Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-22_70dea16460244b976c5825695502fb96_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-22_70dea16460244b976c5825695502fb96_mafia.exe
Resource
win10v2004-20240426-en
Target
2024-05-22_70dea16460244b976c5825695502fb96_mafia
Size
415KB
MD5
70dea16460244b976c5825695502fb96
SHA1
366fff737c65e947577c593ca7fd7bd85a097582
SHA256
efa073c986a5509d1272350067a4fe64734e1d6377cf655acf2cc7dda56e80c2
SHA512
067cd822bf69241795012dd5798d10d9ca478f10ca57d646f1394a7bde5ee19dd26a62276a01a436a11b08ddb29aaf4a6f52de300f16b9886f4dfec9d4bd19ae
SSDEEP
12288:D/7Rye7TFS9Qxw9WwdIgH1gbs08Gi7N29t1ugd:+95JH1gbr8RN2Jugd
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\build\ecyber\trunk\sc\bin.32\DeskSvc.pdb
?SetInt@CProfileIni@@QAEHPB_W0H@Z
?GetWindowsVersion@COSystemHelper@@QAE?AW4_WINDOW_VERSION@@XZ
??1CProfileIni@@UAE@XZ
??0CProfileIni@@QAE@PB_W_N@Z
?GetInstance@?$CSingleton@VCOSystemHelper@@@oopa@@SAPAVCOSystemHelper@@XZ
sqlite3_busy_timeout
sqlite3_errmsg
sqlite3_column_text
sqlite3_column_count
sqlite3_open
sqlite3_close
sqlite3_column_name
sqlite3_column_type
sqlite3_prepare
sqlite3_reset
sqlite3_free
sqlite3_mprintf
sqlite3_finalize
sqlite3_step
UnhandledExceptionFilter
LCMapStringW
RtlUnwind
WaitForSingleObject
SetEvent
Sleep
CloseHandle
GetLastError
LoadResource
LockResource
SizeofResource
FindResourceW
FindResourceExW
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetVersionExW
GetCurrentProcess
CreateFileW
CreateThread
ReadFile
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
CreateMutexW
ReleaseMutex
ConnectNamedPipe
DisconnectNamedPipe
CreateNamedPipeW
WriteFile
GlobalMemoryStatusEx
OpenProcess
SetProcessWorkingSetSize
ExitThread
WaitForMultipleObjects
TerminateProcess
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
SetPriorityClass
CreateEventW
TerminateThread
LocalFree
SetUnhandledExceptionFilter
lstrcmpiW
GetSystemInfo
GetSystemDefaultLangID
GetLogicalDriveStringsW
QueryDosDeviceW
GetSystemDirectoryW
GetSystemWindowsDirectoryW
ProcessIdToSessionId
GetEnvironmentVariableW
GetFileSize
FreeLibrary
GetProcessTimes
WideCharToMultiByte
GetFileAttributesW
MultiByteToWideChar
GlobalFree
LocalAlloc
SetFileAttributesW
GlobalAlloc
DeviceIoControl
GetVolumeInformationW
GetQueuedCompletionStatus
InitializeCriticalSectionAndSpinCount
RaiseException
InterlockedExchange
ResetEvent
GetExitCodeThread
PostQueuedCompletionStatus
CreateIoCompletionPort
GetCurrentThreadId
DeleteFileW
OutputDebugStringW
GetTickCount
GetProcessHeap
SetThreadPriority
HeapAlloc
HeapFree
lstrlenW
GetPrivateProfileStringW
CopyFileW
GetPrivateProfileIntW
InterlockedDecrement
GetCPInfo
GetSystemTimeAsFileTime
GetStartupInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
ExitProcess
GetStdHandle
HeapCreate
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
SetHandleCount
GetFileType
DecodePointer
GetConsoleCP
GetConsoleMode
SetFilePointer
FlushFileBuffers
GetLocaleInfoW
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
WriteConsoleW
SetStdHandle
CreateFileA
SetEndOfFile
EncodePointer
GetStringTypeW
InterlockedCompareExchange
LoadLibraryW
HeapSetInformation
GetCommandLineW
HeapSize
HeapReAlloc
HeapDestroy
lstrlenA
InterlockedIncrement
wsprintfW
GetSystemMetrics
CreateProcessAsUserW
RegEnumKeyW
ControlService
QueryServiceStatusEx
SetServiceStatus
ChangeServiceConfigW
StartServiceW
ChangeServiceConfig2W
ReportEventA
DeregisterEventSource
RegisterServiceCtrlHandlerExW
OpenServiceW
EnumDependentServicesW
StartServiceCtrlDispatcherW
OpenSCManagerW
DeleteService
CloseServiceHandle
RegisterEventSourceW
CreateServiceW
SetTokenInformation
ConvertStringSidToSidW
DuplicateTokenEx
GetTokenInformation
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegOpenCurrentUser
RegOpenUserClassesRoot
RevertToSelf
ImpersonateLoggedOnUser
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegCreateKeyW
RegSetValueExW
RegQueryValueExW
RegCloseKey
RegOpenKeyExW
SHGetFolderPathW
SHGetSpecialFolderPathW
CoInitializeSecurity
CoInitializeEx
CoSetProxyBlanket
CoInitialize
CoUninitialize
CoCreateInstance
SysFreeString
SysAllocString
VariantClear
VariantInit
PathFileExistsW
PathCanonicalizeW
PathAppendW
PathCombineW
SHGetValueW
PathRemoveFileSpecW
WinHttpReadData
WinHttpAddRequestHeaders
WinHttpOpen
WinHttpQueryHeaders
WinHttpReceiveResponse
WinHttpSetTimeouts
WinHttpOpenRequest
WinHttpGetProxyForUrl
WinHttpQueryDataAvailable
WinHttpCrackUrl
WinHttpCloseHandle
WinHttpConnect
WinHttpSetOption
WinHttpGetIEProxyConfigForCurrentUser
WinHttpSendRequest
WinHttpWriteData
GetProcessMemoryInfo
EnumProcessModules
GetModuleFileNameExW
EnumProcesses
EmptyWorkingSet
CreateEnvironmentBlock
DestroyEnvironmentBlock
IsNetworkAlive
InternetCheckConnectionW
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
UuidFromStringW
WSACleanup
WSAStartup
inet_ntoa
gethostname
gethostbyname
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ