Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-28_21127505904d70e30034104a2a0c3c29_mafia.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-05-28_21127505904d70e30034104a2a0c3c29_mafia.exe
Resource
win10v2004-20240426-en
Target
2024-05-28_21127505904d70e30034104a2a0c3c29_mafia
Size
1.3MB
MD5
21127505904d70e30034104a2a0c3c29
SHA1
b5f459141cfec3471c8f030e5b9ff16810c3ee37
SHA256
67c0a1ac9c0ac22ea58ff32c79b7ea8c3f6da29763aca92665dd65037aa8029e
SHA512
56ab962dfcb9a476c4834338f067f9830d458adcd955ec45764c670e3c9695f1a8545dae5018c37ec1da68529eac067a0b5b6eb4eeb6fd9f9657f71b5d2bfe51
SSDEEP
24576:6yRIKDnvE4A5nMIS/eHaP33uAxFO0hWN4MaL7B5CuiTvMq174U4n:fsl5n3Sn3egBWNgd5CuovMC7vk
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
EnumProcessModules
GetModuleFileNameExW
TraceEvent
GetTraceLoggerHandle
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueW
GetTraceEnableLevel
GetTraceEnableFlags
RegisterTraceGuidsW
UnregisterTraceGuids
RegisterEventSourceA
ReportEventA
DeregisterEventSource
ImpersonateLoggedOnUser
RevertToSelf
RegOpenKeyExW
RegCloseKey
RegSetValueExW
RegQueryValueExW
RegSetValueExA
RegQueryValueExA
PathMatchSpecW
SHDeleteKeyW
PathRemoveFileSpecW
StrStrIW
PathGetArgsW
PathAppendA
HashData
SfcIsFileProtected
WinVerifyTrust
GetModuleHandleW
GetCurrentThreadId
GetCurrentProcessId
MultiByteToWideChar
GetSystemInfo
GetSystemWindowsDirectoryW
InterlockedDecrement
GetProcAddress
OpenProcess
CreateToolhelp32Snapshot
Module32FirstW
Module32NextW
CreateSemaphoreW
GetExitCodeThread
CreateEventW
InitializeSListHead
InterlockedPushEntrySList
QueryDepthSList
InterlockedPopEntrySList
WaitForMultipleObjectsEx
ReleaseSemaphore
SetThreadPriority
SetThreadIdealProcessor
ResumeThread
InterlockedExchange
ResetEvent
QueueUserAPC
SetEvent
SwitchToThread
FindClose
FindFirstFileW
FindNextFileW
IsBadStringPtrW
IsBadWritePtr
GetProcessAffinityMask
GetFileAttributesW
TlsGetValue
GetLocaleInfoA
GetUserDefaultLCID
CreateDirectoryA
GetShortPathNameW
HeapAlloc
GetProcessHeap
HeapFree
HeapReAlloc
TlsAlloc
TlsFree
TlsSetValue
ExitThread
OpenThread
GetCurrentThread
CreateMutexA
ReleaseMutex
CreateEventA
CreateSemaphoreA
SignalObjectAndWait
CreateThread
LoadLibraryA
GetVersionExA
WideCharToMultiByte
AreFileApisANSI
SetFilePointer
WriteFile
SetEndOfFile
FlushFileBuffers
GetFileSize
UnlockFile
LockFile
GetFileAttributesA
DeleteFileA
InterlockedIncrement
LoadLibraryW
FreeLibrary
QueryPerformanceCounter
GetSystemTime
GetSystemTimeAsFileTime
LockFileEx
GetTempPathA
GetTempPathW
GetFullPathNameA
GetFullPathNameW
GetDiskFreeSpaceA
GetDiskFreeSpaceW
CreateFileA
GetVersion
GetFileType
GetStdHandle
FlushConsoleInputBuffer
GlobalMemoryStatus
IsValidCodePage
RaiseException
InitializeCriticalSectionAndSpinCount
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
OutputDebugStringW
GetLocalTime
CreateMutexW
GetProcessId
GetExitCodeProcess
WaitForMultipleObjects
CreateProcessW
GetTickCount
GetCurrentProcess
GetPriorityClass
GetModuleFileNameW
CloseHandle
ReadFile
CreateFileW
GetCommandLineW
GetDateFormatA
GetLastError
GetModuleHandleA
FormatMessageA
LocalFree
SetLastError
TerminateThread
IsDebuggerPresent
WaitForSingleObject
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
VirtualQuery
InterlockedCompareExchange
GetTimeFormatA
LCMapStringW
GetCPInfo
RtlUnwind
GetConsoleMode
SetConsoleMode
ReadConsoleInputA
SetConsoleCtrlHandler
FindFirstFileExW
GetDriveTypeW
FileTimeToLocalFileTime
FileTimeToSystemTime
WritePrivateProfileStructW
WritePrivateProfileStringW
CreateDirectoryW
FormatMessageW
WriteConsoleW
SetEnvironmentVariableA
IsValidLocale
Sleep
EnterCriticalSection
CompareStringW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
ExitProcess
IsProcessorFeaturePresent
HeapCreate
GetACP
GetOEMCP
GetStartupInfoW
EnumSystemLocalesA
SetStdHandle
GetConsoleCP
GetTimeZoneInformation
GetCurrentDirectoryW
PeekNamedPipe
GetFileInformationByHandle
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
HeapSetInformation
VirtualAlloc
VirtualProtect
GetLocaleInfoW
DeleteFileW
lstrlenA
HeapDestroy
HeapSize
GetStringTypeW
EncodePointer
DecodePointer
MessageBoxA
GetProcessWindowStation
GetUserObjectInformationW
DefWindowProcW
DestroyWindow
DispatchMessageW
GetMessageW
ShowWindow
GetDesktopWindow
CreateWindowExW
IsWindow
PostThreadMessageW
RegisterClassExW
CommandLineToArgvW
SHGetSpecialFolderPathW
SHGetFolderPathW
CoInitializeSecurity
CoSetProxyBlanket
CoCreateInstance
CoUninitialize
CoInitializeEx
SysFreeString
VariantClear
VariantCopy
VariantChangeType
SysAllocString
VariantInit
UnloadUserProfile
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
ntohl
WinHttpOpenRequest
WinHttpConnect
WinHttpQueryHeaders
WinHttpReadData
WinHttpQueryDataAvailable
WinHttpCrackUrl
WinHttpSetOption
WinHttpGetProxyForUrl
WinHttpCloseHandle
WinHttpReceiveResponse
WinHttpSendRequest
WinHttpOpen
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ