Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-23_0672f0c27742ee60f000fec5e6d1eec9_mafia.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-23_0672f0c27742ee60f000fec5e6d1eec9_mafia.exe
Resource
win10v2004-20240508-en
Target
2024-05-23_0672f0c27742ee60f000fec5e6d1eec9_mafia
Size
8.1MB
MD5
0672f0c27742ee60f000fec5e6d1eec9
SHA1
87bc15866ceb11880f96330edcc4cfa2452a2591
SHA256
d00a5f8e8f4e0a67c3ba9dabc5bbcaca3e3d2414a0c07bf27358ae0d7aa517d8
SHA512
88b391058debe49c12da136a0c7d1153c8473a74f4d516abc098f384611bff3ff4544a35a1bf934333310feecef06929c0bc67885ca4178cbb9c2aae5f17adef
SSDEEP
196608:528WimxansKMkuTHdcLCPcZ/Ccqvd8GIFttIF9hl:Y8WiKybeme0zqvdl8tt6l
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
G:\Code\Audit\InsideSrc\0801106204_proto_changed\target\release\symbols\server\BmpLoader.pdb
CreateToolhelp32Snapshot
GetCurrentProcess
WriteFile
CreateFileA
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
GetCommandLineA
WideCharToMultiByte
HeapFree
HeapAlloc
GetProcessHeap
ReleaseMutex
OpenMutexA
CreateDirectoryA
RemoveDirectoryA
DeleteFileA
WritePrivateProfileStringA
GetVersionExA
SetFilePointer
SetEndOfFile
ReadFile
FlushFileBuffers
Process32First
OpenEventA
FreeLibrary
LoadLibraryA
GetTempPathA
GetDriveTypeA
GetWindowsDirectoryA
GetPrivateProfileStringA
SetUnhandledExceptionFilter
SetErrorMode
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
CompareStringW
CreateFileW
GetDriveTypeW
LoadLibraryW
WriteConsoleW
SetStdHandle
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
HeapReAlloc
GetStringTypeW
IsValidCodePage
GetOEMCP
GetACP
GetTimeZoneInformation
SetEnvironmentVariableA
Process32Next
OpenProcess
CreateMutexA
GetCurrentThreadId
GetTickCount
GetLocalTime
GetModuleFileNameA
GetSystemDirectoryA
CreateEventA
SetEvent
MoveFileExA
GetFileAttributesA
SetFileAttributesA
Sleep
FindNextFileA
FindFirstFileA
FindClose
GetLastError
LocalFree
GetModuleHandleA
GetProcAddress
TerminateProcess
UnmapViewOfFile
CloseHandle
CreateFileMappingA
MapViewOfFile
GetCurrentProcessId
FlushViewOfFile
GetCurrentDirectoryW
PeekNamedPipe
GetFileInformationByHandle
GetFullPathNameA
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
HeapCreate
GetLocaleInfoW
GetModuleFileNameW
GetFileType
GetStdHandle
SetHandleCount
ExitProcess
HeapSize
InitializeCriticalSectionAndSpinCount
GetConsoleMode
GetConsoleCP
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
RtlUnwind
GetSystemTimeAsFileTime
RaiseException
HeapSetInformation
GetStartupInfoW
FileTimeToSystemTime
FileTimeToLocalFileTime
FindFirstFileExA
LCMapStringW
MultiByteToWideChar
GetCPInfo
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
SetLastError
GetMessageA
PostThreadMessageA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
LookupPrivilegeValueA
OpenProcessToken
AdjustTokenPrivileges
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
SetFileSecurityA
ConvertStringSecurityDescriptorToSecurityDescriptorA
SHGetFolderPathA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ