Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-21_165da212f6106f9b54d484be63e2aed1_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-21_165da212f6106f9b54d484be63e2aed1_mafia.exe
Resource
win10v2004-20240508-en
Target
2024-05-21_165da212f6106f9b54d484be63e2aed1_mafia
Size
438KB
MD5
165da212f6106f9b54d484be63e2aed1
SHA1
c1817f1e97e06fcc70e75247347ac2214d66e12e
SHA256
66209bbe46954e16b5332480cccb27aaeaf84999cecba45dbf2a55a444718007
SHA512
57ec831be70844960f148ae3728fe12ad124f99e80d6d3463827c28aaefa1f8e71b58c22d8fbb9235afe8207f686617689d28c8771467bec1eca2131ce6bab32
SSDEEP
12288:W2XbBul2Q/h3yDrGpP/AvAemEzHM7SayXWrUxkLEh:WQOC/GkApGHMuawWoxkLEh
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetFileAttributesW
SetFileAttributesW
RemoveDirectoryW
FindNextFileW
DeleteFileW
MoveFileW
MoveFileExW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
TerminateProcess
GetModuleHandleExW
GetLastError
LocalFree
GetCurrentProcess
GetCurrentProcessId
WideCharToMultiByte
GetTickCount
GlobalFree
GetVersionExW
HeapAlloc
GetProcessHeap
HeapFree
CreateFileA
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
ReleaseMutex
LeaveCriticalSection
CreateEventW
SetEvent
TlsAlloc
InitializeCriticalSectionAndSpinCount
SetHandleCount
lstrlenA
FreeLibrary
CreateDirectoryW
FindClose
FindFirstFileW
GetDriveTypeW
ReadFile
WriteFile
SetFilePointer
CreateFileW
GetModuleHandleW
CloseHandle
GetProcAddress
GetModuleFileNameW
LoadLibraryW
OpenProcess
OutputDebugStringW
WaitForSingleObject
MultiByteToWideChar
GetEnvironmentStringsW
FreeEnvironmentStringsW
ExitProcess
IsProcessorFeaturePresent
IsDebuggerPresent
SetUnhandledExceptionFilter
SetPriorityClass
DeviceIoControl
GetLocalTime
SetEndOfFile
SetStdHandle
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetLocaleInfoW
HeapSize
FlushFileBuffers
GetConsoleMode
GetConsoleCP
IsValidCodePage
GetOEMCP
GetACP
GetSystemTimeAsFileTime
QueryPerformanceCounter
HeapCreate
GetCurrentThreadId
SetLastError
TlsFree
TlsSetValue
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
GetStringTypeW
Sleep
EncodePointer
DecodePointer
GetCommandLineW
HeapSetInformation
GetStartupInfoW
HeapReAlloc
WriteConsoleW
GetFileType
GetStdHandle
RaiseException
RtlUnwind
LCMapStringW
GetCPInfo
UnhandledExceptionFilter
TlsGetValue
MessageBoxA
wsprintfW
SetSecurityDescriptorSacl
GetSecurityDescriptorSacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegSetValueExW
RegCreateKeyExW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
LookupAccountSidW
GetTokenInformation
OpenProcessToken
SHFileOperationW
ShellExecuteW
CoSetProxyBlanket
CoCreateInstance
CoInitializeSecurity
CoUninitialize
CoTaskMemFree
CoInitialize
PathFileExistsW
GetModuleFileNameExW
WinHttpGetIEProxyConfigForCurrentUser
WinHttpGetProxyForUrl
WinHttpSendRequest
WinHttpSetOption
WinHttpCloseHandle
WinHttpOpen
WinHttpSetTimeouts
WinHttpCrackUrl
WinHttpConnect
WinHttpAddRequestHeaders
WinHttpOpenRequest
WinHttpReadData
WinHttpQueryDataAvailable
WinHttpWriteData
WinHttpReceiveResponse
WinHttpQueryHeaders
SysFreeString
VariantInit
VariantClear
SysAllocString
GetAdaptersInfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ