Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-17_fe18d043126b4dff8e53556d05ee231d_mafia.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-05-17_fe18d043126b4dff8e53556d05ee231d_mafia.exe
Resource
win10v2004-20240426-en
Target
2024-05-17_fe18d043126b4dff8e53556d05ee231d_mafia
Size
310KB
MD5
fe18d043126b4dff8e53556d05ee231d
SHA1
fea42de234f278c6975fbbdf74269c7a7ff62161
SHA256
a9b3e25e0986ec12fd476dd4a16609df0f1b13b706d2217ffede80164cf72781
SHA512
e463d01ea42ba24d2e1ff85d5cabf21839ae3efd01a176016b7a90f63c765f3ad63d7bd3e60bb79a2219233388651592dfbef9aab3fce39eeb09851bab2c265a
SSDEEP
6144:RPKCNy00w/SM6qkB4LTTsTpsimvR6KzfemuA:RP2wqUkGLTTsTps56KzqA
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\CCNET\2.6.3.0\TIRD_Client\CoreLauncher\Client\Release\TIClientCoreLauncher.pdb
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
GetModuleFileNameExW
EnumProcessModules
GetModuleBaseNameA
EnumProcesses
PathFileExistsW
SHGetValueA
SHSetValueA
SHDeleteValueA
GetCurrentProcessId
ExitProcess
SetEvent
CreateEventA
ResetEvent
SetProcessShutdownParameters
CreateDirectoryW
WaitForSingleObject
OpenProcess
Sleep
CopyFileW
GetTempPathW
OpenEventA
GetProcessShutdownParameters
MapViewOfFile
UnmapViewOfFile
CreateFileMappingA
HeapReAlloc
HeapAlloc
HeapFree
GetProcessHeap
ProcessIdToSessionId
OpenFileMappingA
InterlockedIncrement
GetEnvironmentVariableW
Process32First
GetPrivateProfileStringW
WaitNamedPipeW
CloseHandle
GetVersionExW
GetFileAttributesW
ReadFile
WritePrivateProfileStringW
Process32Next
CreateToolhelp32Snapshot
GetWindowsDirectoryW
DeleteFileW
SetFileAttributesW
CreateFileA
SetNamedPipeHandleState
IsProcessorFeaturePresent
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
HeapCreate
GetStdHandle
LCMapStringW
TlsFree
IsValidCodePage
MultiByteToWideChar
CreateFileW
WriteFile
SetFilePointer
GetFileSize
GetVersionExA
lstrcpyW
WriteConsoleW
LocalFree
LocalAlloc
GetCurrentProcess
GetModuleFileNameW
GetModuleHandleW
GetCurrentThreadId
DeleteCriticalSection
GetModuleHandleA
GetModuleFileNameA
LoadLibraryA
GetLocalTime
EnterCriticalSection
GetProcAddress
SetLastError
GetLastError
LeaveCriticalSection
InitializeCriticalSection
GetTickCount
FreeLibrary
GetConsoleCP
GetConsoleMode
LoadLibraryW
GetStringTypeW
SetStdHandle
FlushFileBuffers
GetOEMCP
GetACP
InterlockedDecrement
GetCPInfo
RtlUnwind
IsBadWritePtr
IsBadReadPtr
IsBadStringPtrW
IsBadStringPtrA
ResumeThread
TlsGetValue
TlsAlloc
TlsSetValue
RaiseException
WideCharToMultiByte
FormatMessageA
GetCommandLineA
HeapSetInformation
GetStartupInfoW
ExitThread
CreateThread
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapSize
InitializeCriticalSectionAndSpinCount
SendMessageA
SetThreadDesktop
PostMessageA
GetSystemMetrics
GetThreadDesktop
OpenDesktopA
IsWindow
OpenWindowStationA
SetProcessWindowStation
GetUserObjectInformationA
GetForegroundWindow
ExitWindowsEx
CloseDesktop
RegCreateKeyExW
RegOpenKeyExA
LsaFreeMemory
LsaRetrievePrivateData
LsaNtStatusToWinError
LsaStorePrivateData
LsaClose
LsaOpenPolicy
AdjustTokenPrivileges
GetSecurityDescriptorSacl
SetSecurityInfo
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegDeleteValueW
RegCreateKeyExA
LookupPrivilegeValueA
RegDeleteKeyA
LogonUserW
OpenProcessToken
SetKernelObjectSecurity
SetServiceStatus
RegisterServiceCtrlHandlerExA
StartServiceCtrlDispatcherA
RegSetValueExW
RegCloseKey
RegOpenKeyExW
RegDeleteValueA
RegQueryValueExW
RegQueryValueExA
RegSetValueExA
FreeSid
AllocateAndInitializeSid
SetNamedSecurityInfoW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetEntriesInAclA
ShellExecuteExW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ