Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-03_e0aa618dee7b363f436e4be184bfde3f_mafia.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-06-03_e0aa618dee7b363f436e4be184bfde3f_mafia.exe
Resource
win10v2004-20240508-en
Target
2024-06-03_e0aa618dee7b363f436e4be184bfde3f_mafia
Size
654KB
MD5
e0aa618dee7b363f436e4be184bfde3f
SHA1
f88b6ae5a0d3b5f97426d14adc24e47ddc30e96b
SHA256
b7b094f739387ce784563acc2b9ed695d2246875a676072a453407c4a156cb61
SHA512
29410681db76e42490c7263d7f4d59134544d28fcc71b004e551b57e3a10a0ab377055f7bcb37d004eda89e2093b378fe803c1c5232b7f17599354f558e9d416
SSDEEP
12288:mfZl6qkczAZzLMu0+YxN9VGz/3io/1JLUMRmNy3jtBcJ9TIWx1YKoD:mfZlxyUs/Z1JLU9yfg9TI+oD
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
E:\code\b5m-clt-bang5tao\B5TClient\bin\Release\B5TAssist.pdb
WinHttpOpen
WinHttpReadData
WinHttpQueryDataAvailable
WinHttpQueryHeaders
WinHttpGetProxyForUrl
WinHttpGetIEProxyConfigForCurrentUser
WinHttpReceiveResponse
WinHttpSendRequest
WinHttpAddRequestHeaders
WinHttpSetOption
WinHttpCloseHandle
WinHttpOpenRequest
WinHttpConnect
WinHttpCrackUrl
WinHttpSetTimeouts
WinHttpSetStatusCallback
WinHttpWriteData
SetUnhandledExceptionFilter
Sleep
CreateMutexW
WaitForSingleObject
ReleaseMutex
CloseHandle
CreateThread
GetTickCount
CreateDirectoryW
GetTempPathW
GetTempFileNameW
MoveFileW
CreateProcessW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GlobalFree
WaitForMultipleObjects
WriteFile
ReadFile
SetFilePointerEx
SetEndOfFile
CreateFileW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
OpenProcess
TerminateProcess
WTSGetActiveConsoleSessionId
GetModuleFileNameW
GetModuleHandleExW
LocalFree
GetModuleHandleW
GetCurrentProcessId
GetFileSize
GetCurrentProcess
WideCharToMultiByte
MultiByteToWideChar
DeleteFileA
lstrlenW
CreateFileA
OutputDebugStringA
SetFilePointer
FindClose
FindFirstFileW
GetDriveTypeW
FindNextFileW
SetErrorMode
GetVersionExW
DeviceIoControl
SetPriorityClass
InterlockedDecrement
GetFileType
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetEnvironmentStringsW
lstrlenA
FreeEnvironmentStringsW
FreeLibrary
GetProcAddress
OutputDebugStringW
HeapSize
GetLastError
LoadLibraryW
QueryPerformanceCounter
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetTimeZoneInformation
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
WriteConsoleW
SetStdHandle
GetProcessHeap
CompareStringW
GetLocaleInfoW
GetCurrentThreadId
SetLastError
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
GetStdHandle
ExitProcess
HeapCreate
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
GetCPInfo
LCMapStringW
RaiseException
RtlUnwind
GetStartupInfoW
HeapSetInformation
GetCommandLineW
GetSystemTimeAsFileTime
HeapReAlloc
HeapAlloc
HeapFree
DecodePointer
EncodePointer
GetStringTypeW
InterlockedExchange
SetEnvironmentVariableA
InterlockedIncrement
InterlockedCompareExchange
MessageBoxA
wsprintfW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
OpenProcessToken
GetTokenInformation
LookupAccountSidW
SHGetFolderLocation
SHGetPathFromIDListW
ord155
ShellExecuteW
ord680
CoInitialize
CoCreateInstance
CoSetProxyBlanket
CoTaskMemFree
CoInitializeSecurity
CoUninitialize
SysAllocString
SysFreeString
VariantInit
VariantClear
UrlUnescapeW
PathFileExistsW
WTSQueryUserToken
GetModuleFileNameExW
GetAdaptersInfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ