexW
CloseHandle
GetLastError
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
CreateMutexW
WaitForSingleObject
ReleaseMutex
GetCurrentProcessId
CreateSemaphoreW
GetTickCount
OpenSemaphoreW
ReleaseSemaphore
MapViewOfFile
EnumSystemLocalesA
CreateFileMappingW
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
DisconnectNamedPipe
ConnectNamedPipe
ReadFile
WriteFile
FlushFileBuffers
CreateNamedPipeW
WaitNamedPipeW
CreateFileW
CreateJobObjectW
SetInformationJobObject
OpenProcess
GetExitCodeProcess
TerminateProcess
CreateProcessW
AssignProcessToJobObject
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
IsProcessInJob
GetCurrentProcess
IsValidLocale
WriteConsoleW
SetStdHandle
GetProcessHeap
InterlockedCompareExchange
SetEndOfFile
UnmapViewOfFile
GetCommandLineW
HeapSetInformation
EncodePointer
DecodePointer
HeapAlloc
HeapFree
InterlockedDecrement
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetProcAddress
GetModuleHandleW
ExitProcess
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
InterlockedIncrement
SetLastError
GetCurrentThreadId
HeapCreate
QueryPerformanceCounter
GetSystemTimeAsFileTime
Sleep
HeapSize
RaiseException
IsProcessorFeaturePresent
GetACP
GetOEMCP
IsValidCodePage
GetStringTypeW
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetLocaleInfoW
GetConsoleCP
RegCloseKey
RegOpenKeyW
RegCreateKeyExW
RegEnumKeyExW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ